Online Identity Theft Protection



             


Tuesday, April 14, 2009

Phishing Scams, A Growing Identity Theft Menace


There is no doubt that identity theft is a growing problem and we should all try to educate ourselves to avoid being a victim of this often devastating crime. It seems that criminals are using increasingly ingenious methods to gain access to our private and valuable personal information and computer users must be aware of criminal information gathering techniques known as phishing.

You may have heard about phishing scams in the news recently because so many have fallen prey to this clever methodology employed by tech savvy criminals. We are all busy in today's fast paced world and it's hard to keep up with every new threat and development so the purpose of this article is to describe what phishing is, and how you can avoid being a victim.

Phishing attacks employ strategies of social engineering and technical subterfuge in the attempt to obtain an individual's personal identity data and financial account information. Social-engineering schemes use fraudulent e-mails which attempt to direct consumers to counterfeit websites, often perfectly replicating legitimate business sites to trick recipients into releasing financial data such as credit card numbers, account passwords, user names and social security numbers. Using recognizable company names of banks, online retailers and credit card companies, phishers are often able to secure this private data. Technical subterfuge schemes usually plant spyware and crimeware onto user computers to access personal data directly, most often utlizing Trojan keylogger spyware.

What can we do to avoid such clever deceptions? First of all just knowing that the threat exists is very important and many individuals report that they had never heard of phishing before becoming a victim. In addition there are several practical precautions we can all take to minimize our exposure to risk.

1. Be wary of any email containing urgent requests for financial information suggesting your immediate response is required, statements designed to upset and excite the respondent are often included to elicit a quick reply. These emails often demand user names and passwords as well as SSN's. Legitimate businesses never ask for confidential data via email and none of this information should ever be sent by email as security is severely compromised.

2. If you question the authenticity of an email don't use the links embedded in the email to access the company webpage, instead type the URL of the company in your browser to insure you are looking at the legitimate website. You can also phone the company to insure an email request is authentic and companies today are aware of phishing threats and will generally appreciate being informed of a potential problem.

3. Financial information should only be communicated through a secure website or by telephone and never by an email request. Secure websites always have https:// preceding the web address rather than just http:// in the browser address window.

4. Check your online accounts on a regular basis even if you have no transactions, dormant and little used accounts are common targets for online predators. Carefully review your credit card statements for unauthorized transactions and make sure you shred them if not retained for your records.

5. Make sure your browser is updated regularly with the latest security patches and you should also have an anti-spyware program installed and running at all times.

Take these necessary precautions to avoid your exposure to the identity theft problem known as phishing.

Jim Hutton researches and writes on the subject of identity theft and you can view the entire Identity Theft Article Library at:

Identity Theft Prevention

Labels: , , , ,

Thursday, October 30, 2008

Identity Theft: Phishing In Dangerous Water

Have you received one yet? You know. The email directing you to visit a familiar website where for some odd reason you?re being asked to update your personal information? The website asks you to verify your passwords, credit card numbers, social security number, or even your bank account. You recognize the company name as one that you?ve done business with in the past, so you click on the ?take me there? link and proceed to provide all the information they?ve requested. No problem right? Except you find out much later that the website is a fraud. It was created for one reason: to steal your personal information. Welcome to the world of phishing.

Phishing (pronounced as ?fishing?) means to send an email to a recipient falsely claiming to have an established, legitimate business. By fooling the recipient into giving their private information, the phisher has in effect stolen their identity.

It?s not easy to spot an email phishing for information. At first glance, the email may look like it is from a legitimate company. The "From" field of the e-mail may have the .com address of the company mentioned in the e-mail. The clickable link even appears to take you to the company's website, but in fact, it is a fake website built to replicate the legitimate site.

Many of these people are professional criminals that have spent considerable time in creating emails that look authentic. Users need to review all emails requesting personal information carefully. When reviewing your email remember that the "From Field" can be easily changed by the sender. While it may look like it?s coming from a company you do business with, looks can be deceiving. Keep in mind that phishers will go all out in trying to make their emails look as legitimate as possible. They will even copy logos or images from the official site to use in their emails. They also like to include a clickable link which the recipient can follow to conveniently ?update? their information.

How do you check to see if the link is authentic? Point at the link with your mouse, and then look in the bottom left hand screen of your computer. The actual website address to which you are being directed will show up for you to view. This is a fast and easy way to check if you are being directed to a legitimate site.

Also never and I mean NEVER click the links within the text of the e-mail. Delete the e-mail immediately and empty the trash box in all of your e-mail accounts as well. If you are truly concerned that you are missing an important notice regarding one of your accounts, then type the full URL address of the website into your browser. That way you can be confident that you are being directed to the true and legitimate website.

Phishing is a major weapon of choice for online identity thieves. Don?t get hooked.


Daryl Campbell?s website http://fightidtheft.winthemarket.com provides free tips,resources, featured articles from experts and up to the minute news concerning identity theft and fraud.

Labels: , , ,

Saturday, July 12, 2008

The Rise Of Credit Card Identity Theft


Personal identity theft is a huge runaway business made even easier with advances in computer technology. So far as credit cards are concerned, personal identity theft is now costing card issuer billions of dollars a year. To try and recoup some of these losses, card providers and now telling their customers that if they were in any way at fault in the theft of their identity, they could be comparable and liable for at least part of these losses. So, what exactly is credit card identity theft and how can you minimize it happening to you? Credit card identity theft

In short, credit card identity theft is when someone else manages to get access to your account. This can be done in one of three ways:

* firstly, and most obviously, they steal your actual card and use this card before you have had a chance to inform the provider. * second, the copy the details from your card and use the details to either make a new card to purchase items in shops or purchase items on the Internet. As you don't believe that the card has been stolen, you are not aware that the card is being used illegally and it may not be till your card is denied that you notice something is wrong * lastly, they neither steal the card, nor the details of your card but steal your Personal Identification Number (PIN) and then use that get access to large sums of cash. This rather clever method is used by way of copying your PIN details when you use an ATM to withdraw cash on your credit card. Again, as you are unaware that anything has happened, it takes sometime for the illicit use to come to your attention.

