Online Identity Theft Protection



             


Thursday, February 5, 2009

Identity Theft: Dont Be The Next Victim


This article which you are about to read has been written because I have been a victim of Identity Theft and I know what huge problems this creates, not to mention the severe losses involved. If I can help just one person avoid this I will be happy.

We have all at one time or another received an email directing us to visit a familiar website where we are being asked to update our personal information. The website needs you to verify or update your passwords, credit card numbers, social security number, or even your bank account number.

You recognize the business name as one that you have conducted business with in the past. So, you click on the convenient take me there link and proceed to provide all the information they have requested. Unfortunately, you find out much later that the website is bogus. It was created with the sole intent to steal your personal information. You, my friend, have just been phished.

Phishing (pronounced as fishing) is defined as the act of sending an email to a recipient falsely claiming to have an established, legitimate business. The intent of the phisher is to scam the recipient into surrendering their private information, and ultimately steal your identity.

It is not as easy as you think to spot an email phishing for information. At first glance, the email may look like it is from a legitimate company. The From field of the e-mail may have the .com address of the company mentioned in the e-mail. The clickable link even appears to take you to the companys website, when in fact, it is a fake website built to replicate the legitimate site.

Many of these people are professional criminals. They have spent a lot of time in creating emails that look authentic. Users need to review all emails requesting personal information carefully. When reviewing your email remember that the From Field can be easily changed by the sender. While it may look like it is coming from a .com you do business with, looks can be deceiving.

Now before you read any further I just want to jump in here and say that I really do hope that you will find this information helpful. I am not trying to frighten you in any way, just make you aware of what is going on out there. So, having said that, lets continue.

Also keep in mind that the phisher will go all out in trying to make their email look as legitimate as possible. They will even copy logos or images from the official site to use in their emails. Finally, they like to include a clickable link that the recipient can follow to conveniently update their information. A great way to check the legitimacy of the link is to point at the link with your mouse. Then, look in the bottom left hand screen of your computer. The actual website address to which you are being directed will show up for you to view. It is a very quick and easy way to check if you are being directed to a legitimate site.

Finally, follow the golden rule. Never, ever, click the links within the text of the e-mail, and always delete the e-mail immediately. Once you have deleted the e-mail, empty the trash box in your e-mail accounts as well.

If you are truly concerned that you are missing an important notice regarding one of your accounts, then type the full URL address of the website into your browser. At least then you can be confident that you are, in fact, being directed to the true and legitimate website.

Let me conclude by saying that this article is just by way of introduction to the subject, there is a lot of information available both in your local bookstore, on the internet, and indeed in my blog, so happy researching.

john savage has a Blog which you should read if you cannot afford to be hacked, cracked, or impersonated. Click Here to visit

Labels: , , ,

Wednesday, May 7, 2008

Phishing Email Identity Theft Alert


Phishing mails are similar to Spam Mails; however, the modus operandi is different all together. The similarity is that Spam and Phishing Mails are both annoying and hold potential threats of stealing identities. The characteristics of the mails are what separate Phishing and Spam mails.

Phishing is fraudulent mail that attempts to swindle identities, by gaining confidence of the receiver. The "Department of Justice" has put up alerts on such mails that inform the consumers to pay attention to the mails. The mails are sent to nearly every email box in the world, and the soul purpose is to steal. The emails may include luring information however; the information is fraudulent and should be ignored. The sender wants the receivers to respond to the mails and may include links to click where the receiver will provide his/her personal or confidential information. The mail may have information that upsets the reader, thus it is another type of strategy, which the sender utilizes to force the receiver to respond.

The mail may state "your account is being suspended," or it may claim "you have won x amount of cash, please respond now.'

Knowing which company is legit is important and learning how they make offers to consumers is just as important to help you avoid identity theft. Companies that claim you have won prizes will not ask for extensive information, rather they only ask for minimal information. Thus, when you receive Phishing Mails or Spam Mails the sender already has a degree of information on you from random selections, and when you answer the mails, you are only giving the sender the information he/she needs to claim your identity.

