Frauds & Scams Articles -

Frauds & Scams Articles

Did you know that Medicare beneficiaries are at an increased risk of identity theft since their social security numbers are plainly displayed on their Medicare cards? See how to keep your card safe and how the government is aiming to improve the system.

There are a few important steps that you must take after your identity has been compromised, but there are also a couple of roadblocks to avoid and minor details to be aware of when you are going through this process.

Con artists can more easily manipulate someone in person, so they often approach seniors at home under the guise of offering some kind of service. Learn from these real-life examples and use these tips to avoid falling victim to a scammer.

Identity theft is a serious issue that everyone is at risk for. Some specialized companies claim to protect their subscribing customers from data breaches and compromised identities, but are they really that effective? Can't you just monitor and safeguard your financial and personal information yourself?

Countless businesses and organizations are targeted by hackers every year, leaving consumers vulnerable to fraud. Use these steps to protect your identity and finances.

Using snail mail, writing checks, and placing all refuse in the garbage are a few traditional ways of managing finances and household affairs. While these may seem like simple and secure everyday actions, it is important to learn how these things can place you at risk and how to adapt your habits to better protect your identity.

Scammers have adopted a new strategy for manipulating caller ID in order to persuade people to answer. Knowing what kinds of suspicious signs to look for can help you to avoid people calling with shady intentions.

Many family members are eager to buy the latest gadgets for themselves and their loved ones. However, gifting a smart phone to a senior can leave them open to security breaches. Proper setup and secure use can make all the difference.

Online access to accounts is extremely convenient, but electing to forgo such access can leave you vulnerable to criminal activity. Learn how you can safeguard your accounts from fraudsters by using extra security measures.

After a loved one passes away, they are still susceptible to identity theft and fraudulent activity. However, there are some steps that you can take to ensure that their information does not fall into the wrong hands.

People of all ages can easily find themselves caught in a scammer's trap, and this predicament can deal a blow to one’s ego and bank account. Learn what recourse you have after you've taken the bait.

It is inevitable that your aging loved one will be confronted with an offer that is too good to be true or a suspicious request for sensitive information. A few simple steps can help to safeguard them from devastating identity fraud tactics and scams.

How you can detect medical identity theft and the steps to take if you are a victim of medical identity theft.

Pension poachers look for older adults who are eligible to receive a pension and convince them to restructure their assets in a way that could cause trouble when applying for Medicaid.

If you don't know these important deadlines for reporting identity theft and stolen credit, ATM or debit cards, you could end up losing thousands of dollars.

Talking to your aging parents about fraud and their risk of falling prey to a scammer (especially online) is never an easy discussion. Here are some strategies to help you find common ground.

Avoiding the Internet won't protect you from fraud. If you do not set up your online accounts you are enabling an identity thief to do it for you.

New research shatters the myth of the cranky, aging cynic. But is becoming more trusting as we get older a good or bad thing?

If you think you have fallen victim to a scammer’s phishing, follow these steps to protect your identity and finances.

Phishing emails can be used to steal consumers’ personal information and gain access to electronic devices and bank accounts. Discover how to spot fake emails and keep your important information secure.
1 2 3