How to protect your identity

Basically, the only 100% way to protect your identity is to only use your credit card with people you know and trust. Unfortunately, that is not a realistic solution. Some of the following safety precautions, however, should be adopted:

* when you use you credit card in a shop, never agree to let the card go out of your sight; for example, if the attendant tells you they have to make a phone call in he backroom, tell then you are going with them * if the shop you use your card in uses the old carbon-copy paper system, never allow the shop to retain the carbon-copy. Take it with you and destroy it at a later date * never use your credit card on an unsecured website. At best the website should have an encrypted safety system, without which you should give serious thought to whether you should be using the services of another site * never use your credit card to withdraw money in an ATM you have not used previously. If you really need to withdraw money on your credit card, do so at the counter using the teller and not the ATM

If you adopt these minimal safety precautions you should be on your way to protecting your identity - and be less liable for any identity theft. One final consideration, given the choice between the Internet and shop, where would you think most identity theft occurs? If you choose the Internet you could be (currently) wrong - so be careful using your credit card in shops you don't know!

Joseph Kenny writes for the Loans Store and offer more information on personal loans and other loan topics available on site.
Visit today: http://www.ukpersonalloanstore.co.uk/

Labels: , , ,

Monday, June 16, 2008

Think Twice About Identity Theft


If you think identity theft happens only to other people, think twice.

I woke up to that the reality that anyone could be a victim of identity theft when my son called and told me he was notified of suspicious activity on his credit card. He lives in California and the charges occurred in Washington, a state he had never visited before.

Identity theft happens when someone uses your personal information without your permission to commit a fraud crime. An identity thief needs only a small amount of personal information to make the crime happen. Often your first hint that your identity was stolen is when you start to get calls about overdue bills. When the calls stop that does not mean your identity has been restored. The thief may just be changing the address to where the bills are sent when he uses your credit card.

Identity theft refers to the theft of name badges, driver's licenses, social security numbers and other financial information.

If your social security number is stolen, you can place a "initial fraud alert" by calling one of the three nationwide consumer reporting companies:

Equifax: 1-800-525-6285; www.equifax.com; P.O. Box 740241, Atlanta, GA 30374-0241

Experian: 1-888-EXPERIAN (397-3742); www.experian.com; P.O. Box 2002, Allen, TX 75013

TransUnion: 1-800-680-7289; www.transunion.com; Fraud Victim Assistance Division, P.O. Box 6790, Fullerton, CA 92834-6790

If the theft involves your driver's license or other government ID, call the agency immediately to cancel the document and get a new one issued.

To help thwart identity theft use internet passwords with random letters and numbers. Using your mother's maiden name or even a pet's name is insecure.If you discover that you are an identity theft victim, call your credit card companies and cancel your credit cards immediately. Call your bank and discuss whether you should close any accounts there as well.

You can also monitor your personal credit report to spot incorrect information. Remember that fraudulent activity may not show up right away so it is good to monitor often. Here is one website where you can obtain a free credit report: https://www.annualcreditreport.com/cra/index.jsp

Keep an eye out for missing bills and be suspicious if you receive a credit card you did not apply for. Another warning sign of identity theft is denial of a new credit card you applied for or more stringent terms on a new card.

Check out the Federal Trade Commission's ID Theft website for valuable information: http://www.consumer.gov/idtheft/

Identity theft is definitely on the rise. In 2003 over 198,000 identity fraud complaints were issued. According to the latest government report in December 2005, identity theft complaints rose almost 30% to 255,000 complaints were made. In fact, identity theft complaints represented 37 percent of the 686,683 complaints filed.

Identity theft will probably never go away. Be smart and take precautions now to avoid a horrible experience in the future.

Greg Cryns is the founder of McHenry Online, http://www.mchenryonline.com , a website focused on information about McHenry County, Illinois. He is also the owner of http://www.getshredders.info where you can get information about paper shredders.

Greg Cryns is the founder of McHenry Online, http://www.mchenryonline.com , a website focused on information about McHenry County, Illinois. He is also the owner of http://www.getshredders.info where you can get information about paper shredders.

Labels: , , , ,

Wednesday, June 11, 2008

Beating Credit Card Identity Theft


Almost all property in the world can be stolen. Whether it be money in a bank, important documents, copyrights, and now even your intellectual property. Credit cards and ATMs are not spared from this situation, though these properties are protected with complicated passwords that only the owner knows. Recent news proved the world that cards cannot necessarily be stolen but the identity of the owner can.

According to some victims, they noticed that they have been paying their credit card companies more than the actual purchase they made. Troubled by the observation, the said victims extended their complaints to their credit cards companies.

The result was that, in the record of the companies the victims made transactions, not permitted by these victims. The companies later declared that the identities of the owners were stolen.

Knowing this reality, have you ever asked yourself, "How can I protect myself from these thieves?"

Well, if you have asked that question and still looking for an answer let this write-up be a help to you.

Securing your identity is never that hard. It will only cost you discipline and sense of responsibility. Mostly identity theft happens out of improper disposal of receipts and the like.

The receipt of a purchase contains almost all information pertaining to you that is essential in building your identity. Remember that every time you leave a counter you are asked to sign a piece of paper to validate your account and the transaction. Bear in mind that that signature is your identity.

Here are some suggestions of totally securing you identity over credit card thieves:

* Make a list of the products you purchased and make a draft a little of information about it. You may include the date of purchase, the price, place where you bought the product and other important data. These data are written in the receipt and therefore all you have to do is to copy it.

By doing so, you will always know the things you purchased and therefore be aware if any unauthorized purchases done when your bill comes. Aside from that, the list you made will surely help you organize your budget.