Always know your credit card lenders phone numbers and bank numbers, thus when you receive one of these mails call the company immediately at the original phone number and ask if they have sent you mail. Personally, I delete any mail that comes to my box, regardless of who the sender is, unless I know it is from my business or school. As a student, most of my work is done online, thus this too opens doors for perpetrators, since payments to the school are often required at the school. However, I disregard any commands to send payments online and send my payments through postal mail. Still, this is scary.

In the UK, a friend informed me that postal workers are stealing identities and selling the information to thieves so that they can stay in England. I do not know the level of truth in this allegation at this point; however, anything is possible when it comes to identity theft. I am ready to instruct anyone paying bills to pay a low cost for Money Orders and submit your bill payments, since your check has enough information available that anyone can gain control of your accounts.

Thieves come in all forms, including postal workers, utility clerks, court clerks, judges, lawyers, doctors, mothers, fathers, spouses, et cetera. Likewise, victims come in the same form.

Few samples of Phishing Mails include information such as "Closed Account." The email address may appear to come from genuine banks. Recently, phishing mails came from "FDIC" claiming that the account holder's 'account has been frozen." The receiver was asked to click on the link provided in the body of the email and provide pertinent information now. Thus, the email continued to threaten the emotions of the receiver by claiming that the head nacho man has instructed the bank to discontinue any activity by you, under a particular Act.

Few Phishing Mails request the receiver to download attachments with claims to store "Internet Billing Notice" and once the receiver downloads, they find them self in a whirl of problems, since Viruses, Trojans, or other nasty contaminates are attached to the mail. The contaminate in turn redirects to the receivers "email contact list."

EBay is another area where perpetrators frequent and have even put forth the effort to steal identities or gain from the auction provider's clientele. The Internet unfortunately, is the single most dangerous area where identity thieves frequent. Therefore, protect your self by learning more about identity theft and how to protect your self from the crime that is claiming millions of identities each year.

Tony Robinson is an International Author, Webmaster and Security Guru. Check out his Identity Theft Protection Tips at http://www.officialidentitytheft.com/

Labels: , , , , ,

Friday, March 28, 2008

Reviews of Identity Theft

Abroad the Internet is countless of stories directly from victims harmed from identity theft. Millions of other stories are never told. After hearing, one review I learnt that what I have said all along is proving truer than ever and that is the law works for the perpetrators of crimes and work against the victims. One review peeked my interest when the person stated "Laws are not only there to give" the thieves "more power" while weakening the victim, the law is also protecting the thieves more so than they will protect the victims. Thus, during Criminal Law Studies and from experience, including frequent visits to the courtrooms, I notice that the criminals had more rights and protection than most victims did.

One review was disturbing, since the persons Mortgage lender gave out personal information unauthorized, thus the person suffered anguish and had no idea what steps to take to protect them self. Most times the law will work overtime if a person has a 'high-profile' to find the perpetrator, however if a person does not have upper class respect in society the law often slacks in their efforts to apprehend the predator. This is silly on their part, since the thief has the ability to steal their identity possibly, thus they are only slacking, making room for the criminal to gain control of another identity. Thus, who is the blame for identity theft...I promise you it is not the victims,' in most instances, rather it is the financial processing machines and technical makers, the law, technology enhancement providers, but mostly the blame is on the thief him self.

I am not here to promote anyone's business; however, I found a source throughout my history that proved valuable overtime. Thus, the service costs $25 per month, or at least it did and this service will connect you with lawyers in your area that can help you out if you fall victim of identity theft. Pre-Paid Legal Aid offers services and recently has opened up new services to help people fight identity theft. If you are a victim, it might be worth looking into. From first hand experience the service works fast and sufficient, unfortunately, the areas I live in, most lawyers are not worth mentioning. Countless of people in this area have complained regarding various lawyers, thus never think that a lawyer will work for you to get your identity cleared. Always assume... (This is what creditors and millions of others do worldwide) give the world a dose of their own medicine that the lawyer is not your best friend.

