Online Identity Theft Protection



             


Friday, May 15, 2009

Identity Theft: The G.I. Blues

Tom Nelson retired from the military almost twenty years ago. In that time, Nelson has spent many years living and working overseas. ?If my VA ID is fraudulently used by someone in the States, one: it could take me months to find out the theft has occurred and two: if it did happen God knows how long it would require to fix it from overseas?, Nelson told the Seattle Post Intelligencer.

On May 22 Nelson and 26.5 million U.S. veterans awoke to the news their personal information including name, address and social security number had been stolen from the home of a Department of Veteran Affairs? employee.

Why the employee took this highly sensitive information home is anyone?s guess and according to the FBI the computer disc containing this information was subsequently recovered. What infuriated veterans however wasn?t the actual theft but that the theft went unreported for two weeks.

The news is shocking yet many veterans groups are not surprised. They point to Congress? Computer Security Report Card which year after year has given the VA a failing grade. Government auditors also warned of possible security breaches at the agency. Through all of this the VA took no action.

VA Secretary Jim Nicholson?s recent proposal of free credit monitoring for veterans up to one year was shot down by the Bush Administration. According to the Washington Post the decision is based on the opinion of the FBI which stated it had a "high degree of confidence" that thieves had not accessed the files containing the names, Social Security numbers and birth dates of millions of veterans and active-duty military personnel. Hopefully they?re right but for many veterans its now a time of wait and see.

Veterans can however request a credit freeze. Yes it stops the victim from easily opening a new account but a credit freeze is the most effective weapon against identity theft. Checking your account every other day isn?t a bad idea either. For further information and assistance veterans can call 1-800-333-4636 (1-800-FED-INFO).

Peggy Foster, a veteran and VA services asst at the University of Colorado-Boulder, told the Colorado Daily,? It happened to me before and everything was stolen. Now I?m very cautious about giving my information out.?

?The government bombards us with so much in the military. It?s important when you?re a veteran to pay more attention.?

With the glut of information in our 24 /7 world, Ms Foster?s advice applies not only to military personnel but the rest of us as well.

Daryl Campbell?s website http://fightidtheft.winthemarket.com provides free tips,resources, featured articles from experts and up to the minute news concerning identity theft and fraud.

Labels: , , , , ,

Saturday, May 9, 2009

Identity Theft: Phishing In Dangerous Water

Have you received one yet? You know. The email directing you to visit a familiar website where for some odd reason you?re being asked to update your personal information? The website asks you to verify your passwords, credit card numbers, social security number, or even your bank account. You recognize the company name as one that you?ve done business with in the past, so you click on the ?take me there? link and proceed to provide all the information they?ve requested. No problem right? Except you find out much later that the website is a fraud. It was created for one reason: to steal your personal information. Welcome to the world of phishing.

Phishing (pronounced as ?fishing?) means to send an email to a recipient falsely claiming to have an established, legitimate business. By fooling the recipient into giving their private information, the phisher has in effect stolen their identity.

It?s not easy to spot an email phishing for information. At first glance, the email may look like it is from a legitimate company. The "From" field of the e-mail may have the .com address of the company mentioned in the e-mail. The clickable link even appears to take you to the company's website, but in fact, it is a fake website built to replicate the legitimate site.

Many of these people are professional criminals that have spent considerable time in creating emails that look authentic. Users need to review all emails requesting personal information carefully. When reviewing your email remember that the "From Field" can be easily changed by the sender. While it may look like it?s coming from a company you do business with, looks can be deceiving. Keep in mind that phishers will go all out in trying to make their emails look as legitimate as possible. They will even copy logos or images from the official site to use in their emails. They also like to include a clickable link which the recipient can follow to conveniently ?update? their information.

How do you check to see if the link is authentic? Point at the link with your mouse, and then look in the bottom left hand screen of your computer. The actual website address to which you are being directed will show up for you to view. This is a fast and easy way to check if you are being directed to a legitimate site.

Also never and I mean NEVER click the links within the text of the e-mail. Delete the e-mail immediately and empty the trash box in all of your e-mail accounts as well. If you are truly concerned that you are missing an important notice regarding one of your accounts, then type the full URL address of the website into your browser. That way you can be confident that you are being directed to the true and legitimate website.