* Dispose your bills, credit cards applications, receipts and other confidential documents that contain your identity. A piece of paper with all necessary information in it will take a thief for an identity to be stolen.

If possible, do not use the shredder. You may rather burn these documents. If it does not need the document to be disposed, keep it in a protected place in your house, preferably a safe.

* Always keep an eye or keep your mails with you when falling in line at a bank. Regard them as cash.

* Improvise your mailbox in a manner that it locks by itself after your courier delivers your mail. That is to prevent thieves from stealing your mails as well

Morgan Hamilton offers expert advice and great tips regarding all aspects concerning Credit Cards. Get the information you are seeking now by visiting Credit Card Identity Theft

Labels: , , ,

Saturday, May 31, 2008

Credit Report and Identity Theft

Time to check your credit reports? Check your credit reports from the three main consumer credit reporting agencies.

A lot of people don???t understand the seriousness of taking the necessary precautions to prevent identity theft or fraudulent charges on their credit report,

The federal government passed a law that all credit reporting agencies provide one free credit report per year, per person. So it won???t cost a thing to access your credit report./
Once you receive your report, you can check for I.D. theft as well as bills that aren't yours.. So, if they have suspicious charges on their report they can take appropriate action as soon as possible.

Obtaining and carefully checking your credit report with safeguard you from identity theft .

You should obtain a credit report once a year to check for possible identity theftt and accuracy of your purchases. Your credit score will effect interest rates and even qualifying for loans, so don't be embaressed by a faulty score when obtaining a loan.

The three national credit bureaus are Equifax, TransUnion and Experian. Each produce the same numerical credit report score.

To obtain a copy of your credit report, you must provide the following in writing:
1) Full name, including any previous names
2) Current address
3) Previous address (if needed for five-year credit history)
4) Social Security number
5) Date of birth
6) Signature.




Remember, you are entitled to a free credit report once a year. Be vigilient, check for identity theft and inaccurate reporting.

Your credit report effects you in many ways, don't become an identity theft statistic.

 

Labels: , , ,

Friday, May 30, 2008

Tometa Software Releases "TrackSweeper.net" as a Countermeasure to Identity Theft and Computer Privacy Issues.


Spokane custom software development company Tometa Software has released its new software "TrackSweeper.net"; software that cleans a computer's activity log and internet history ensuring personal information stays private.

Spokane, WA April 27, 2006 - Tometa Software is set to release its version of an "internet history washer" with TrackSweeper.net, a software application which will delete temporary internet files and computer activity logs ensuring personal information and computer activity remains private.

"Most computer users don't understand the importance of keeping personal information secure on a home PC or notebook computer. The average PC holds a great deal of information that if not properly removed may cause a harmful invasion of privacy or potentially worse," said Brandon Marchand Tometa Software CEO.

Unlike the popular anti-virus and internet security available, TrackSweeper.net cleans the files on your computer that are automatically created that may contain personal and computer history information.

"TrackSweeper.net quickly eliminates unneeded system files, cashed internet files, and helps keep your computer running smoothly without the strain of unneeded files clogging it up," explains Brandon Marchand. "This eliminates potential vulnerabilities that the average computer user isn't even aware of, ensuring personal information remains secure."

TrackSweeper.net is available for download and is priced at $19.95. Bulk order discounts are available. More information about TrackSweeper.net is available at http://tometasoftware.com/products_tsnet.asp

About Tometa Software:

Tometa software is a rapidly growing, privately held next-generation custom and retail software provider based in Spokane, Washington. A company on the move, they are poised to become the leader in the increasingly sophisticated software industry. Tometa Software is a Microsoft Gold Certified Partner, an elite business partner having demonstrated the highest level of proficiency of Microsoft technologies.

Labels: , , , ,

Thursday, May 29, 2008

Identity Theft, Credit Reports, & safely disposing of computers


To say that Identity Theft has reached epidemic proportions in the UK doesn't appear to be any exaggeration on the facts which are commonly bandied about... even by totally responsible organisations.

If, as I read, 80% of Councils have reported problems... and 25% of people have been directly, or indirectly affected... then taking basic steps for your own safety should be an automatic procedure nowadays. With the advent of separate paper collections by many councils, it is easy for those who wish to obtain information to rummage through the bins or boxes, to look for personal details.

A shredder, I would say, is a basic necessity... and you can get a perfectly adequate electric strip-cut model which does up to 5 sheets of paper at a time [with paper container incorporated] for less than ?10 if you shop around. I purchased mine from Morrisons supermarket and have had it for well over two [fingers crossed] trouble free years.

If you don't possess a shredder, then at least tear off all names and addresses from your envelopes and destroy all letters, etcetera, which have your details on. I would burn, or shred and dispose of in two separate rubbish collections, all old credit, debit, or shop cards.

As well as these basic steps you will have, hopefully, found many useful tips and further information on the Identity Theft page at http://www.best-uk-electrical-appliances.com where you perhaps obtained this extra information.

Direct link to our Identity Theft info at Best UK electrical appliances

***

If you have a computer with any personal details on it, I can do no better than refer you to the helpful article below... please read and consider VERY CAREFULLY the all information included. Computers soon become out of date, or become less efficient due to many different problems. Consider what is stored on your computer... there are bound to be passwords for something or other, there are names and addresses, and perhaps personal details - even banking details - which could help a potential identity fraudster obtain access to your financial records, credit cards, or even to steal your identity.

Identity Thieves Find Treasure In Your Trash

- by Jim Edwards

(c) Jim Edwards - All Rights reserved http://www.thenetreporter.com -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Imagine this scenario...

After serving you well for three to five years, your old computer earns a well-deserved retirement.

You transfer all your old files to your new computer, delete them from the hard drive, and pack the old computer off to the trash heap, sell it, or give it away.

Sounds innocent enough until you stop to consider that you may have just given away your social security number, all your passwords, your credit card numbers, bank statements, financial records, and every other bit of sensitive data you ever maintained on that computer.

