Online Identity Theft Protection



             


Thursday, February 28, 2008

Identity Theft - Straightening Out Your Credit In The Aftermath

FBI statistics reveal that identity theft is one of the fastest-growing crimes in the United States, with about 1 in 5 families in the U.S. being a victim of identity theft. Identity theft is obtaining another person's personal information (e.g., name, social security number, credit card number, passport) without that person's knowledge and using that information fraudulently. For someone who discovers they are a victim of identity theft, it is important to act fast. Here are some immediate steps to take in order to stop further misuse and to restore your good credit:

1. Contact the fraud departments of any one of the 3 credit reporting companies to place a fraud alert on your credit report. When a fraud alert is placed on your credit reports, creditors will contact you before opening any new accounts or making any changes to your existing accounts. You only need to contact one of the three companies to place an alert, and they are required to contact the other two, which will place an alert on their versions of your report, too. Once you place the fraud alert in your file, you're entitled to order free copies of your credit reports. When you receive them, check them over carefully for any new accounts that may have been opened without your authorization. Also be aware of any new inquiries by banks, lenders and credit card companies that you were not familiar with.

2. Report the crime to your local police or sheriff's department and request a police report.

3. Contact your creditors, banks, phone companies, and utility companies and have them freeze your accounts. Banks, credit card companies and other creditors may require a copy of your police report. You may be liable for a small sum of the fraudulent charges; check with each of your card issuers for their policies. Most creditors promptly issue replacement cards with new account numbers.

4. File a complaint with the Federal Trade Commission.

5. Monitor all bank and credit card statements and other bills carefully to ensure there are no fraudulent charges. If you find fraudulent checks or withdrawals on your bank account, notify the fraud department of your bank in writing immediately.

Stop payment on any missing checks and/or close your existing account. You can also notify the check verification companies not to accept further checks under the account number that was stolen. To find out if the identity thief has been passing bad checks in your name, contact SCAN @ 1800-262-7771.

If unauthorized credit card charges appear, notify your credit card company in writing without delay.

6. If you believe the theft involved your social security number, contact the Social Security Administration. They may re-issue a lost or stolen social security card or may, under some circumstances, give you a new social security number.

As you know, your credit rating is all important. Every precaution should be taken to protect your credit rating. Once you have your identity straightened out, you might consider registering with Equifax Credit Watch?. Equifax Credit Watch? makes monitoring your report easy by automatically alerting you within 24 hours of key changes in your Equifax Credit Report? - like when someone tries to get credit in your name or there are sudden changes in your credit card balances. - so you can act before serious damage is done.

Below are important phone numbers you will need for reporting your identity theft:

Credit Reporting Agencies:
Equifax 1800-525-6285
Experian 1888-397-3742
TransUnion 1800-680-7209

Federal Trade Commission Hotline:
FTC Hotline 1877-438-4338

Check Verification Companies:
Telecheck 1800-710-9898
Certegy 1800-437-5120

To find out if the identity thief has been passing bad checks in your name:
SCAN 1800-262-7771


Debbie Pettitt who is the webmaster for Understanding Identity Theft, providing essential information on identity theft, it's prevention and what to do if you're a victim. If you've been a victim of identity theft, this page may be helpful: http://understandingidentitytheft.com/identitytheftreporting/

Labels: , , , , ,

Wednesday, February 13, 2008

Protect Yourself from Identity Theft

Identity theft has become the fastest growing criminal activity in the 20th Century, replacing illegal drug sales. For the perpetrators, it offers the highest profit margin with the least risk. In fact, according to one expert, it is estimated that fewer than 1-in-700-identity crimes actually result in a conviction.

In the United States alone, Identity theft has reached $53 billion dollars a year. Consumers are directly shouldering about $5 billion of that, but the rest, which is paid by businesses and retailers, is passed on indirectly to consumers who are paying more for goods and services.

How BIG is this Problem?

In recent months, there has been a rash of reports about big thefts, where criminals are stealing identities in mass quantities. Banks, credit card companies and businesses that house servers storing passwords or other sensitive, private information have all reported "break-ins" that happened through the use of Trojan viruses and other online hacking methods - resulting in the loss of millions of pieces of information being stolen. There have also been instances of the information just getting "lost", of employees selling it and other lax security measures resulting in the same thing - thieves having access to your identity.