Phishing is a major weapon of choice for online identity thieves. Don?t get hooked.


Daryl Campbell?s website http://fightidtheft.winthemarket.com provides free tips,resources, featured articles from experts and up to the minute news concerning identity theft and fraud.

Labels: , , , , ,

Thursday, April 23, 2009

Protecting Your Social Security Number From Identity Theft

Any victim can tell you identity theft is no laughing matter. The hoops you may have to crawl through for weeks or even years to come, in trying to straighten out your life, can elicit far more tears than laughter. These tears would be most certainly tears of frustration as you do anything and everything to reinstate your good name and most probably your good credit.

Those of you who have no identity theft insurance, which means most of you, will spend at least a part of your day notifying businesses and agencies, credit reporting entities and credit card companies. You will write letters that will need to be notarized, claiming you are indeed the unwitting victim and not the architect of some nefarious plot to ruin your own reputation. Meanwhile, until the matter is cleared, you may suffer mightily as your credit score plummets and bills come due. Bills for things you never purchased.. This translates into being denied credit for products and services you really want or paying higher, penalty interest rates for having such lousy credit.

Identity theft begins with nine little numbers. These nine numbers can mean the world to you. They are the nine digits comprising your Social Security Number, and they are as vulnerable to corruption as a politician at a lobbyist convention. Chances are your Social Security has been disseminated, accidentally or for a job. You probably have it in your wallet and on your computer. It may be crumpled up in your trash can; along with the other papers you didn?t bother shredding. With your Social Security Number and your date of birth safely in hand, an identity thief is off to the races.

These are but a few ways thieves gain access to your Social Security Number. There are even creepier ways, including Internet and database hacking. Then there is your new found lover, the Mr. or Miss Possible you met somewhere or even online. This is the person you dated, brought home and after you fell asleep they went roaming your house, rifled your desk or purse, or rummage your computer for your most intimate files. Doesn?t happen? When you discover to your chagrin someone took out a credit card with your name but at a different address, you?ll know the answer.

To an even greater extreme, your Social Security, accompanied by your date of birth can enable an identity thief to not only acquire credit in your name, but maybe a passport, which can used by or sold to some of our more unsavory members of this planet. While there is an adage that there is no such thing as bad publicity, it?s questionable whether there is anything positive about having your identity associated with a terrorist who just made the headlines on CNN.

Losing your identity to someone else will not only damage your credit and create all sorts of legal troubles. You can face psychological difficulties as well. Besides the task at hand to make your life whole once again, you will feel violated and abused. After all, our very identity is based on?well?our identity, and if some louse has usurped it for his own purposes, then it is understandable that until you repair the damages you feel you have lost at least a little piece of yourself. Identity theft is also embarrassing, because it will become incumbent upon you to explain to everyone that matters why your life has been rendered upside down.

Perhaps the worst part about identity theft is it may be quite awhile before you realize how much damage has been done. If someone applied for credit or ordered credit cards in your name but at a different address, months can pass before you are located and notified of your lapses by either the credit service or the collection agency they send after you. It is a rude awakening the day you get that first call and throughout the day begin to wonder what other shoes may begin to drop. More often than not, if someone secured credit in your name, they will secure more, running the limit in many cases. From that day on you are facing the grim ordeal of cleaning up the mess.

Not all identity theft will relate directly to credit acquisition and unlawful purchases. In Border States especially but no exclusively you may find undocumented workers have somehow come upon your social security number. Perhaps, again, you neglected to shred the sensitive information you dumped into your trashcan. Perhaps he bought it from one of hundreds of peddlers who sell phony documents and someone else?s Social Security Numbers to undocumented workers questing increasingly to appear like legitimate immigrants.

In any event, you Social Security Number is not only used by that one undocumented worker. Chances are he has handed it out to his twelve best friends and family members. You don?t believe me? A woman called me recently to inquire as to why different names appeared on a Social Security Trace she ordered as part of a background check. It seemed odd to her that strange names would be appearing along with her employment candidate on the same document. As a favor, I ran her Social Security Number, and to her considerable chagrin, there was a male name attached to her number as well.

