Online Banking Safety: 

Protecting Your Finances in the Digital Age

Online banking has witnessed a surge in popularity over the past few decades due to its convenience and user-friendly interfaces. Banks have invested heavily in enhancing the security of online banking platforms. Nevertheless, the allure of easy access to money has made online banking a prime target for scammers and hackers. Shockingly, the Federal Trade Commission reported over 33,000 cases of bank fraud in just the first quarter of 2023.

Types of Online Banking Crimes:

Online banking scams take various forms, including:

1. Phishing Attacks: Scammers send fake bank emails, texts, or phone calls, often with links to fraudulent websites to steal login information.

2. Cyberattacks: Hackers gain unauthorized access to your devices to steal personal and financial information.

3. Data Breaches: Cybercriminals target financial institutions, leaking sensitive data to the Dark Web.

4. Social Engineering: Scammers create fake bank accounts using stolen information.

5. Hacking Payment Processors: Criminals target companies storing bank account information.

6. Skimming and Shimming Devices: Fraudsters attach devices to ATMs to steal card details.

Consequences of Bank Account Number Theft:

Once scammers obtain your bank account number, they can:

  • Commit ACH (Automated Clearing House) fraud and withdraw money.
  • Make online purchases using your bank details.
  • Launder money through your account.
  • Create and use fraudulent checks.
  • Steal your identity.
  • Gain access to your online banking.
  • Conduct tax fraud.
  • And more.

Who Do Bank Scammers Typically Target?

While no one is immune to bank scams, they often target less tech-savvy individuals, including young people with newly opened bank accounts and the elderly. For instance, individuals in their 20s are more than twice as likely to fall for fake check scams.

Can Someone Use My Identity for Bank Fraud?

Yes, scammers can use your identity to commit various forms of bank fraud, accessing your bank accounts, government benefits, and even contacting your friends and loved ones to perpetrate further scams.

The 10 Most Common Types of Bank Scams:

1. Overpayment Scams.

2. Automatic Debit Scams.

3. Fake Check Cashing Scams.

4. Unsolicited Check Fraud.

5. Government Impostor Scams.

6. Phishing Scams.

7. Charity Scams.

8. Online Lending Scams.

9. Sweepstakes and Lottery Scams.

10. Fake Bank Text Messages.

Are You Liable for Scammers’ Charges?

Generally, you are not liable for charges made by scammers using your bank account details. However, it’s essential to follow specific guidelines and report unauthorized transactions promptly to your bank.

Steps to Protect Yourself:

To safeguard your finances, take these precautions:

  •  Avoid cashing checks paying in excess.
  • Use encrypted websites for financial transactions.
  • Never share sensitive information over the phone.
  • Be cautious with charity websites.
  • Verify email addresses.
  • Don’t engage with scammers.
  • Be cautious of government impostor scams.
  • Never pay to redeem prizes.
  • Borrow only from reputable sources.
  • Verify unsolicited checks with your bank.
  • Use a trusted cybersecurity app like Aura for protection and identity theft coverage.

In the digital age, protecting your finances is paramount. By staying informed and adopting best practices, you can minimize the risk of falling victim to online banking scams and enjoy the convenience of online banking with peace of mind.

Protecting Your Generosity: How to Identify and Avoid Charity Scams

Charity scams are a heartless deception that prey on people’s kindness and desire to help others. These schemes come in many forms, so it’s important to know what tell tale signs to watch out for if you are planning to give.

Understanding Charity Scams: A Closer Look

Cybercriminals manipulate emotions, using sympathy and urgency to trick victims into giving away their hard-earned money or sensitive personal information. From impersonating well-known charities to setting up fake disaster relief funds, scammers leave no stone unturned to exploit the goodness of people’s hearts.

The Alarming Rise in Losses

According to the FBI’s 2020 report on internet crime, losses due to charity fraud and scams have been steadily increasing over the years. In 2020 alone, victims of online charity scams lost a staggering $4.4 million. Shockingly, this figure doesn’t even account for offline charity fraud or unreported incidents, underlining the magnitude of the problem.