When a person becomes victim of identity theft, the whole world will seem like your enemy. You may feel that you can trust no one; however, someone if you have the needle is buried in the haystack that has a shred of humane left in this system. Therefore, you should never stop fighting for your life back if someone has stolen your identity.

It is important to put on the 'suit of armor' and protect your self with all your might. Putting on the suit of armor means, you are willing to walk the extra mile to get back what is rightfully yours. If the authorities or other qualified sources to fight identity theft do not listen, use your assertive tools to make them listen to what you have to say. NEVER become violent or aggressive when fighting for your identity, since people reject this reaction.

If no one listens, write letters to your state reps, governor, President, and other political leaders letting them know what you have done, what you are going through and what results you are getting.

I reported my local police department and then talked to the chief of police. He told me, "always start at the bottom in the department and work to the top before contacting state reps.: I told him, "I start at the top and then work down to you." I got results immediately.

Therefore, forget what people tell you when they are working for a company where you are filing a complaint, if that person is telling you there is nothing they can do to help, or we will get back to you. Do NOT accept that response; rather tell them politely and assertively that you want to speak with someone over their heads.

Tony Robinson is an International Author, Webmaster and Security Guru. Check out his Identity Theft Protection Tips at http://www.officialidentitytheft.com/

Labels: , , , ,

Thursday, March 27, 2008

The Federal Trade Commission Identity Theft Clearinghouse and its Steps to Prevent THEFT

The Federal Trade Commission Identity Theft Clearinghouse is the second step when you become a victim of identity theft to report the crime. When you report identity theft to the Federal Trade Commission Identity Theft Clearinghouse, the services will contact various contacts, including the law, investigators, particular "consumer reporting companies," lawyers and so forth in an effort to help you through the crime.

Once you report to the right authorities that you have become victim of identity theft, police department worldwide will have this knowledge. Next, you will need to report the theft to TransUnion, Experian, and Equifax and request and dispute any unauthorized debts, including bankruptcies.

It depends on the state in which you live, but few states offer the option of placing a FREEZE on your credit reports, which supposedly prohibits access to anyone but you and the bureaus. You will be provided a PIN number, which you can remove temporary to allow viewing of your reports in the event you are applying for a job or credit.

Victims of identity theft should be aware that any debts incurred on their reports come from creditors, or public records. When a person is sued, files bankruptcy, files for divorce, or judgments and tax liens are filed against, thus the information is public.

One of the cruelest laws is that the media can report crimes committed by a person, including placing the persons address in the papers. This is a surefire failure in the system that opens up the advantage for perpetrators of identity theft, and even predators to take control of a person's life. Thus, placing your social security number, home address, phone number and other information on credit reports where anyone can gain access is another failure in the system that opens the door for identity theft.

Thus, when a person is victimized by identity theft and the perpetrator commits an act that enforces tax liens, bankruptcies and delinquencies the information goes on the credit report. It is up to the victim to dispute the charges, however, even if the victim succeeds the information may stay on the credit reports for seven, ten, or fifteen years. Many people believe that debts stay on credit reports up to three years, however, Experian clearly states on its letters that debts linger on reports for 'seven years," while 'bankruptcies" remain on the reports for 'ten years,' and "tax liens" stay on the reports for fifteen 'years.'

When you dispute a charge on your credit report and after the investigation it is found you are telling the truth, thus the credit bureaus will place deleted behind the charge. To dispute any charges you must contact the credit bureaus dispute service by calling or going online and visit the credit bureaus sites. Keep all letters where a dispute was filed on records. If the companies accusing you of the debt, after a dispute is made cannot show proof that you incurred the debt, thus the credit bureaus will include "dismiss" or "deleted" behind the charge.

Thus, under the Fair Credit Reporting Act (FCRA) laws you have the right to sue anyone causing damage to you, by giving out, selling, or leasing your information, you may sue him or her in federal or state courts. Therefore, learn your rights, since companies will sell, rent, lease, or give out your information to others in some instances.