Can this be a problem? Often it is fairly benign and nothing comes of it. But then problems can arise, depending on your new bedfellow?s general behavior and whether he or she attempts to either get credit using your Social Security Number, or whether he or she is suddenly identified as part of a drug cartel or stolen car ring. These things do happen, and they happen when you need it least and least expect it. With the world growing increasingly crazy, what with terrorists and miscreants of every stripe the last thing you need is to be the target of a federal manhunt.

All right, so some of this I may have exaggerated. But not by as much as you think. So, how do you protect against it? Do you call the Social Security Administration? Go ahead, and see what happens there. If it wasn?t so pathetic and frustrating it may even be funny. They can?t do much, they will probably tell you. They are understaffed and overmatched and inundated all at the same time.

So what do you do? First get identity theft insurance. It may not protect you, actually, but most policies will notify you when there is suspected abuse of your credit cards and presumably good name. Credit Card Insurance provides services will assist you in repairing the damage done to your credit and reputation. The insurance will also be helpful in shortening the time and effort involved in making everything whole again. There are numerous policies, many given by credit card companies. I would suggest you shop around.

Run a credit check on yourself on a regular basis. Don?t access just one credit card service, but run all three major reporting companies. They are Experian, Trans Union, and Equifax. There are deals all over the Internet where you can run all three credit services for a total of $25. It is best to run it at least every six to eight months. Monitoring your credit scores on all three services is money well spent.

Finally, we get down to the cheapest and often the best preemptive defense against identity theft, that is besides doing all the foolish things that were mentioned in the earlier paragraphs. Run your own Social Security Trace. There are a variety of reputable companies that should be willing to run your number. Some may require a consent form, verifying you are who you really say you are. This only assists you in protecting your identity, so I would never let that be an obstacle.

When you run your Social Security Trace you will be able to ascertain what names are attached to your number. Sometimes, due to mixed financial efforts, you might your spouse attached, and that is seldom worth concern. It is the strange name or, in some cases, strange names that should cause some alarm. As I noted earlier, this could be undocumented workers who usurped your Social Security Number to appear as a legal worker. Or, worse case scenario, it could be someone out to use your name for their own personal gain.

Once you know that someone has stolen your number, you can notify the appropriate credit services and authorities that there may well be an interloper. You can request they screen any purchases on you accounts and notify you when there are transactions in other cities. Identity Theft insurance will help with that. You can notify the legal authorities, and maybe they will help you track it down. In any event, the faster you become aware that someone has stolen your identity the greater the chance you will minimize the damage.

Finally, there is no reason to live your life with a siege mentality. It is wise to remain aware and to be sentient, especially with regard to who may have stolen your identity. Remember, credit is great but don?t abuse it. Most importantly don?t allow someone else to abuse it for you.

You have only one name. Keep it to yourself.

Labels: , , ,

Tuesday, April 14, 2009

Identity Theft: It Won't Happen To Me

"I got bad credit, I'm not worried"

"It happened to a friend of a friend"

"I've got other priorities now"

"All it takes is guarding your Social Security number"

"I can trust the people around me"

These quotes are all too common regarding identity theft. The problem is the Federal Trade Commission, various law enforcement agencies and identity theft experts have stated there are no 100% guarantees and the numbers for identity theft keep getting worse

"I got bad credit so I'm not worried"

Just recently KFLY TV in Lafayette Louisiana reported that 2 men were arrested for stealing the identity of 2500 people. Identity thieves don't run credit checks before they steal your identity.All they need to do damage is a little bit of your personal information.

"It happened to a friend of a friend"

This one should really alert people. The reason ? Everybody now knows somebody that's been victimized. That alone tells you what an epidemic identity theft has become. Last year 10 million people had their identities stolen. Many experts think that number will double this year. They also fear the 10 million figure is too low. Why? Many victims don't report the crime.

"I've got other priorities now"

Once your identity is stolen there is only one priority: Getting it back. On average it can take 175 hours and out of pocket expenses totaling 15,000 dollars according to the FTC.

"All it takes is guarding your Social Security number"

In February of this year Bank of America announced that 1.2 million federal employee credit card accounts may have been exposed to identity theft. Last year, Visa and MasterCard announced that 40 million cardholders maybe at risk when the database of their third party processor was broken into. Many of these people no doubt guarded their Social Security number faithfully but thru no fault of their own they're at risk.