Why Charity Scams Target Compassion

The human tendency to lend a helping hand is both heartwarming and exploitable. Scammers capitalize on this generosity by creating elaborate narratives that tug at heartstrings. When a desperate need arises, compassionate individuals feel compelled to contribute, unknowingly falling into the trap set by these fraudsters.

Common Types of Charity Scams

  1. Impersonation Charities: Scammers replicate well-known charitable organizations, diverting funds meant for the genuine cause.
  2. Dishonest Distribution Charities: Legitimate-looking charities misallocate funds for personal gain instead of aiding recipients.
  3. Fake Disaster Relief Funds: Scammers exploit crises to solicit donations for fabricated nonprofits.
  4. Fraudulent GoFundMe Accounts and Social Media Fundraisers: Fraudsters manipulate emotions through fabricated stories on social platforms.
  5. Veterans Charity Scams: Exploiting patriotism, scammers impersonate veterans charities to target well-meaning donors.

Warning Signs of a Fake Charity

  1. Hard-Sell Tactics: Beware of aggressive tactics that pressure you to donate quickly.
  2. Vague Language: Steer clear of charities with unclear intentions and ambiguous descriptions.
  3. Unsecured Websites: Look for “https://” and a padlock icon in the URL to ensure a secure connection.
  4. Direct Contact: Legitimate charities won’t cold-call or email you unexpectedly.
  5. Strange Payment Methods: Avoid cash, wire transfers, gift cards, or cryptocurrencies for donations.
  6. Similar Names: Be cautious if the charity’s name is remarkably similar to a well-known organization.
  7. Lack of Information or Bad Reviews: Scam charities may have no online presence or negative reviews.

Steps to Protect Yourself

  1. Check Charity Credentials: Use watchdog websites like Charity Navigator, BBB Wise Giving Alliance, CharityWatch, and GuideStar to verify charities.
  2. Conduct Independent Research: Look for reviews, complaints, and scams associated with the charity online.
  3. Ask About Nonprofit Status: Verify if the charity is registered and request proof of nonprofit status.
  4. Use Secure Passwords: Create strong, unique passwords or passphrases for each account using a password manager.
  5. Monitor Your Accounts: Regularly check for unauthorized activity and sign up for identity theft protection services.
  6. React Swiftly to Data Breaches: Change passwords and enable multi-factor authentication after breaches.
  7. Seek Professional Help: Use tools like Aura for credit monitoring, dark web scans, and assistance in fraud resolution.

Safeguarding Your Philanthropic Spirit

In a world filled with digital threats, protecting your generosity is of paramount importance. By staying vigilant, educating yourself about common charity scams, and leveraging tools like Aura, you can ensure that your contributions reach those truly in need. Together, let’s empower ourselves and our loved ones to make a positive impact while safeguarding against the darkness of online deception.

Additional Resources:

Remember, your generosity has the power to change lives, but safeguarding it from the clutches of scammers ensures that your impact remains genuine and meaningful.

How Hackers and Scammers Use AI (Artificial Intelligence)

Artificial intelligence (AI) is an increasingly popular topic of conversation when it comes to tech these days, especially with the public release of tools like ChatGPT. And while AI has legitimate and beneficial applications, some of its negative aspects are overshadowing its positive potential. One of the big concerns when it comes to AI use is how it is being exploited by hackers and scammers for malicious purposes. In this blog, we’re going to explore how hackers leverage AI in cyber attacks and the potential threats it poses to cybersecurity.

Understanding Modern AI: 

Modern AI systems utilize a technique called machine learning. This technique enables systems to learn from data and improve their performance without being explicitly programmed. It involves training a model using a large amount of data, allowing it to begin to recognize patterns in that data and then asking it to make  predictions or classifications. The model then “learns” by adjusting its parameters based on feedback and comparing its predictions to the actual outcomes. Through this repeated process, machine learning systems become more accurate and effective at solving specific tasks, such as image recognition, speech recognition, and data analysis.