It is against the law for any company willfully given out information to others without the consent of the individual. Thus, under law the person can be sued, fined and tossed in jail, or both. For example, if a company sells, leases, rents, or gives your information out to someone else and you become victim of identity theft by reason of this action, you have the legal right to file charges and sue the company.

Finally, the steps to reporting identity theft include: Filing a report with the police, Federal Trade Commission Identity Theft Clearinghouse and notifying the credit bureaus. You will also need to contact the Department of Motor Vehicles, as well as the Social Security Administration. For more information on identity theft, read and learn.

Tony Robinson is an International Author, Webmaster and Security Guru. Check out his Identity Theft Protection Tips at http://www.officialidentitytheft.com/

Labels: , , , , ,

Wednesday, March 19, 2008

Some Tips For Preventing Identity Theft

These days it is becoming increasingly common to see people suffering from identity theft. It has become a huge business for thieves and con artists all over the world.

If it has never happened to you, trust me you don't want it to. These people who specialize in stealing identities can run up charges on your credit cards, empty your bank accounts, sell off investment portfolios and have the funds transferred to offshore accounts, and ruin your credit almost overnight.

So, how do you protect yourself from this new crime threat? I have gathered a few tips for you that will give you a good start to guarding against identity theft.

One of the easiest things that one can do to help prevent identity theft from people going through your garbage is to buy a cross-cut type shredder. Shred all your important papers and especially pre-approved credit applications received in your name and other financial information that provides access to your private information. Don't forget to shred your credit card receipts as well. These shredders can be bought now for under $50.

Be careful at ATM's and using Phone Cards. "Shoulder Surfers" can get your "Pin Number" and get access to your accounts. Another thing is to be careful when pulling up to an ATM and watch out for people in the area. I also suggest not going to ATM's late at night and especially if they are in remote areas just from a safety standpoint.

Get all of your checks delivered to your bank - not to your home address.

Do not put checks to pay bills in the mail from your home mailbox. Drop them off at a U.S. Mailbox or the U.S. Post Office. Mail theft is common. It's easy to change the name of the recipient on the check with an acid wash. Another thing you can do to guard against this type of theft is buy a better mailbox. There are many mailboxes now that only allow the postman to drop mail in the box and only the owner can access it. These extras steps require some time and effort on your part but they are well worth it.

When you order new credit cards in the mail, or your previous ones have expired, watch the calendar to make sure that you get the card within the appropriate time. If it is not received by a certain date, call the credit card grantor immediately and find out if the card was sent. Find out if a change of address was filed if you don't receive the card or a billing statement. Cancel all credit cards that you do not use or have not used in 6 months. Thieves use these very easily - open credit is a prime target.

By following these tips and avoiding sending personal information and checks from your home mailbox you can go a long way in preventing identity theft.

Gregg Hall is a business consultant and author for many online and offline businesses and lives in Navarre Florida with his 16 year old son. Get a secure mailbox from http://www.mailboxsuperstoreonline.com

Labels: , , , , ,

Friday, February 8, 2008

Identity Theft Protection

Protecting your personal and financial information against identity theft is something that everyone should be concerned about. Even though there is no one solution to guarantee your protection against identity theft, there are ways to minimize your risk by wisely managing your personal information.

The most important thing you can do to protect yourself from identity theft is to review your credit report as frequently as possible. You should review your credit report at least once a year. Keeping a watchful eye on your credit report will alert you to any unauthorized accounts or any possible fraudulent activity. Obtaining a copy of your credit report is easy and well worth the little amount of effort it takes to do so. There are even many companies that will provide you with a copy of your credit report for free.

Many of the companies that will provide you with a copy of your credit report free of charge can be found on the Internet. Most of these websites will also provide you with other helpful resources and information relating to protecting your identity and credit.

Other ways to keep your identity safe is to not to reveal any personal information until you find out how it will be used and whether it will be shared with others. This means never giving out personal information over the phone, through the mail, or over the Internet unless you were the one to initiate the transaction.