"I can trust the people around me"

This one hits home and may hurts the worst. 50% of all identity thieves are known by the victim. Family members, friends and neighbors do more damage than total strangers.

There are other reasons people give. Yes it may never happen to you but identity theft is now a full blown epidemic that affects everyone.

Labels: , , , ,

Phishing Scams, A Growing Identity Theft Menace


There is no doubt that identity theft is a growing problem and we should all try to educate ourselves to avoid being a victim of this often devastating crime. It seems that criminals are using increasingly ingenious methods to gain access to our private and valuable personal information and computer users must be aware of criminal information gathering techniques known as phishing.

You may have heard about phishing scams in the news recently because so many have fallen prey to this clever methodology employed by tech savvy criminals. We are all busy in today's fast paced world and it's hard to keep up with every new threat and development so the purpose of this article is to describe what phishing is, and how you can avoid being a victim.

Phishing attacks employ strategies of social engineering and technical subterfuge in the attempt to obtain an individual's personal identity data and financial account information. Social-engineering schemes use fraudulent e-mails which attempt to direct consumers to counterfeit websites, often perfectly replicating legitimate business sites to trick recipients into releasing financial data such as credit card numbers, account passwords, user names and social security numbers. Using recognizable company names of banks, online retailers and credit card companies, phishers are often able to secure this private data. Technical subterfuge schemes usually plant spyware and crimeware onto user computers to access personal data directly, most often utlizing Trojan keylogger spyware.

What can we do to avoid such clever deceptions? First of all just knowing that the threat exists is very important and many individuals report that they had never heard of phishing before becoming a victim. In addition there are several practical precautions we can all take to minimize our exposure to risk.

1. Be wary of any email containing urgent requests for financial information suggesting your immediate response is required, statements designed to upset and excite the respondent are often included to elicit a quick reply. These emails often demand user names and passwords as well as SSN's. Legitimate businesses never ask for confidential data via email and none of this information should ever be sent by email as security is severely compromised.

2. If you question the authenticity of an email don't use the links embedded in the email to access the company webpage, instead type the URL of the company in your browser to insure you are looking at the legitimate website. You can also phone the company to insure an email request is authentic and companies today are aware of phishing threats and will generally appreciate being informed of a potential problem.

3. Financial information should only be communicated through a secure website or by telephone and never by an email request. Secure websites always have https:// preceding the web address rather than just http:// in the browser address window.

4. Check your online accounts on a regular basis even if you have no transactions, dormant and little used accounts are common targets for online predators. Carefully review your credit card statements for unauthorized transactions and make sure you shred them if not retained for your records.

5. Make sure your browser is updated regularly with the latest security patches and you should also have an anti-spyware program installed and running at all times.

Take these necessary precautions to avoid your exposure to the identity theft problem known as phishing.

Jim Hutton researches and writes on the subject of identity theft and you can view the entire Identity Theft Article Library at:

Identity Theft Prevention

Labels: , , , ,

Thursday, April 2, 2009

Identity Theft Awareness - Getting to Know This crime


Identity theft is on the rise. The starting point in the fight against identity theft is prevention. Major corporations are just starting to incorporate identity theft awareness into their overall security awareness programs to educate their employees, clients and vendors on the minimum security measures that must be and are expected to be taken. Like I always say, it is your information and only you can initiate the efforts and take the steps to protect them. Whether you are an individual concerned with the security and privacy of your own personal information or that of your family, or, a company concerned with the personal information of your clients and employees, you must have identity theft awareness and take the steps to educate yourself first, and then others who also handle your information. This could include your kids, your accountant, attorney, vendor, and a bunch of others.

Contrary to all beliefs, the information security and protection business is not an old profession. Information privacy is even in its infancy in my opinion. Take a look around; social security numbers are floating around every where from the doctor's office to the internet like they're piece of worthless junk, while the same social security numbers are heavily relied on to identify us. Businesses ask for our social security numbers, names, phone numbers, addresses, zip codes (interestingly enough, zip codes are used to validate our identity and ownership of the credit card we use at the gas pump), and other piece of information in public and expect us to respond back with the information while surrounded by other people.