With computers getting cheaper by the day, many folks now find themselves replacing old machines with newer, faster models.

But understand one thing: just hitting the delete button to get rid of sensitive files basically rates the same as putting a bank statement in your trash can without shredding it - anybody can reach in and pull it out.

In fact, with inexpensive over-the-counter data recovery software (the kind you can buy to recover files you delete accidentally), virtually anybody can fire up your old hard drive and start pulling off data even though you "deleted" it.

This creates a veritable field day for identity thieves who comb through junk yards for old computers and attend computer shows buying up used hard drives by the dozens.

Whether selling it, giving it away, or tossing it on the junk heap, when it's time to replace your computer with a newer model, you basically have three options for permanently wiping out your data.

First Option:

Many computers come with recovery disks that will completely format the hard drive and return it to its original "factory-fresh" state. Using this approach makes a great option when you plan to give away or sell the computer.

Second Option:

Use a software program designed to erase your hard drive, or at least totally destroy your deleted files.

You can find one fr^e at www.active-disk-wiper.com that claims to completely erase your deleted files without affecting Windows or your other programs.

Third Option:

In keeping with the times, the third option requires a disclaimer.

Only attempt this with safety glasses, a flak jacket, and under close professional, adult supervision.

Unplug your computer and let it cool off.

Take off the cover and remove the hard drive.

Bash the hard drive with a hammer until it looks like a pancake!

That should render it completely resistant to any would-be identity thief armed with even the latest data recovery software.

Physical destruction of the hard drive rates about as secure as you can get in protecting your deleted files from prying eyes.

But before you take drastic action on the computer, remember that your "trash" may just represent a dream come true for someone who can't afford a new one.

Try to find a child, a student, or a struggling parent who could really use your old computer and would consider it a real blessing.

Finding the right new home for it could well change someone else's life forever.

--- Jim Edwards is a syndicated newspaper columnist (http://www.TheNetReporter.com) and is the author of several best-selling ebooks, information products and software programs. Jim also publishes the *World-Famous* www.IGottaTellYou.com Multi-Media Newsletter!

? Guaranteed Response Marketing, LLC P.O. Box 878 Lightfoot, VA 23188 -=-=-=-=-=-=-=-

This email is never sent without permission.

___________________________________________ ___________________________________________

Just as we used to have remember to be vigilant with our physical property... locking doors and windows, putting anything we value out of sight, cancelling deliveries when on holiday, using security lights... plus many more day to day precautions are automatic necessities. But NOW we ALSO have to consider our intellectual property and even our unique being.

Whatever you have created on your computer is uniquely yours, don't leave it open to abuse or theft any more than you should leave about your credit/debit cards, household bills, or any other important documents which hold your personal details.

Just two more mentions... be extremely careful when answering your home telephone, there are those who can, and will, ask you, deviously, to confirm your name and/or address... and from that they can find out all your private details, and manage to steal your identity.

Sorry, three more... don't ever fall for the lottery win or other scam which requires you to send money or details to get your 'winnings'... finally, if you are selling any big value item [like a car] don't believe that a bankers draft is necessarily safe and don't fall for the scam where you accept a signed payment which is larger than the required amount, and you are expected to give back the overpayment in cash. You will have lost the item you were selling, plus the cash... and the cheque or bankers draft will be worthless.

Take care out there!

Copy and paste the following web address to your browser to check out the full page where some of this information [plus lots more] is available online... http://www.best-uk-electrical-appliances.com/IdentityTheftandCreditReports.html

Labels: , , , ,

Wednesday, May 28, 2008

Prevent identity theft


When your personal data gets in the wrong hands, you can expect the worse. Identity theft is a huge problem that affects thousands of Americans each week. Rather than fighting to reduce the damage, you should think ahead and prevent identity theft before it costs you money, time and energy.

Of course, this means that you have to familiarize yourself with the potential dangers you are exposed to when documents containing personal information are accessed by thieves. The best way to prevent identity theft is to be aware of all your personal ID numbers, such as bank accounts, driver's license numbers, SSN, credit card numbers and so on.

Do not share or lose important documents There are many ways in which a thief can get access to your personal information. Once they have access to it they will pretend to be your legal representatives and will operate all sorts of transactions using your identity. You can however prevent identity theft by always being aware of the whereabouts of your personal information. Make sure to store all important documents in a safe and hidden spot in your home and keep on eye on them while at work. Do not share sensitive information with people that claim to be representatives from a bank or any other institution - check them out first and see if they really are who they claim to be. Being a little suspicious with anyone demanding personal information is one of your best defenses against identity theft.

Proper document disposal prevents identity theft Beware of "dumpster divers" - a name used for thieves that retrieve personal information from the garbage you throw out of your home or workplace. Try to prevent identity theft by making sure documents, envelopes, faxes and printed e-mails are disposed of properly - by using a paper shredder - nut just crumpled up and thrown in the waste basket. There are various effective paper shredder models available on the market and they will increase the security of your discarded documents. In fact, shredders are an accessory required by the new 2005 FACTA law for any business that has one or more employees.

Online identity theft techniques Spoofing tricks the user into giving the perpetrator personal information, such as credit card numbers, the social security number, diver's ID and so on. Internet identity theft is even more dangerous than regular ID theft, where the thief steals personal documents or recovers personal information from the garbage. With a stolen wallet, you are at least aware that you might become a victim of identity theft. On the other hand, the Internet identity theft schemes will leave you clueless and it might take months before you discover the theft. E-mail spoofing uses addresses and headers that make the e-mail seem like it was sent by a trusted source. IP spoofing allows thieves to get unauthorized access to a PC while link alteration redirects users to the hacker's site. Here are a few tips, recommended by the FBI, that will allow you to decrease the chances of falling a victim to Internet identity theft.

