Image Image Image Image Image Image Image Image Image

Fraud Archives - Delap CPA

30 Jan

Don’t Fall Victim to Dangerous W-2 and Lender Phishing Scams

January 30, 2018 | By | No Comments

Author: Becky Luther, Tax Senior at Delap A resurgence of W-2 phishing scams is again threatening business owners. All business owners and their employees should be on the alert for cybercriminals attempting to steal W-2 and other sensitive personal information through a phishing scam. W-2 phishing scams made victims of hundreds of organizations and many […]

Read More

14 Sep

The Newest Attack on Bluetooth Devices and How You Can Protect Yourself

September 14, 2017 | By | No Comments

  Yesterday, researchers at Armis announced that they had found a series of vulnerabilities in Bluetooth that can allow an attacker to take over a device in seconds, with no interaction from the user end. They have dubbed this new attack “BlueBorne.” Bluetooth is a short range wireless protocol most commonly used to send things […]

Read More

09 Mar

Verify Before You Trust: Implementing A Validation Policy For Your Company

  It’s that time of year again; fraudsters are out in droves looking for ways to obtain data about you and your employees in order to cash in on filing fraudulent tax returns! So what are a few steps you can take as an employer to reduce the risk of unknowingly providing fraudsters with the […]

Read More

24 Mar

RFID Security – Have You Left Your Doors Open? Part Three: How to Avoid an Attack

March 24, 2016 | By | No Comments

So, how should organizations be mitigating these significant risks to their environments? For one, the notion that having RFID physical access control systems guarantee that they are secure needs to be abolished. It is far too often forgotten that there are no “silver bullets” in security and RFID security is a perfect example. Organizations need […]

Read More

22 Mar

RFID Security – Have You Left Your Doors Open? Part Two: Types of Attacks

March 22, 2016 | By | No Comments

The ProxMark III is the de facto device for attacking RFID-based physical access control systems. Originally created by Jonathan Westhues for his master’s thesis, both the software and the hardware has been continually developed by an active online community ( This very flexible and powerful device is the size of a deck of cards and […]

Read More