Do we really believe that identity theft can be fought while we continue to treat and handle our personal and most valuable information in such manners? One of the information security principles is that, all information is not born equally. As a society, we need to determine what information is critical to us, and apply more stringent security measures to protect them.

If we rely on social security numbers as a main source of identity validation, then we must treat it differently than our home phone numbers. I have further described this philosophy in my identity protection system, KAOS?.

In a lot of the identity theft cases, the responsibility is shifted to the consumers for the time being. Besides a few laws that make identity theft a crime, or limit the credit card liability to $50 if discovered and reported timely, consumers are left in the dark. For one thing, they don't know what piece of their personal information is really important and how to protect them; second, if they get hit with identity theft, they are on their own and at the mercy of the financial institutions to solve their problem, the same institutions that are not held responsible for luring consumers into buying their products or falsely handing money to thieves who claimed to be you. People are lured into getting a bunch of credit cards or other credit accounts, forced to reveal their personal information in public, or enticed to apply for multiple mortgages or Home Equity Line of Credits (or HELOC) and left alone when hit with identity theft because businesses who lured the consumers into sharing their personal information with them in the first place, did not tell them that there is an increased and proportional risk with the number of times they share their information with others, or won't take responsibility when the crime occurs.

It all starts with identity theft awareness. Be aware of what's at stake, what needs to be protected, why and how. Take responsibility in case no one else does. Educate your family and friends about the risks of identity theft. Inquire and monitor the security practices of those whom you share your information with. Businesses are forced to share their privacy policies with you. Read them carefully and don't do business with those who do not make you comfortable with the way they intend to protect and share the information you entrust them with. Please visit www.identity-theft-awareness.com for free identity theft solutions.

Henry Bagdasarian is a certified information security, privacy and audit expert with many years of experience with major international companies. Nominated for Security Executive of The Year Award (2006). Created the identity protection and theft prevention KAOS system available free of charge on his identity theft web site, www.identity-theft-awareness.com.

Labels: , , , ,

Wednesday, March 25, 2009

How To Protect Yourself From Online Identity Theft


Even though it's becoming much harder to steal an identity online, it's critical that you do everything you can to protect yourself from online identity theft. It only has to happen once to totally turn your whole life upside down.

With the new Internet security measures, it's becoming harder to steal an identity. But just one instance of identity theft can wreak havoc on your life as well as your finances. The more you understand how a criminal steals an identity, the better chance you have to protect yourself from online identity theft.

If a crook can get a name, age, sex, mailing address, Social Security number, and driver license number, they can take over an identity to buy products, charge on credit cards and even draw money from bank accounts.

There are a few ways you can reduce your risk and protect yourself from online identity theft by following these identity theft protection tips:

Keep all of your passwords as private as possible. No bank or financial institution will ever email you asking you to log into your account to verify your password with links in the email. This is an online scam that you should be conscious of so you won't become fair game.

Also, you should never store your passwords, Social Security number or account PIN numbers in your computer. If your computer gets a spyware virus the hacker has everything he needs to take over your identity and take all of your money.

Another way to protect yourself from online identity theft is don't use the same password on all of your online accounts. Can you imagine how fast a criminal can wipe you out financially with a password that works on every single account?

Identity theft protection is a very necessary part of any transaction on the Internet. Before you make any purchase online, make certain that the web site you are giving your credit card data to has a secure server.

This is one of the easiest ways to shield yourself from online identity theft. Secure pages begin with https instead of http, and a picture of a small gold lock is displayed in the lower right part of your screen.

To verify the name of the server that appears on the digital certificate, double-click the lock icon, and then check the name that appears next to "Issued to". If the name appearing next to "Issued to" is different from the name of the web site that you are giving your credit card number to, close your browser and leave the site.

In one moment, what took you years to establish financially, could all be wiped out turning your life completely upside down. Common sense and identity theft protection awareness goes a long way in determining if you will become a victim or escape this horrible crime. However basic these tips seem, they do work and offer you a chance to protect yourself from online identity theft.

Copyright ? 2006 Spyware-Information.com All Rights Reserved.

Spyware-Information.com offers you spyware removal, free spyware cleaners, downloads, anti spam software, valuable tips and regularly updated spyware and identity theft articles.

Labels: , , , ,