You get an email from your boss’s boss requesting that you make a wire transfer to a new vendor. The email is marked urgent, so you ignore the 20 others that need your attention to take care of it. You handle wire transfers all the time, and you’ll definitely score points for responding so quickly, right? Maybe not.
In a recent scheme, sometimes called “masquerading,” a hacker poses as a senior executive and asks an employee to complete a financial transaction, like a confidential business investment or a payment to a vendor. Once money is wired to a bogus account, it can be nearly impossible to recover.
Love breezing through tollbooths with your E-Z Pass? A new scam is taking advantage of that.
Here’s how it works: You get an email that appears to be from E-Z Pass. It has the E-Z Pass logo, and says you owe money for driving on a toll road. It also provides a link to click for your invoice.
Guess what? The email isn’t from E-Z Pass. If you click on the link, the crooks running this scam may put malware on your machine. And if you respond to the email with your personal information, they’re likely to steal your identity.
With today’s technology, organizations and companies can collect and analyze massive amounts of consumer data at lightning speed. What people search online, buy in stores, and do and say on social media is information that helps companies market more efficiently. This era of "big data" may hold lots of promise – but also some pitfalls.
Next month, the FTC will explore the use of big data for marketing and other purposes.
You may have heard about it in the news: reports that Russian hackers have stolen more than a billion unique username and password combinations, and more than 500 million email addresses, grabbed from thousands of websites. What should you do about it? We asked our resident expert, Maneesha Mithal, director of our Division of Privacy and Identity Protection.
If you are budget-conscious, you’re probably great at tracking where your money goes every month. You pore over receipts, take advantage of sales, and even research prices on big-ticket items to save the most. So how often do you review your mobile phone bill for fraudulent charges that could be draining your wallet?
“Rachel from Cardholder Services” is one of the most notorious — and most annoying — robocallers ever. Advances in technology have made it cheap and easy for Rachel and her buddies to send out thousands of calls every minute — and to spoof caller ID information, hiding their true location and identity. It’s the perfect environment for telephone spam.
Because technology is the crux of the problem, the FTC is tapping one of the world’s largest hacking conferences for some high-caliber technical support. The FTC is sponsoring a contest at DEF CON 22 in Las Vegas, Aug. 7-10, to inspire innovative tech solutions in the fight against illegal robocalls.
Ready for a discussion that’s likely to upset the whole family? First, explain these concepts to your four-year-old: online shopping accounts that are linked to your credit card, unlimited in-app charges, and store policies that state all sales final. Then, explain how the virtual coins your child uses in a game can cost real money charged instantly to your account. Sounds like fun, right?
The experience has been anything but fun for parents whose children racked up hundreds of dollars playing “free” games on the Kindle Fire.
In today’s economy, Big Data is big business. And data brokers — companies that collect consumers’ personal information and resell or share that information with others — play a key role.
Today, the Federal Trade Commission released a study of nine data brokers. These data brokers collect personal information about consumers from a wide range of sources — including public records, loyalty cards, websites and social media — and provide information for a wide range of purposes — including verifying someone’s identity, marketing products and detecting fraud.
As news about the eBay hack hits the media, you may be wondering what you can do to protect yourself from fraud. First, change your eBay password. When you create your new password, keep these tips in mind.
If you used your eBay ID or password for other accounts, change them, too. Hackers sometimes try stolen IDs and passwords on different websites to gain control of other accounts.
Don’t confirm or provide personal information in response to an email or text, and don’t click on links in unexpected messages.