What do Thieves Want?

- Your Name - Date of Birth - Home Address - Phone Numbers - Social Security Number - Driver's License Number - Credit Card Numbers - CW2 Security Code (the number on the back of your credit card) - Your Credit Report - ATM Cards - Telephone Calling Cards - Mortgage Details

Where Are They Getting All Your Information?

High-tech methods include online thefts from:

- Banks - Credit-Reference Agencies - Retailers - Credit Card Networks - Data-Brokerage Companies - Payment Processing Companies - Phone Companies - Schools - Your Employer - Doctors, Clinics and Health Departments - Government Agencies

But there are still low-tech methods that are effective as well:

- Dumpster Diving - Mail Theft - Retail Theft - "Phishing"/pretexting/pretending - Purse/Wallet Theft

What are Thieves Using Your Information For?

- Making charges to your existing credit cards - Opening new credit cards in your name - Having phone or utilities turned on - Withdrawing money from your existing bank accounts - Employment purposes - Driver's Licenses - Tax Fraud - Social Service benefits - Student loans - Business or Personal loans - Health care - Mortgage loans/leases - Auto loans - Using your ID when caught committing a crime

How Can You Protect Yourself?

- Keep a photocopy of all your credit cards, bank account numbers and investment account numbers in a safe place - Keep your credit card receipts - don't throw them away in a public place - Put a "fraud alert" on all your credit reports - If you apply for credit and the card doesn't arrive on time, call the card issuer - Choose difficult to guess PIN numbers or passwords. (Don't use birth dates, your mother's maiden name, pet's name, etc.) - Never give personal information to anyone who sends you an email, a letter or calls you asking for it - Shred any personal information - such as bills, credit card or bank statements, even pre-approved credit applications before throwing them away - Don't use the ATM machine if someone is watching you - Pay attention to what's going on around you - cell phones often have cameras in them. If someone is standing close by you with a cell phone while you're entering a PIN number at the ATM or in line at the grocery store, block their view - Review your bills each month for unusual or suspicious charges. If there's something you don't remember or doesn't seem right, call the creditor right away - Check your credit report at least once a year - Store your cancelled checks safely, or better yet, have the bank do it. You can always get a copy if you need one. - Don't leave your purse in plain sight when driving - Keep your valuable locked in the trunk or glove box when driving - Make all personal information on your laptop or computer password protected - Don't carry information about your PIN numbers, passwords and account numbers in your purse or wallet; or at least don't make them easily identifiable as to which account they belong to

Warning Signs that Your Identity Has Been Stolen:

- Although you have good credit, a loan application is denied, or you're refused extended credit requests - You are suddenly contacted by a debt-collection agency - Your purse or wallet has been stolen, or your house broken into - There is unfamiliar activity on your credit report

What to do if it Happens to You:

- If your purse or wallet is stolen, call the police immediately, and file a report. Make sure that you're given a report number - Contact your bank, credit card and other credit extending companies and report the theft - Close the accounts - Contact the credit-reporting companies in your area, and report the theft. - Review your credit report every 90 days for the next year for suspicious activity - If there is fraudulent activity, have it removed immediately and monitor your credit report every 90 days for the next year - Put everything in writing, and follow up with your credit card companies, banks, and credit reporting agencies. Keep copies of all supporting documents - File a report with the Federal Trade Commission - Change the passwords on your existing accounts and create new ones for new accounts

Identity theft is real, and it's a growing problem, and it could happen to you. Although there are no guarantees that you can keep your information safe, by paying attention to the risks and taking proactive steps to protect yourself, you can minimize your chances of someday having an "identity crisis". Good luck!

David Neese is a real estate investing author who offers a free course for real estate investors delivered by email, audio and teleseminar which you can get for free at: http://www.FreeRealEstateInvestingCourses.com You can find more information about David at http://www.DigitalSuccessCoach.com

Labels: , , , ,

Monday, February 11, 2008

Identity Theft And Pharming - A New Twist On An Old Theme

Identity theft is big business and, like it or not, the likelihood that you will become a victim is increasing. As the Internet and its popularity have grown, the number of unscrupulous operators out there has grown as well. There are so many scams and attack methods out there it is difficult to keep up with them.