How AI is Used by Hackers and Scammers: 

Here are a handful of ways hacker are leveraging AI to make their hacks and scams more effective…

  • Automated Attacks: Hackers utilize AI algorithms to automate attacks, increasing speed, scalability, and sophistication.
  • Phishing and Social Engineering: AI-powered tools analyze vast amounts of data to create personalized phishing emails, messages, and chatbots, making scams more convincing.
  • Deepfake Technology:  AI-generated deep fake videos and audios enable impersonation, leading to identity theft or the manipulation of public opinion.
  • Malware Detection Evasion:  AI can create malware that adapts its behavior to bypass traditional security measures, evading detection systems.
  • Data Breaches and Data Mining:  AI algorithms assist hackers in identifying vulnerabilities, exploiting weak points, and extracting valuable data from compromised systems at an unprecedented scale.
  • Password Cracking:  AI accelerates the process of cracking passwords by using machine learning techniques to analyze patterns and predict likely combinations.

Top AI Scams to Watch Out For…

While there are aspects of AI hacking that are beyond our control, such as malware detection evasion and data breaches, and for which we must rely on our cybersecurity softwares and systems, there are some that we can actively take measures to prevent. Two such hacks are Voice Duplication/Deepfakes,  and Text Tone Impersonation – more commonly known as phishing

Voice Duplication and Deepfakes: 

One alarming way scammers are using AI is through voice duplication, known as vishing. By utilizing short audio clips of people posted online, scammers can clone voices and deceive individuals into thinking they are speaking to someone they know. Voice synthesis is the technique behind this manipulation, involving the analysis of a person’s voice to generate new speech that sounds remarkably like the original. While voice synthesis has legitimate applications, scammers leverage it to impersonate someone and trick victims into divulging sensitive information. 

How to Protect Yourself:

To protect yourself, establish a secret “family password” with loved ones and be skeptical of unexpected emotional or threatening messages requesting immediate action or money. 

Text Tone Impersonation:

Phishing emails have become increasingly sophisticated, often mimicking genuine company or government communications. AI models are trained using examples of content, enabling scammers to train AI algorithms to create highly realistic impersonations of legitimate emails and texts. This technique makes it harder for individuals to discern between real and fake communications

How to Protect Yourself

To protect yourself, save the genuine emails of companies or organizations that frequently contact you. Be cautious when asked for personal or login information and verify the authenticity of such requests by calling the organization at a known contact number rather than relying solely on the email or text. Avoid clicking on links from unknown senders and preview URLs before clicking if you’re unsure of their safety.

Other Ways to Stay Safe…

As hackers and scammers continue to exploit AI in their cyber attacks, it’s crucial to prioritize your cybersecurity. Being skeptical of unexpected contacts and requests for money remains essential. However, it’s important to note that AI can also be used for good, even in the fight against scammers. Consider leveraging proactive AI-based tools like Aura to enhance your protection.

For example: Aura’s AI-powered Call Assistant serves as an effective defense mechanism against spam or scam calls. It screens unknown calls on your behalf, ensuring that only legitimate calls are forwarded to you. To learn more about it and  access exclusive Cyber-Seniors discounts, visit

With all the negative talk about AI out there, it may be tempting to shy away from it. However, to ensure our online safety, it is crucial to stay informed about the latest AI developments. By staying up to date, we can better understand the risks and take appropriate measures to protect ourselves in this evolving digital landscape.

Password Safety 101: Strengthen Your First Line of Defense Against Hackers 

The average American has 240 online accounts that require passwords. Most of us go against expert advice and reuse non-complex passwords for many accounts. And although 89% of people say they know this is risky and unsafe behavior, only 12% are using different passwords for every account.

These trends are alarming – Americans lost $10.3 billion to digital crime last year, and Canadians reported $530 million in losses in the same year, according to the Canadian Anti-Fraud Centre.

Cybercriminals can guess our passwords by scouring the internet, steal them from leaked data, scamming us into sharing them willingly or buying them on the dark web. When they do, they use them to steal money or benefits, break into our accounts, impersonate people and target our friends and family. 

Here are three steps you can take to strengthen your first line of defense against hackers trying to steal money and identities:

Step One: Create strong, unique passwords or passphrases for your accounts.

