Online Identity Theft Protection



             


Wednesday, March 25, 2009

How To Protect Yourself From Online Identity Theft


Even though it's becoming much harder to steal an identity online, it's critical that you do everything you can to protect yourself from online identity theft. It only has to happen once to totally turn your whole life upside down.

With the new Internet security measures, it's becoming harder to steal an identity. But just one instance of identity theft can wreak havoc on your life as well as your finances. The more you understand how a criminal steals an identity, the better chance you have to protect yourself from online identity theft.

If a crook can get a name, age, sex, mailing address, Social Security number, and driver license number, they can take over an identity to buy products, charge on credit cards and even draw money from bank accounts.

There are a few ways you can reduce your risk and protect yourself from online identity theft by following these identity theft protection tips:

Keep all of your passwords as private as possible. No bank or financial institution will ever email you asking you to log into your account to verify your password with links in the email. This is an online scam that you should be conscious of so you won't become fair game.

Also, you should never store your passwords, Social Security number or account PIN numbers in your computer. If your computer gets a spyware virus the hacker has everything he needs to take over your identity and take all of your money.

Another way to protect yourself from online identity theft is don't use the same password on all of your online accounts. Can you imagine how fast a criminal can wipe you out financially with a password that works on every single account?

Identity theft protection is a very necessary part of any transaction on the Internet. Before you make any purchase online, make certain that the web site you are giving your credit card data to has a secure server.

This is one of the easiest ways to shield yourself from online identity theft. Secure pages begin with https instead of http, and a picture of a small gold lock is displayed in the lower right part of your screen.

To verify the name of the server that appears on the digital certificate, double-click the lock icon, and then check the name that appears next to "Issued to". If the name appearing next to "Issued to" is different from the name of the web site that you are giving your credit card number to, close your browser and leave the site.

In one moment, what took you years to establish financially, could all be wiped out turning your life completely upside down. Common sense and identity theft protection awareness goes a long way in determining if you will become a victim or escape this horrible crime. However basic these tips seem, they do work and offer you a chance to protect yourself from online identity theft.

Copyright ? 2006 Spyware-Information.com All Rights Reserved.

Spyware-Information.com offers you spyware removal, free spyware cleaners, downloads, anti spam software, valuable tips and regularly updated spyware and identity theft articles.

Labels: , , , ,

Monday, November 3, 2008

How Phone Verification Fights Identity Theft


Just like anything on Earth modern society has some kind of balance. So on one hand we have a progressive electronic community and on the other hand we have army of internet criminals whose both work and fun consists of so called identity theft.

As the main weapon of a scammer is his anonymity the main purpose of a Site Owner consists in confirmation of Users identity.

There are some methods to verify website user's identity. Confirmation by email is used when it concerns password reminder service; e-merchants use AVS checking to authorize their customers as true cardholders while processing credit cards in e-shops and so on.

But it's not enough. Passwords can be stolen through so called phishing. And Address Verification System is used in US and Canada only and moreover its scheme is rather imperfect.

There should be another solution.

And it does exist.

Telephone verification is a kind of universal method to verify user's identity. It works as follows:

A. A user enters his personal data including phone number at a certain site and presses "submit" button.

B. Phone verification system initiates a call to this number.

C. After greeting a system asks to enter pin-code that a user sees on the screen using a phone keypad.

D. A user enters pin-code and hangs up.

After a call is done system passes a merchant user's country and city by phone number area code, phone number type and matching of pin-code entered and pin-code shown on site. Some companies e.g. Proveout.com provides Geo IP research in addition to telephone verification. This allows to compare IP address data with phone number data (whether country and city identified by IP address matches the ones identified by phone area code).

It is a lot. It is surely enough to define whether a Customer is a person he seems to be - a real website user and a real cardholder.