Tips on avoiding ID theft Access websites cautiously - especially if you follow a link from an e-mail. Internet identity theft is often triggered by unsolicited mail - never give out any personal information to such e-mails. Some spoofing techniques warn you that your account (e-mail, Pay Pal and any other type of account) is in danger of being terminated if you do not provide your password or other information - be aware of such schemes. Online payment is quick and easy, but always go with a trusted intermediary and payment processor. Your ISP should learn about any form of internet identity theft, which will enable them to prevent future problems. Secure sites begin with a "https" in the URL address bar. There should also be a lock symbol (icon) in the bottom part of your browser.

For a complete treadmill info portal, please visit http://www.identity-theft-facts.com

For a complete treadmill info portal, please visit {a rel="nofollow" href=" http://www.identity-theft-facts.com"} Identity theft facts

Other resources you might find interesting: Exercise Heaven Search Engine Optimization Heaven

Labels: , , , ,

Tuesday, May 27, 2008

Identity theft, a horror story


Identity theft. The most damaging of criminal acts

Mary Jones was a good friend and neighbor. She worked for her church as much as she could while being a good wife and mother to her 3 your kids. It was a Monday morning and she went out to pick up the mail as she did every day. This Monday there was a huge amount of junk mail, which she threw out. What she did not see mixed in with the junk was a bank statement.

Tuesday night the trash went out to the curb ready for pick up the next morning. She was doing the same things that all her neighbors did, nothing different. What she did not see was a shadowy figure (we will call him Joe) in the small hours of the morning working his way down the street, digging in trash bin after trash bin. A passerby would mistake Joe for a bum and not look twice, not even ask himself why a bum was in a nice area like this.

Joe stuffs bits and piece in his bag and moves on. . Next day he is sorting through his haul and discovers a bank statement belonging to Mary Jones. Gold mine, he has what he needs. Off he goes and takes the information from Mary's statement and goes to work on his computer. He files a change of address for Mary and once that comes in he has control He now orders a credit card or as many credit cards as he possibly can. Once these start to arrive he is off shopping on Mary's dime. Mary continues with her happy life with no idea that her world is about to come crashing down on her head and her families.

See, it is not only Mary who is affected here. Her Husband Bill is a successful business owner who employ's 25 of their friends and has done so for the past 8 years. The credit scores on Mary's reports start to crash as the late notices come in on bills they did not even know they had. Mary and Bill's credit reports are tied together, which is common with married couples. Now Bills score is taking a nosedive. Bill's business runs on credit and has a good record over the years. However now a supplier rejects his credit request for new supplies. The business falters and eventually gets to a point where he is on a cash only operating basis. The business and family cash flow is not huge. It has given them a good life over the years but not made them rich. Bills business is not faltering and he now has to lay off several of his friends, as he can no longer get the operating capital he needs.

After 9 months of fighting the debts and trying to pay the bills it gets to a point of no return. They can't keep going. The bills are out of control and the house is now at risk as the mortgage is 3 months behind. The bottomed out credit score will not even allow them to get an apartment. Mary has been on the phones to the banks, credit card companies and credit reporting agencies but nothing is resolving. A lawyer is out of the question. The money is gone. Their lives are in ruins. All because of a careless mistake and a criminal identity thief who could not care less. He has long since moved on and is working on many other Mary's.

A scary hypothetical story but variations of this have been the lot of many identity theft victims. Have you ever had your identity stolen or even thought about it? It is one of he most damaging crimes out there. This is due to the fact that the criminals use it to steal money from you, under your name, and destroy your credit rating and good name everywhere they can before they finally discard the identity and move onto another victim.

The end result of this is hundreds, thousands maybe tens of thousands of unauthorized purchases dollars on your credit card that you now have to pay for. The fact that you can't pay for it only increases the damage as now all the late payments go onto your credit report. The more of this that happens, the worse the end result. Many people have had their lives totally destroyed by an identity thief.

Ever tried to rent an apartment without a credit check. Ever tried to get another credit card, buy a car, buy a home, and do anything at all that involves using your credit. Good luck. You will find you have very few friends in the credit world when you have a low credit score and even less friends when your credit score is off the bottom due to 20 purchases that were made using your credit card with our your permission. Getting a bunch of 30-day late marks every month on your credit report is about as bad as it gets. Go try and rent a house or buy a car with a score like that.

Ok, now go any try and get it fixed. Call the credit bureaus and tell them your story and how it is not your fault and you have filed a police report and done all you know how to do and please will they correct the reports now and put yours back to like it was before. Believe me you will fly before they will do this for you.

It now becomes your problem totally and completely to handle this mess and you have no friends on the inside to help you. You now have no credit, can't get credit and can't do anything that requires a credit check, as you will come up looking like the criminal yourself. It does not matter that the mess was made be someone who stole your identity, it is on your report and all the talk and reasons why from your end will not recreate the financial trust you had before.

Scary stuff. This is a hypothetical situation but all to real. The following advice is excerpted from the www.socialsecurity.gov site. Identity thieves get your personal information by: Stealing wallets, purses and your mail (bank and credit card statements, pre-approved credit offers, telephone calling cards and tax information); Stealing personal information you provide to an unsecured site on the Internet, From business or personnel records at work and personal information in your home; Sorting through trash for personal data; Posing as someone who legitimately needs information about you, such as employers or landlords; or Buying personal information from "inside" sources. For example, an identity thief may pay a store employee for information about you that appears on an application for goods, services or credit. Show your card to your employer when you start a job so your records are correct. Then, put it in a safe place. DO NOT carry your card with you. If you find out that someone is using your identity you can report it to the Federal Trade Commission at www.consumer.gov/idtheft

If you think someone is using your number for work purposes, you should contact Social Security. One way to find out whether someone is using your number in order to work is to check your Social Security Statement. The Statement lists earnings posted to your Social Security record. If you find an error on your Statement, contact Social Security right away. What if I think someone is using my number and creating credit problems for me? If someone used your Social Security number to get credit, Social Security cannot fix your credit record. To fix your credit record: Call the creditors who approved the credit (follow up with a letter). File a police report. Contact the fraud department of the major credit bureaus. Ask: To have a flag placed on your record, requiring creditors to contact you before approving additional credit using your name and number; How long your account will be flagged and how you can extend the flag, if necessary; and To have a statement added to your credit report--include your name, explain the problem and provide a telephone number where someone can call you. Request a copy of your credit report from each major credit bureau and check to see if it contains any entries you do not know about. If you are denied credit, you may be entitled to a free copy of your report. The major credit reporting agencies are: www.equifax.com www.experian.com www.tuc.com

Contact Social Security in addition to using their website, you can call toll-free at 1-800-772-1213. If you are deaf or hard of hearing, you may call our TTY number, 1-800-325-0778.