Nearly 23 million breached accounts were found to use the password “123456,” but using easily guessable passwords like this put you at risk of hackers breaking into your accounts. Instead of going easy with “123456” or “pa$$word,” use a mix of symbols, characters, upper case letters, lower case letters and numbers that make your passwords impossible to guess.

Avoid using obvious passwords that contain your date of birth, hometown, address, pet’s names or anything else that could be found online about you. 

Combine random words, create a phrase, use song lyrics, quotes or words in different languages to form a passphrase.

For example: 

  • Start with a common phrase, like “the grass is always greener.” 
  • Change some letters to uppercase. Now, change the phrase to “tHE graSS IS alwaYS GreenER.” Don’t only capitalize the first letter of each word, as that’s too obvious. 
  • Replace some of the letters with similar-looking numbers and add on a few extra characters. For example, this phrase could be changed to “tHE%gr4SS%15%alwaYS%Gr33nER.”

According to cybersecurity researchers, a 10-character password with a mix of uppercase and lowercase letters, numbers and symbols can take five months to crack, while a 12-character combination could take up to 34 years. And with artificial intelligence, some criminals are automating the password-guessing process.

Step Two: Securely store and remember your passwords with a password manager.

53% of people rely solely on memory to manage their passwords. This method is far from foolproof – and can mean forgetting your passwords and getting locked out of accounts. 

Using password managers like Aura, Bitwarden, 1password, LastPass or NordPass is by far the best way to create complex passwords that you won’t forget. These applications store your account credentials in a secure digital vault so that you can access them whenever you need to. Every time you login to your account, a password manager automatically inputs your username and password. That way, you only have to remember one master password for the password manager vault. Just make sure that master password is complex, hard-to-guess, hasn’t been leaked and isn’t being used on for any other logins. 

As an added bonus, Aura’s password manager can warn you if your password has been leaked, is too weak or if you’re trying to enter it on a fake website

Step Three: Monitor your accounts and react quickly to data breaches or unauthorized login attempts.

Even the strongest passwords can be leaked if the company that hosts your account suffers from a data breach. This can include login credentials, credit card details and Social Security numbers (SSNs). With hackers targeting companies from Facebook to Marriott to Equifax, there’s a good chance that at least one of your accounts has been compromised.

To protect yourself after a data breach, look out for notifications of data breaches in your email and your Aura app and change any logins impacted. Monitor those accounts closely for any unauthorized login attempts and make sure that you have multi-factor authentication set up as an extra line of defense. 

Check if your data has been exposed in a data breach using Aura’s free tool: 

Sign up for identity theft protection for peace of mind that your online safety is taken care of. 

Passwords are just one part of good cyber hygiene, and securing every aspect of your digital life can be overwhelming. But dealing with fraud and identity theft is stressful and can take years to be resolved. 

That’s where Aura comes in. Aura’s all-in-one-place, easy to use app removes the burden off you by providing you with proactive credit, financial account and dark web monitoring, anti-virus software, a password manager and 24/7 support in resolving any fraud or identity theft quickly and effectively.  Access your exclusive Aura offer – a two week free trial and a 25% discount – at

Aura also offers a family, so if you’re working with your adult children on estate or financial planning, they can join your Aura account and help remove the burden of protecting your digital identity. 

Understanding Common Hacker Tactics & How to Protect Yourself Before It’s Too Late

Cybercrime is growing rapidly each year. In the U.S., $10.3 billion was lost to digital crime in 2022,  nearly double what was lost in 2021. In the same year the Canadian Anti-Fraud Centre received fraud and cybercrime reports totalling a staggering $530 million in victim losses – a nearly 40% increase from the previously unprecedented $380 million in losses in 2021.

In fact, the cost of cybercrime exceeds that of home burglaries in 2022. Given you probably have assets of greater value in digital form — like your savings or investment portfolios — than you do physical assets inside your home. So treat your online security with the same gravity you do at home. Lock your digital doors with strong passwords. Be smart about opening certain web windows. Don’t let strangers peek inside your online life. Here’s how you can protect your family and life’s from the grasp of cybercriminals. 

