Welcome to Finextra. We use cookies to help us to deliver our services. We'll assume you're ok with this, but you may change your preferences at our Cookie Centre. Please read our Privacy Policy.
Natural disaster scam: Sadly, scammers seem to come out of the woodwork during a natural disaster such as Hurricane Sandy to catch consumers when they’re in a panic, looking for answers, and when they...
There are two kinds of identity theft you must protect yourself from: New account fraud: Refers to financial identity theft in which the victim’s personal identifying information and good credit stand...
Teens are spending more and more time online these days and while the Internet offers a variety of benefits it can also serve as a dangerous space –and not just in America. According to Exploring the ...
Holiday shopping is easy, convenient and it can be secure too. Here are 10 tips to a secure online shopping experience during the holiday season: Avoid spoofed websites. Common sense says any time you...
In a world where a Twitter tweet can be heard around the world instantly, a friend’s video on YouTube can go viral overnight, and you can speak to anyone online across the globe without using a phone,...
There is no such thing as a truly secure password. There are only more secure or less secure passwords. Passwords are currently the most convenient and effective way to control access to your account...
A recent story about a teen romance gone wrong, had reportedly started on Xbox. Now their parents and police say the four Iowa teens have run away from their homes. Two teenage girls from Shellsburg a...
In my line of work I get emails such as this one: “Hi Robert, I’m not sure if you saw what had happened on my Facebook page last night, but someone stole my cell phone while I was at a concert, and po...
Ever seek out information online and end up somewhere you never meant to go? I’m not talking about some website that didn’t have what you were looking for, I’m talking about a website that you REALLY ...
The term “cyberattack” or cyberwarfare is defined as “politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional ...
“Americans have always cherished our privacy. From the birth of our republic, we assured ourselves protection against unlawful intrusion into our homes and our personal papers. At the same time, we se...
Children engage in online shopping, social media, mobile web, and computers just like adults do. Many parents feel a bit overwhelmed by technology and often throw their hands in the air and give up. U...