As a final note if you have stolen or lost valuables please click this link to http://www.osldb.com to place the data in a very secure web site and this will allow others to help you find them.

CTW Inc is the owner of the http://www.officialstolenlost.com web site. The company founders have done red carpet security for celebrity events, movie premiers, large concerts, general event security & personal celebrity security. We have extensive experience with private investigations with the legal profession. Personal and home security have become our specialty. Free articles at http://www.osldb.com

Labels: , , ,

Saturday, May 24, 2008

Identity Theft - Are you Vulnerable?


Identity theft is a common occurrence in our society. For most people, identity theft is something that happens to another person that is careless. However, identity theft can strike anyone, including people that take precautions. Although you can never guarantee that identity theft will not strike you, here are some the ways to reduce the risk that your identity will be stolen.

Identity theft is defined as when a person steals your real world identity in order to commit fraud. Identity theft affects millions of people each year and can cause financial damages and big headaches to people that have had their identity stolen.

Identity can occur in several ways, through hackers stealing personal information from large companies such as credit card companies or data wholesalers, by a computer user unknowingly divulging personal information to criminals and by merchants having access to your account details and personal information.

Many people are completely vulnerable when a bank or data wholesaler loses your information. There is nothing usually a private citizen can do since they do not control how the information is kept and transferred. Millions of people at once can be exposed to identity theft through these types of compromises. The best way to protect yourself is to check your credit report at least once a year to determine if any other entity tried to take out a loan or credit card without your authorization.

If you are notified by a company that your identity may have been compromised or see suspicious activity on your credit report, contact all three credit reporting agencies to make them aware that an identity theft has occurred. They will usually lock down your report and will not let credit cards and other financial institutions allow new credit or loans without checking with you first.

If you are surfing online, be careful who you give your personal information too. Many times emails are sent to you that look legitimate asking for personal or financial information. Never click on any links in your email. Always close your email, open up a new browser window and contact the company directly. These types of emails are called spoofing and they phish or look for unsuspecting people to give them their personal and financial information which is then used to commit fraud.

Another way your identity can be stolen is by merchants that process your transactions. There are some cases where a restaurant or gas station steals personal and credit card information from its customers. Although very difficult to stop, make sure that you give your credit card to businesses that are very transparent and have a low risk of fraud. So if you would like to reduce the risk of identity theft, take note of the above suggestions.

The Spywaredude keeps you informed with up to date information on Spyware, Adware, Malware and Viruses that can affect your computers operation. Vist the Spywaredude to read the latest news.

Labels: , , ,

Saturday, May 17, 2008

Tips to Avoid Identity Theft


What is rampant, spreading like wildfire and can kill life as you know it? No, not a deadly virus (but close). Answer: Identity theft. My stepson, Aaron, was a victim of identity theft recently. Someone stole his bank cards, deposited fake checks into his account, then withdrew cash. The deposited fraudulent checks and overdraft charges hurt his credit, and he's slowly recovering and rebuilding his score.

Tips to avoid identity theft: 1. Buy a shredder. Aggressively protect your social security, credit card or bank numbers. 2. Use a lock-in mailbox. This isn't 100% safe, but it's much safer than one without a lock. 3. Protect your out-going mail. Get it into the box or the hands of a postal clerk. Heavily trafficked offices often have out-going mail in the entryway. While this may save time, it's not safe. 4. Keep receipts and compare to your statements when they come once a month. Banks make mistakes all the time. 5. Keep financial documents under lock and key (at the bank or in a home safe). 6. Don't give out your social security card--ever. 7. Know what's in your wallet. Do you know how many credit cards are in your wallet? 8. Don't discuss detailed financial information on a cordless or cell phone. That information can be intercepted. 9. Monitor your credit reports. You can sign up for a monitoring service or do it yourself periodically. Your credit is one of your assets, so protect it.

If someone steals your credit card information, get help from these reputable resources-- Federal Trade Commission www.consumer.gov/idtheft or 877-382-4357 Identity Theft Resource Center at www.idtheftcenter.org 858-693-7935 Privacy Rights Clearinghouse www.privacyrights.org or 619-298-3396

Labels: , , ,

Thursday, May 8, 2008

Protect Your Self Now from Identity Theft


Protect Your Self Now from Identity Theft

Protecting your self now from identity theft is the best thing you will ever do in your lifetime. Companies are now working to fight identity theft by adding new software programs that supposedly adds additional protect, however when you give out your information over the World Wide Web you are always at risk. Thus, in this article we will inform you of the steps you will need to take to protect your self from identity theft.