What puts you at risk? 

Hackers are motivated by money, and they prey on vulnerabilities – like an un-updated device, a lack of awareness or a weak password that’s used on multiple accounts. Unfortunately, many hackers target older adults, assuming that those aged 60+ have a higher net worth, are more trusting and potentially less tech savvy. 

Here a few strategies that hackers use against their victims:

  1. They use viruses or malware that you download or get by clicking a malicious link, which allow them to watch or control your activity.
  2. They impersonate legitimate tech support (like Geek Squad, Microsoft or Apple) to trick you into giving them control of your device.
  3. They take advantage of outdated software, which can cause security vulnerabilities.
  4. They hack your Wi-Fi network to control your other connected devices.
  5. They lure you into clicking dangerous links with believable phishing attacks.
  6. They buy your passwords or Social Security Number on the dark web. 

It’s also important to understand the signs that your device has been hacked, so you can act immediately to remediate the situation.

These are the warning signs that your device has been hacked: 

  1. You get signed out of your online accounts (social media, email, online banking, etc.), or you try to log in and discover your passwords don’t work anymore.
  2. You receive emails or text messages about login attempts, password resets or two-factor authentication (2FA) codes that you didn’t request.
  3. You see logins from mobile devices and locations you don’t recognize in your account activity or sign-in logs.
  4. You notice strange emails in your “Sent” folder.
  5. You start to receive spam emails — especially ones that specifically threaten or try to extort you.
  6. Friends or family members tell you they’ve received strange messages from your email or social media accounts.
  7. You receive a data breach notification from a company or service that you use stating that your personal info was leaked.
  8. You suddenly receive pop-ups that claim your device is infected with a virus.
  9. Your devices slow down, heat up or start to crash more often.
  10. You notice browser plugins, add-ons or toolbars that you didn’t install.
  11. You get redirected to unwanted websites, or they open automatically behind your browser window.
  12. Your cursor starts moving by itself — when you haven’t touched the mouse or trackpad.
  13. There are suspicious charges on your credit card or bank statements.
  14. You get a ransomware pop-up on your computer saying your data is encrypted and you need to pay a ransom.
  15. Your web camera light is on, even when you’re not using it for video calls or recordings.
  16. Your antivirus software is disabled without your permission or action. 
  17. You have to keep closing or quitting apps or sites that open on their own.

What to do in the event of a hack:

Hackers can strike at any time. If you notice any of the below signs, mitigate danger by acting quickly. 

