Mac Attack (and More): The Latest in the Tech Support Scam

For six years, telephones have been ringing off the hook with alarming but bogus news: There’s a dangerous virus on your computer, and the caller – a self-described technician with Microsoft, “Windows” or an antivirus software company – says he can remove it…for a price. But now, it’s not just PC users at risk for the notorious Tech Support scam. Mac users (and the machines themselves) are also vulnerable – and this time, fix-it fraudsters don’t even have to dial …

Hackers Guzzle Your Money via Starbucks Mobile App

Starbucks devotees, prepare for a jolt beyond what’s provided in those morning cappuccinos: Hackers are draining financial accounts of customers who use a Starbucks gift card or mobile app to pay for coffee. The (no latte pun intended) skinny on this scam: Thieves hack victims’ online Starbucks accounts, via the users’ weak and/or overused passwords or credential-stealing malware, to access linked payment accounts – credit and debit cards, PayPal and bank accounts. This allows them to add a new gift card, …

Spring Clean Your Identity Theft Risks

Spring cleaning should include more than decluttering your garage and closets. Take these simple steps to reduce your risks of identity theft: Shred — don’t just trash — unnecessary documents with your name, birth date, address, and account or Social Security numbers. Typically, bank deposit slips and ATM and credit card receipts should be shredded as soon as the transactions appear on statements, credit card statements within 45 days, and pay stubs and medical bills after one year. Never simply discard …

The 411 on Two-Factor Authentication

In an era in which online accounts can be cracked with sophisticated software or a hacker’s ingenuity, taking an extra step when you log in can give you miles in added protection — even when using “strong” passwords. It’s called two-factor authentication (2FA), and it requires both something you know (like a password) and something you have (like a cellphone). Once enacted, after you successfully log in to an online account, you receive a code to your phone, via text …