The FTC recently attended DEF CON 22, and challenged the tech-savvy to help us zap “Rachel from Cardholder Services” and her robocall buddies. How? The agency hosted a contest to see who could develop a cutting-edge robocall honeypot — an information system designed to attract robocallers, and help researchers and investigators understand and minimize illegal calls. Today, the FTC announced the winners, who will receive a combined total of $12,000 in prizes.
You get an email from your boss’s boss requesting that you make a wire transfer to a new vendor. The email is marked urgent, so you ignore the 20 others that need your attention to take care of it. You handle wire transfers all the time, and you’ll definitely score points for responding so quickly, right? Maybe not.
In a recent scheme, sometimes called “masquerading,” a hacker poses as a senior executive and asks an employee to complete a financial transaction, like a confidential business investment or a payment to a vendor. Once money is wired to a bogus account, it can be nearly impossible to recover.
Love breezing through tollbooths with your E-Z Pass? A new scam is taking advantage of that.
Here’s how it works: You get an email that appears to be from E-Z Pass. It has the E-Z Pass logo, and says you owe money for driving on a toll road. It also provides a link to click for your invoice.
Guess what? The email isn’t from E-Z Pass. If you click on the link, the crooks running this scam may put malware on your machine. And if you respond to the email with your personal information, they’re likely to steal your identity.
With today’s technology, organizations and companies can collect and analyze massive amounts of consumer data at lightning speed. What people search online, buy in stores, and do and say on social media is information that helps companies market more efficiently. This era of "big data" may hold lots of promise – but also some pitfalls.
Next month, the FTC will explore the use of big data for marketing and other purposes.
You may have heard about it in the news: reports that Russian hackers have stolen more than a billion unique username and password combinations, and more than 500 million email addresses, grabbed from thousands of websites. What should you do about it? We asked our resident expert, Maneesha Mithal, director of our Division of Privacy and Identity Protection.
If you are budget-conscious, you’re probably great at tracking where your money goes every month. You pore over receipts, take advantage of sales, and even research prices on big-ticket items to save the most. So how often do you review your mobile phone bill for fraudulent charges that could be draining your wallet?
A U.S. District Court recently ordered the operators of several international tech support scams to pay more than $5.1 million for convincing people that their computers were riddled with viruses and then charging for bogus support services.
We’ve written before about tech support scammers. They call and claim to work for well-known companies like Microsoft, Norton or McAfee. They say your computer is infected with malware and then ask for remote access so they can “fix” it. Or they place ads in online search results to trick you into calling them.
Chances are you have a mobile phone – according to a Pew Research Center Internet & American Life Project survey, almost 90 percent of us do. And like most of us, you may not pore over every line on your monthly phone bill to understand what you are really paying for. Too bad, because mobile cramming – adding charges to mobile bills that people didn’t authorize or know about – is an illegal practice – and it has become practically epidemic, according to the FTC.