Steps Never give your personal information out on the World Wide Net, unless you know the company is trustworthy and has encryptions to secure the site. Still, you may want to consider ordering products or paying bills by use of Money Orders, rather than checks. Recently, I learned from a friend living in England that UK postal workers were caught selling personal information to immigrants so that these people can remain living in the UK. Thus, I have not received a steady collection of information as of yet, still, it is something to consider, since thieves come in all forms. The Criminal Justice Departments try to blame the crimes on the poor, however, most crimes committed are acted out by less suspicious people, such as lawyers, doctors, postal workers, et cetera. Continuing the steps you should NEVER respond to Phishing or Spam Mails, since the mails often have potential thieves sending them. Phishing Mails slightly differ from Spam mail, in that the sender will send out an email claiming that your accounts are frozen or pending stop. Some of the mails have links, which direct the receiver to a site that appears to be a legitimate account site. Thus, banks, creditors and lenders already have your information, thus giving information to these mails will only land you in a whirl of problems in most instance. Spam mails or other types of Phishing Mails may propose winnings. NEVER open or give personal information to anyone via email. It is important to change your PIN numbers and Passwords randomly. Changing the codes will confuse the server, thus it will help prevent identity theft. Few people claim that changing your Password and Pin Numbers every six months will help; however, I recommend random changing of the codes for additional protection.

As a victim of identity theft, I learned the hard way of how to protect, prevent further activities and so forth. Restoring trust after your identity is stolen is next to impossible. Still, I do not set my self up by allowing my lack of trust to control my life.

If you are ordering online make sure you know the companies worth. Conducting a background check of any company online is easy and only takes a few minutes. To conduct a background check, visit the Better Business Bureau Site by typing in the search engine BBB.

When making purchases with credit/debit cards, checks or other types of cards make sure no one is watching you when you type in your PIN numbers or Passwords. If someone is standing over you when you are making a purchase, I recommend changing your Pin number and/or Password right away. I become suspicious when at a store using my debit cards to make purchases. Often the customer standing behind me is watching and it annoys me, and sometimes the clerk watches the transaction. I immediately alert them, letting them know that this is a personal transaction and no one has the right to watch me type in my PIN number. Thus, I change my passwords and PIN numbers randomly to prevent identity theft.

It is important to conceal your personal information at all times. If you carry a wallet and/or purse make, sure you know where your valuables are at all time. Personally, recalling numbers in your mind rather than carrying them in your material possessions is safer. In other words, remember your Social Security Number at least and store the card in a safe place. You should never give your Social Security Number over the phone lines, however when contacting the Social Security Administration you will have no choice.

Finally, taking all the steps to prevent identity theft includes learning all the details as possible about the crime.

Tony Robinson is an International Author, Webmaster and Security Guru. Check out his Identity Theft Protection Tips at http://www.officialidentitytheft.com/

Labels: , , , , ,

Tuesday, May 6, 2008

Internet Mail Identity Theft


Internet mail is one of the main sources that perpetrators of identity theft utilize to gain access to personal information. The perpetrator may send threatening mails, or mails that seem appealing. Spam or Phishing emails are linked to identity thieves and arrive in millions of mailboxes worldwide. Not one of us is singled out to become the next victim. Rather, identity thieves focus on getting identities to gain, instead of worrying about whom they are stealing the identity from.

Few thieves will target a specific company or person, especially if they are aware of the worth of the accounts. Thus, these thieves are acting on greed and intend to get rich by stealing someone else's identity. The dispatcher of such mails are challenging the receiver by deception hoping the receiver will give out personal information, such as banking routing numbers, bank numbers, PIN and passwords, Social Security Numbers and other precious information that the thief can utilize to gain control over your identity.

Added emails that you may want to bear in mind are Spam mails that often assert that you have won x amount of cash, please act now to receive your prize. Logic should tell you that if you have not joined a contest or gave your information over the phone lines or internet, then chances are you have not won a prize. Recently, I received various mails claiming that I have won $32,000 and is requested to pay the tax on the winning, and to please respond now to receive your prize. DELETE. Other mails followed claiming that I could receive scholars or grants to attend such and such college, to earn my degree act now by providing my personal information. NOT!

After my identity has been stolen, unless your name is GOD you are not getting any personal information from me. My bank already has my personal information, thus there is no reason for them to email me asking for my personal information. Banks clearly state in the Terms & Conditions that they will "Never" send electronic mail requesting information from the recipient at any time, thus giving your information to an electronic email with your bank name listed in the header is only asking for trouble.

Identity thieves think of everything when it comes to stealing identities, including sending emails in respected names. FDIC was targeted by thieves, thus the sender sent mails to recipients of the bank requesting that they provide personal information now to avoid closure of their accounts. Microsoft was also targeted by thieves when mails were sent to various boxes requesting the receiver to download patches to protect their computers. Once the receiver downloaded, the attachment a dangerous Virus quickly took control of their computer, leaving the computer bleeding and leaking with empty spaces that would direct anyone to the information stored on the computer.

EBay is a target for thieves. Few thieves purchase items on EBay claiming to send the owner a check that amounts to more than the purchase price and that the owner should send the remaining amount back to the purchaser by electronic form, or else through "Western Union." The checks were found to be copycats and were attempts to steal. Thus, the Internet is not a safe environment; therefore, I will provide helpful tips to help you prevent identity theft.

Steps to protecting your identity:

Never open emails that you do not trust.

Never give out personal information abroad the internet, unless you know the company is trusted and has encryptions to secure the site. Still, you may want to reconsider and order directly via postal mail from the company.

Do a background check on any site you are thinking of giving your information to.

If possible, send Money Orders to pay bills or else pay for products online and offline.

Never give our personal information over the phone lines.

Do not post personal information on forums, bulletin boards or discussion boards online.

Conceal your personal information at all times, including at home.

When using ATM or other machines to make deposits, withdrawals or purchases make sure no one sees, you type in your PIN number.

Change your Pin numbers and passwords randomly.

Tony Robinson is an International Author, Webmaster and Security Guru. Check out his Identity Theft Protection Tips at http://www.officialidentitytheft.com/

Labels: , , , , ,

Thursday, March 20, 2008

Protect Yourself From Identity Theft.

There are so many ways that your identity can be stolen. It's such a shame that people take something as valuable as the internet and steal from you, but it happens. When it does, they can go on a spending spree that can ruin you financially. It's a dangerous game for them, and for you it's dangerous... but no game. It happens a lot but in this article we'll show you some strategies so that it doesn't happen to you.

