Kim Porter

Kim Porter is a seasoned journalist whose work has been published on websites such as U.S. News & World Report, Reviewed.com, Credit Karma, and LifeLock, and she co-authored an e-book titled “Future Millionaires’ Guidebook.” Her expertise is in identity theft, credit cards and credit, real estate, running, and travel. She also copy edits and has experience with textbook publishing and project management. An avid traveler and runner, Porter plans to run a half marathon on each of the seven continents.


Recent Articles by Kim

How to Avoid Poshmark Scams

February 18, 2020

Be wary of taking transactions outside Poshmark, merchandise misrepresentations and fake check scams on the popular second-hand fashion marketplace.

Read More >

How To Find Hidden Profiles On Social Networks

June 19, 2019

Can't find your new acquaintance or long-lost friend on social media? Here's how to find hidden social media accounts with email address, phone number and other methods.

Read More >

How to Stop Email Spoofing?

July 30, 2019

Email spoofing is a form of phishing in which hackers mimic commonly known email addresses. Here are tips to help you spot and avoid this scam.

Read More >

What Are Medicare Scams? How Seniors Are Targeted by Fraudsters

December 22, 2019

Fraudsters try to get Medicare numbers and other personal information to file false claims or steal your identity. Here's how it works and tips to defend against this scam.

Read More >

What Is a USB Condom? How Does It Work?

February 12, 2020

If you are worried about data being stolen at a public charging station, a USB condom may be able to help.

Read More >

What Is Multifactor Authentication? How MFA Helps Keep You Safe Online

December 3, 2019

Multifactor authentication (or MFA) helps keep your accounts safer by adding login steps beyond a username and password.

Read More >

What Is Neighbor Spoofing, How It Works and How to Stop It?

June 18, 2019

Getting calls from unknown numbers that look similar to your own? It might be neighbor spoofing. Learn more about how to avoid these scams.

Read More >

What Is Phishing: Types, Stages and Tips to Avoid Phishing Attack

September 10, 2019

Phishing is any attempt by email, phone or text to lure you into clicking on a link or providing personal information that can lead to theft of cash or your identity. Hereā€™s how to protect yourself.

Read More >

What Is VoIP and How Does It Work?

November 26, 2019

VoIP means voice over internet protocol, a technology that allows telephone services to operate over computer networks.

Read More >

Disclaimer: The above is solely intended for informational purposes and in no way constitutes legal advice or specific recommendations.