Optionally system can ask a person to confirm his identity/order by saying something like his name or any other information that is recorded. Afterwards, such recordings can prove that a person had indeed used certain service (ordered certain goods). A Site Owner can download a wav-file with a recorded voice message of a customer at any time as it is saved on server of telephone authorization service provider.

This is telephone verification and how it works.

Where telephone verification is used

1. E-commerce. Identity theft is a serious problem for plenty of merchants. Telephone verification helps to reduce fraudulent transactions. Customer just passes the standard procedure of authorization and proves that he is a true cardholder. Recorded message with Customers voice can afterwards become a proof of ordering a good/service by a certain person.

2. Any website where registration/authorization is required. VoIP telephone verification can be used at the registration stage in order to confirm users' identity (e.g. it's of high importance at different forums, online communities, online financial services etc). Also it can be used in case a user has lost his password. Sending it to a specific email address doesn't guarantee Site Owner cannot be completely sure that password reminder procedure isn't initiated by a scammer with an idea to manage somebody's personal data. Passing telephone verification by user can prove his identity.

3. Sites with free content limiting. Very often different companies carry on advertising campaigns that permit using their online services for free for certain time (trial periods). In order to anticipate multiple signing up (which is a bad experience for a marketing report) each new registration can be verified in order to prove that use hasn't signed up before.

4. Sites offering region limiting services. In some countries it is prohibited to distribute security software to certain countries. Using telephone verification service Site Owner can be sure that his new registered user doesn't live in one of these countries. Phone number area code helps to reveal user's location. This service is even more effective when it is used together with Geo IP research.

VoIP telephone service can be used for automation of webmaster's work by programming scheduled phone calls with a request of certain info or a confirmation of certain info. E.g. you can automatically initiate a call when a new order with shipment requirement is submitted in order to confirm shipment details. In case you're an owner of an internet-catalogue you can initiate a call e.g. once a month to the members of your catalogue in order to confirm that their sites still exist with the same domain names, so to confirm their membership.

You can use VoIP telephone verification as a perfect marketing tool. For example you can supply your Clients with information concerning some changes in their maintenance by phone or automatically play them greeting messages on specific dates.

To sum it up, I'm to say that there is a great variety of variants on how VoIP telephone verification can be used in internet space. You can offer another ways according to your e-business. It gives great opportunities to communicate with your Clients without being bounded by electronic means (email, ICQ).

Alexa Foster is a specialist in web development and internet marketing. Visit http://www.lommeks.co.uk

Labels: , , , ,

Tuesday, July 22, 2008

Phishing Scams, A Growing Identity Theft Menace


There is no doubt that identity theft is a growing problem and we should all try to educate ourselves to avoid being a victim of this often devastating crime. It seems that criminals are using increasingly ingenious methods to gain access to our private and valuable personal information and computer users must be aware of criminal information gathering techniques known as phishing.

You may have heard about phishing scams in the news recently because so many have fallen prey to this clever methodology employed by tech savvy criminals. We are all busy in today's fast paced world and it's hard to keep up with every new threat and development so the purpose of this article is to describe what phishing is, and how you can avoid being a victim.

Phishing attacks employ strategies of social engineering and technical subterfuge in the attempt to obtain an individual's personal identity data and financial account information. Social-engineering schemes use fraudulent e-mails which attempt to direct consumers to counterfeit websites, often perfectly replicating legitimate business sites to trick recipients into releasing financial data such as credit card numbers, account passwords, user names and social security numbers. Using recognizable company names of banks, online retailers and credit card companies, phishers are often able to secure this private data. Technical subterfuge schemes usually plant spyware and crimeware onto user computers to access personal data directly, most often utlizing Trojan keylogger spyware.

What can we do to avoid such clever deceptions? First of all just knowing that the threat exists is very important and many individuals report that they had never heard of phishing before becoming a victim. In addition there are several practical precautions we can all take to minimize our exposure to risk.