Putting passwords on your credit card, bank, and phone accounts is another way to protect yourself against identity theft. Avoid using easily available information like your birth date, the last four digits of your Social Security number, your phone number, or your pet's or your mother's maiden name. Sadly, an identity thief may be someone you're acquainted with, like a store clerk who would have personal knowledge of such information.

To protect yourself from having mail stolen that contains important personal or financial information, deposit your outgoing mail in post office collection boxes or at your local post office instead of leaving it in your mailbox for pick up. Promptly remove mail from your mailbox after it has been delivered. If you're planning a vacation, have your mail held at the post office.

It only takes one person to destroy another person?s credit rating. By following these simple tips you can dramatically increase the chances of protecting your identity and your credit. By keeping tabs on your credit report and playing it smart with your personal information you will keep your personal information as safe as possible.This article was written by Beth Pardue who has over 10 years of experience in the financial industry assisting clients with assorted financial needs. To learn more about credit reports and protecting your identity please visit: http://www.credit-report-credit-score.com today!

Labels: , ,

Wednesday, December 5, 2007

Identity Theft - Is The Internet A Major Factor?

 Identity theft also known as ID theft, identity fraud and ID fraud describes a type of fraud where a criminal adopts someone elses identity in order to profit illegally. It is one of the fastest growing forms of fraud in many developed countries.

In the UK identity theft is increasing at the rate of 500ach year and, according to Which Magazine, 25f the population have either suffered from identity theft or know someone who has.

In the USA, a report issued by the Better Business Bureau revealed that, in 2004, over 9 million Americans became victims of identity theft with the total sum defrauded being $52.6 billion.

With figures like this, its no surprise that there is a certain amount of concern regarding computer and internet security. After all, the internet is basically a mechanism for exchanging information and the possibility that some of the information exchanged may be more than intended is never far from many internet users minds.

Its easy to imagine criminal masterminds worldwide using the internet to hack into computers in order to gain access to information with which to advance their devilishly cunning schemes. However, as revealed in the report, the facts of the matter are a little more down to earth and the internet, far from making you more at risk to identity theft, can help to significantly cut your losses if you do fall victim this form of fraud.

According to the Better Business Bureaus research the main methods by which criminals gain access to information used for identity theft fraud are as below:

Lost or stolen wallet, chequebook or credit card. 28.8
Accessed as part of a transaction. 12.9

Accessed by friend, acquaintance or relative. 11.4
Don't know, refused, no answer. 11.1
Information accessed by corrupt employee. 8.7
Stolen paper mail or fraudulent change of address. 8.0
Obtained some other way. 7.4
Computer spyware. 5.2
Information stolen from garbage. 2.6
Computer viruses and/or hackers. 2.2
Emails sent by criminals posing as legitimate business. 1.7
* 12.9ue to transactions 10.4ffline transactions, 2.5nline transactions.

In total, when the instances where information was accessed during transactions are subdivided into online and offline transactions, only 11.6f the information used to carry out identity theft fraud was obtained from computers.

Of this more than half was obtained by the use of spyware, viruses or hacking the risk of which can be greatly reduced by installing the appropriate protection software and ensuring that this is kept up to date.

Not only did the survey reveal that the internet was not a major source of illegally obtained personal information, but it was also found that those fraud victims who checked their financial records using the internet, ATM machines or other electronic methods suffered financial losses which were, on average, 8 times lower than those of victims who used traditional paper statements to monitor their accounts. This very significant reduction was attributed to the rapid discovery of the fraud due to real time monitoring.

Of course, thats not to say that you shouldnt exercise caution when using the internet or take care to protect the personal information which you may have stored on your PC. However, as long as you install suitable virus, firewall and spyware protection, and keep this continually updated the internet can should be more of a help than a hindrance when it comes to avoiding identity fraud.

Hamish Hayward - Don't become a victim of ID theft. Get the facts. http://www.id-theft-info.com

Labels: , , , , ,