Here are proactive strategies to keep it from happening. Here are some ways to help you fight identity theft and avoid having someone else ruin your good credit rating and keep you from getting the loan or mortgage you want to get.

Be careful how much information you give out over the Internet.

Never put your credit card number into an e-mail.

If you do make purchases online only use sites that offer a high level of encryption and only use one credit card for all of your Internet purchases and make sure that credit card has a low limit. If you do that, no one will be able to ruin your credit rating even if they max out your credit card because the limit is so low!

You should also be shredding all of your outgoing mail. A lot of your information is already on your garbage and all the thieves have to do is pick through your garbage and learn about you.

Make sure that your mailbox is safe. You may have to rent a mailbox if you live in an area where it is not secure and private.

Get a credit check done regularly to see if someone is ruining your credit rating. A credit report will tell you how many credit inquiries have been made and if you see any on there that you did not approve of, you should contact the credit bureau immediately.

Why this talk about identity theft on a site about loans? Because if someone steals your identity they can get loans based on your credit rating and they will disappear with the goods while you get stuck with a bad credit report.

Tim Renolds is the owner of Homeowner Loans providing Uk homeowners with a free loan quote service. Visit us today for a free no obligation quote

Labels: , , , ,

Friday, December 14, 2007

Identity Theft Exploding: Heres How you can Avoid Becoming a Victim - Plus, Tips if you do Become a Victim

Americans are more concerned about identity theft than unemployment or corporate fraud, according to a survey of 2,000 people conducted by Star Systems.

Nine out of ten Americans demand new federal legislation, while two-thirds say the financial services industry needs to do a better job of verifying the identity of customers who open bank accounts (66 percent) and credit card accounts (72 percent).

Some 5.6 percent of respondents reported being victims of identity theft, which translates to 12 million people. When debit and credit card fraud and identity theft were combined, close to 15.9 percent of consumers say they have been the victim of one of these crimes. (Source: Star Systems, 2003)

For most of us, using your debit or credit card to make a purchase has become an every day aspect of life. Many of us do it every day and feel safe in doing so.

But it is far from safe. People with your debit or credit card information may make purchases with your card information over the telephone, via the Internet, or at a local retail store.

As we moved to a cashless system of transactions by debit or credit card, a relatively simple crime niche has grown identity theft and fraud.

Some law enforcement authorities are not pursuing the crime in a coordinated and cooperative fashion. Thus, a situation has grown that affords the people who perpetrate such acts of theft and fraud, act with a degree of confidents that they will not get caught.

What can you do to reduce your chances of becoming a victim of identity theft or fraud?

Here is a list of actions that you can take to avoid becoming a victim of identity crimes.

1. Never throw receipts or statements away that have personal information on them. The trash is the greatest repository of information for the identity thief. Even better, shred everything that has identifying information on it (transaction receipts, etc.).

2. Pay to have an unlisted telephone number in your local telephone directory.

3. Take as much identification off of your personal checks and drivers license as possible. Thus, no home addresses, phone numbers, or social security numbers on personal checks. Last only your last name and first initial rather than your full name. You want a retail clerk to check your ID when you are cashing a check.

Most states now provide a photo ID on all new automobile drivers licenses issued. If you do not have one, conceder getting your licenses renewed now to get a photo ID for identification purposes. Do not put your social security number on your drivers license.

4. Check your bank accounts for suspicious activity everyday, this can be done online via the Internet.

5. Have your middle initial removed from all public documentation if possible. Middle initials help identity thieves narrow down their searches for victims.

6. If someone calls you asking for your personal information on the telephone do not provide any personal information to anyone over the phone.

7. Dont leave your mail out overnight. If you will be away from home for any period of time: have your home mail delivery stopped. If possible, secure a locked mail box at your local post office or a retail store mail box service for your home mail delivery.

If you go on vacation, have your mail and newspaper delivery stopped and arrange to have your yard maintained. Include the post office, newspaper service, and your friends or neighbors to insure that your home looks as if it is occupied while you are gone.

For a checklist for your home security while you are away see ProtectionConnect.com/homesecurity www.ProtectionConnect.com/sitemap. www checklist.html or html#home.

8. Write Check ID on the back of your debit or credit cards next to your signature. In that way, when a retail store checks your signature on your card, they will verify that the card is being used by the proper individual.

9. Be aware of people standing too close to you and shoulder surfing you while you conduct your ATM transactions.

If you do become a victim of an identity crime do the following:

1. Demand to file a police report no matter how unwilling the law enforcement office may be. Make sure to get a copy or at least the report number.

2. In the case of card fraud, make sure to cancel your card and report it as stolen to your credit card company as soon as you find out.

Immediately, fill out affidavits with the appropriate financial institution denying that you were the one who made the relevant purchases. In most cases, the banks will respond with up to a 30-day process that requires the businesses that accepted the fraudulent transactions to repay the banks.

3. Report the fraud to the three major credit bureaus:

~ TransUnion Post Office Box 2000 Chester, PA 19022

~ Equifax, Equifax Equifax Credit Information Services, Inc Post Office Box 740241 Atlanta, GA 30374 1.888.766.0008

~ Experian Consumer Information Post Office Box 1909 Orange, CA 92865

4. The U.S. Secret Service handles fraud cases that cross state borders. If you know that your case applies, contact their local office to make them aware of your case. If it is part of a broader fraud case, you may be contacted by an agent.

5. You can also fill out a complaint form with the Federal Trade Commission, although this is strictly used to track national identity theft statistics.

Steven Presar is a recognized small business technology coach, Internet publisher, author, speaker, and trainer. He provides personal, home, and computer security solutions at
www.ProtectionConnect.com. He provides business software reviews at www.OnlineSoftwareGuide.com. In addition, he publishes articles for starting and running a small business at www.abcResults.com. Be sure to sign-up for the SOHO newsletter.

Labels: , , , , , ,