1. Be wary of any email containing urgent requests for financial information suggesting your immediate response is required, statements designed to upset and excite the respondent are often included to elicit a quick reply. These emails often demand user names and passwords as well as SSN's. Legitimate businesses never ask for confidential data via email and none of this information should ever be sent by email as security is severely compromised.

2. If you question the authenticity of an email don't use the links embedded in the email to access the company webpage, instead type the URL of the company in your browser to insure you are looking at the legitimate website. You can also phone the company to insure an email request is authentic and companies today are aware of phishing threats and will generally appreciate being informed of a potential problem.

3. Financial information should only be communicated through a secure website or by telephone and never by an email request. Secure websites always have https:// preceding the web address rather than just http:// in the browser address window.

4. Check your online accounts on a regular basis even if you have no transactions, dormant and little used accounts are common targets for online predators. Carefully review your credit card statements for unauthorized transactions and make sure you shred them if not retained for your records.

5. Make sure your browser is updated regularly with the latest security patches and you should also have an anti-spyware program installed and running at all times.

Take these necessary precautions to avoid your exposure to the identity theft problem known as phishing.

Jim Hutton researches and writes on the subject of identity theft and you can view the entire Identity Theft Article Library at:

Identity Theft Prevention

Labels: , ,

Saturday, December 1, 2007

Identity Theft: They Got Him

His hard earned money? Gone. Creditors on his back everyday. The cops knocking on his door. His family strained to the breaking point. He didn't do anything wrong but my business partner's life got turned upside down a few years back. He became a victim of what is now the fastest growing crime in the world. Identity theft.

According to the Federal Trade Commission, since 1999 over 27 million people in the US alone became victims of this epidemic 10 million more last year. Harris Interactive, a marketing research company, reports that between 2002 and 2003 more roughly 19,178 people per day fell victim.

Your identity can be stolen in many ways. For my partner, the thief gained access to his social security number and address then applied for a series of loans in his name. When the bills came due, guess who the creditors and law enforcement held accountable?

He and his family felt the full impact. Identity theft can cripple and even destroy a person's life. The time loss trying to recover your identity as well as the out of pocket expense U.S.Treasury Secretary John Snow calls identity theft "the greatest threat to consumers and far more insidious and harmful to our national welfare than many people realize."

The internet doesn't make it any better with its almost limitless access to information but a great deal of identity theft still comes from the offline world. Wherever it comes from the goal stays the same. To get your personal information and steal what belongs to you for as long as possible.

In many cases, this can lead to the victim filing for bankruptcy or worse. As reported by the Orlando Sentinel, one man whose identity got stolen recently spent 54 days in jail before authorities realized their mistake.

Yet even when the thief finally gets caught, victims find out all too often the worse part still lies ahead. The recovery of their identity. For my partner, that meant never ending battles with the same credit bureaus that previously gave him good ratings.

They destroyed his credit almost overnight even though he did everything they told him to get it restored. The agencies refused to clear his record and instead, started sharing his information with each other. His mortgage rates went thru the roof. He paid more for everything but still got declined. With all of this came the burden and fear of him not knowing if he would ever recover his identity.

Six years later he finally did. He started working with a company that within 90 days restored his credit. His mortgage rate dropped and he went back to paying full price for everything like the rest of us.

And like my partner, all of us risk becoming victims. In San Antonio Texas, television station KENS 5 spoke with a man convicted of identity theft who warned "Don't take for granted what you have because anybody could take it away - I mean at the snap of a finger."

He would know. The ways of stealing an identity have turned this crime from nuisance to worldwide crisis.

Daryl Campbell is CEO of Campbell Marketing, L.L.C. His website, mini-sites, and articles help people to grow and protect their internet marketing business. Go to winthemarket.com now.

** Attn Ezine editors / Site owners **

Feel free to reprint this article in its entirety in your ezine or on your site so long as you leave all links in place, do not modify the content and include our resource box as listed above.

fourpreps@comcast.net

Labels: , , ,