How fraudulent online retailers are robbing us blind

00:00
–:–
Open/download audio

Ready for a new generation of online retail fraud? Listen to this one-minute podcast to protect yourself from trending scams.

Learn more about your ad choices. Visit megaphone.fm/adchoices

Tags: ad choices, fraud, online retail, Podcast, scams


3 genius ways you're not using your Amazon Alexa

Who says Alexa is only helpful on your kitchen counter? She’s a smart cookie, and chances are, there’s more you could be doing with her.

Did you know that Alexa can improve home security and check in on elderly relatives? Tap or click here for five clever ways to use your Echo and Alexa.

Continue reading

How Spotify determines your personal music taste

Spotify is one of the world’s largest music streaming services with almost a quarter billion active users. And if you have ever used Spotify, you know it is impressive how well the app can get to know your music preferences. How does this software work? Through extremely complex math, of course.

WebMD for Gen Z: Kids diagnosing mental health disorders online

Life can be difficult for children. It’s been a struggle for many generations. For millions of American kids, there aren’t many places to turn to. Tap or click here for the best parental control apps to protect kids.

Continue reading

The simple but dangerous mistake you make with your phone every day

Your smartphone has many settings to protect your privacy, and you may not always be aware of them. Tap or click here for new iPhone and Android security features to turn on.

Then there’s the other side of the coin. There are some features you should leave off, especially if you’re not using them. Some are minor annoyances, while others can expose you to cybercriminals.

Continue reading

New antivirus scam email spreading — Don't click!

You don’t expect antivirus software to spread malware, but it happens. Tap or click here for how this malware can eavesdrop on your calls using your phone’s motion sensors.

Phishing scams are also far too common. Maybe you get a receipt for AV software you never bought, or a marketing email that looks legitimate buts leads you to a bogus page ready to take your credit card info.

Continue reading

Want to shed some pounds? Don’t fall for these weight loss scams

Overwhelmed by your New Year’s resolutions? We can help you get started with a critical one: improving your cybersecurity. These five tech resolutions will carry you through this year and beyond.

Losing weight is among the most common resolutions and, unfortunately, scammers are waiting to pounce. The crooks know that January and February are the best times to trick people into buying phony products or signing up for fake newsletters.

Continue reading

Work in one of these 10 industries? Scammers are targeting you

Any Komando.com reader knows that antivirus software is essential for your computer, but that’s not the only device you should be protecting. Smartphone cyberattacks are becoming increasingly common. Tap or click here for tips on shielding your iPhone and Android from the countless threats out there.

Continue reading

Don’t lose important messages: How to save your voicemails

Life is short, and there’s more than ever to think about when it comes to the end of life. Tap or click for steps to decide who gets access to your accounts when you’re gone.

If you’ve lost someone, you know how comforting pictures and videos can be. Being able to read old text conversations is special, too. Tap or click for the best way to save your texts.

Continue reading

Replace your old flashlight with this powerful, compact model

We all have that flashlight we keep handy for emergencies. It’s in the drawer near the fridge or at the bottom of the basement stairs. But it’s not that good, is it? It helps you stumble around to the circuit breaker during a storm, but what other utility does it provide?

Continue reading

This phone scam fooled someone out of thousands of dollars

There are many ways for scammers to get their hands on your information and money. Text messages with malicious links are common, and some criminals use QR codes to harvest your data.

Others take a bit of a more hands-on approach, opting to call victims. These scammers can be persuasive, and it can be challenging to determine whether they are legitimate.

Continue reading