  1. Disconnect from your Wi-Fi network. Many hacking strategies require an Internet connection in order to succeed. The sooner you cut off that access point, the better. To do this, select the Wi-Fi icon in the upper right corner of your computer screen and click the toggle to turn it off, or go to the device’s settings menu. 
  2. Use antivirus software to scan for malware. If hackers gained access to your computer, they most likely installed malware. Antivirus software can help you to isolate and delete any lingering viruses. If you have a PC, you can run an advanced scan offline using Windows’ built-in security software. For Mac users, contact Apple Support online, or call 1-800-275-2273. Aura’s antivirus software can also help.
  3. Delete any suspicious applications. Computer hackers often use unauthorized applications to give them remote control of your computer or to install viruses or malware. To counteract this, it’s important to know how to view all of your computer’s applications.
    • On a Mac: open the Finder application, then click on “Applications” on the left sidebar of the window. 
    • On a PC: select “Start” and then click “All apps.” 
    • Scroll through all of your apps and delete any that you don’t recognize.
      • Look for apps that give hackers remote access — such as Remote Desktop, TeamViewer, AnyDesk and RemotePC.
    • Go through recent downloads in your “Downloads” folder to make sure you didn’t miss anything.
  4. Update all of your apps and operating systems. Once you’ve removed any potentially harmful apps, it’s time to update everything else — including your computer’s operating system. This helps remove any security vulnerabilities that hackers can use to regain access to your computer.
    • You can update any Microsoft or Apple apps by going into the app store and selecting “Updates” in the sidebar menu.
    • Update apps that you downloaded elsewhere by opening them individually and going to their settings to install updates from there. 
    • Finally, go into your computer’s general settings from your desktop and initiate a software update (if one is available).
      • This can be as simple as typing “update” into your computer’s desktop search bar and clicking on the “Software Update” option that pops up.
  5. Reset all of your passwords and set up two-factor authentication (2FA) Password security is a huge part of your computer’s security overall. Make sure you update all of your passwords and use additional security measures such as two-factor-authentication (2FA). Consider downloading a reliable password manager, like Aura’s, to keep your passwords safe. 
  6. Wipe your device and initiate a clean install. When an antivirus scan doesn’t feel like enough, consider wiping and restoring your hard drive. Backup all your data onto an external hard drive or a cloud-based storage system. 
  • For Mac users: you can use the Time Machine application that comes with your Apple computer. Restore your system back to the way it was before it got hacked. 
  • For PC users: you can also initiate what’s known as a System Restore Point, which functions the same way as Apple’s Time Machine. It allows users to wipe all installations that occurred after a given point in time (for example, before a hack occurred). 
  • Pro tip: Make sure you’re using a backup from before your computer was hacked. Otherwise, you could accidentally reinstall malware or malicious apps.
  1. Freeze your credit. If your personal information is stolen, your credit and financial accounts are immediately at risk. Hackers can sell your information or use it to open up new lines of credit in your name. Initiate a credit freeze to restrict access to your credit report, by contacting one of the main credit agencies online or by phone.
  2. Check your credit report and financial statements. Once your passwords are changed, check for suspicious activity on your financial accounts. If your computer or phone is infected, sign into your bank and credit card accounts on a different device. 
  3. Warn your friends and family about the hack. Hackers could bait and scam others via your social media and email accounts. Your friends, acquaintances and family members are much more likely to fall for a scam or click on a corrupting link if they think they’re communicating with you. Contact them over the phone so they can be sure you’re you. 
  4. Tighten the security settings on all of your online accounts. Every personal service and account you use has customizable security settings. Go through available security features and choose the ones that will best protect your information.

How to proactively protect yourself? 

Not all hacks can’t be prevented, but you can take some defensive measures to proactively protect yourself. The most important strategy for minimizing your risk is good cyber hygiene – installing antivirus and anti-malware software, learning to recognize the signs of a phishing attack, avoiding clicking on links or downloading files from unsolicited emails or text messages and checking your accounts and credit report regularly for any unusual activity. 

Sign up for identity theft protection for peace of mind that your online safety is taken care of. 

Digesting all of the information above can be overwhelming. Dealing with fraud and identity theft is not only stressful, but it can take years to be resolved. That’s where Aura comes in. Aura’s all-in-one-place, easy to use app removes the burden off you by providing you with proactive credit, financial account and dark web monitoring, anti-virus software, a password manager, and 24/7 support in resolving any fraud or identity theft quickly and effectively.  Access your exclusive Aura offer – a two week free trial and a 25% discount – at

iPhone Tips and Tricks

During this Cyber-Seniors webinar, our teen tech mentors will discuss some useful tips and tricks for iPhone users, such as how to adjust brightness, font size and keyboard placement, how to access Apple Wallet, Apple Health and Siri, how to take screenshots and scan documents, and much more! If you enjoyed this video, please give it a like and subscribe to our channel for more helpful tech sessions!

Recorded on 06/27/2022

Uber: Ride Share App

During this Cyber-Seniors webinar, our teen tech mentors tell us all about Uber, a popular ride sharing app that lets you get picked off and dropped wherever and whenever. If you enjoyed this video, please give it a like and subscribe to our channel for more helpful tech sessions!

Recorded on 05/16/2022

OneDrive: Cloud Storage for Microsoft Accounts

During this Cyber-Seniors webinar, our teen tech mentors will demonstrate how to use the cloud storage platform OneDrive to store, access and share files from any device, anywhere. If you enjoyed this video, please give it a like and subscribe to our channel for more helpful tech sessions! Visit the Cyber-Seniors website to sign up for a webinar or a one-on-one tech session:

Recorded on 01/13/2022