One of the identity thief's more productive techniques is phishing. A phishing scam is one where an email message contains a link to a web site that asks for personal information. The scam uses social engineering to trick people to go to a web site they would not normally visit. A common scam is one in which an email that looks like it has come from a bank or credit card company asks you to "click on this link" to update your user information. There is generally a part of the email that tries to convey a sense of urgency to get you to "do it now". When you click on the link you are actually forwarded to a thief's web site that is designed to look like your bank or credit card company's web site. You are then asked to provide information, such as user id, password, and other identifying information. Identity thieves use this information to open or use credit accounts and steal money from unsuspecting consumers.

Phishing attacks are relatively easy the spot and avoid. Never follow links in email messages unless you know the link is valid. Compare the actual link address with the text you see. If you are expecting to go to PayPal.com, make sure the link really takes you there. You can view the hyperlink before you click on it buy pointing your mouse cursor at the link. Most email clients and web browsers will show you what the actual address is before you click on it. If the address doesn't match the web site address you expected to see, don't click on the link. Likewise, NEVER provide any personal information from an unsolicited source. You will also see the address you are visiting in your web browser's address bar. Make sure you are visiting the site you expect.

There is a new trend in identity theft, called pharming. Well, it is actually a fairly old type of attack put to a new and alarming use. The basic attack generally relies on DNS poisoning or domain spoofing. The difference between phishing and pharming is that while phishing targets individuals, pharming targets large groups of people. Before we get into a discussion of a pharming attack, let's look at a short primer on how Internet addresses work.

Anytime you type in an address in your web browser, such as http://www.somecompany.com, your computer needs to find the Internet Protocol (IP) address before sending any information. There are two main methods for finding IP addresses for web site addresses. The legacy method consists of a file, called the 'hosts' file, that lists all of the host names you may want to visit, along with their IP addresses. The other method is to send a name resolution request to a Dynamic Name Server (DNS). The DNS server looks up the address in its database and returns the corresponding IP address. Once your computer looks up the IP address for http://www.somecompany.com, it then uses the IP address for all further communication.

A pharming attack is one where the host file or DNS entry is modified to send users to a counterfeit web site. The slightly simpler of the two attacks is the host file modification. This can be accomplished with a virus or worm. It is generally harder to compromise DNS servers. With the phishing attack, a careful view of your web browser's address bar will show that you are visiting a site you did not expect. Pharming attacks are more difficult to detect since your web browser tells you that you are at the right site even when you really aren't.

The effect of a pharming attack is that all users who want to go to a particular site end up being redirected to a thief's site. While this might sound similar to a phishing attack, it can be much worse. There is no indication to the end user that a redirect has occurred. The web browser still shows the original web address. This behavior makes pharming attacks more difficult to detect. Also, if the thief is able to change DNS entries on a commonly used DNS server, all users who request IP addresses from the compromised server will be sent to the counterfeit site.

So, how do you protect yourself from a pharming attack? Much of the work in stopping pharming attacks is up to the DNS administrators. They will be responsible for ensuring any DNS entry changes are authentic. But, there are some steps you can take. Following these guidelines will reduce your chances of becoming a pharming victim:

Install and update a good anti-virus program. Since many attacks start as malicious software, protecting your system from viruses and other malicious software will go a long way toward stopping an attack before any information is changed.

Protect your 'hosts' file. On Windows operating systems, the hosts file resides at: (assuming C:Windows is where your OS installed) C:Windowssystem32driversetchosts. On Unix systems, it resides at /etc/hosts. You can manually check your hosts file to ensure no unusual entries have been put there or you can install software shields that watch the hosts file for you (along with anti-virus software).

Know the sites you visit and carefully protect any information you give out. Never divulge any information for any reason unless you are absolutely certain the information is necessary and you are providing it to the correct organization. If your bank web site, or any other web site, asks you to provide confidential information, call their customer service department to get confirmation that the information is needed. Don't call the number on the web site (it may be compromised). Look up the number in the phone book or use directory assistance.

As more and more web sites start using digital certificates to authenticate their identities, you will begin to see more popup windows asking you to accept these certificates the first time you visit the web site. Always read the certificate details and ensure the web site really is the one you wanted to visit. If you are unsure, reject the certificate.

We will all hear more about pharming in the coming months. Its use is growing. This is just another opportunity to remind as many people as possible to be careful with the sites you visit and the information you give out. Protect your personal information. Not doing so can be very expensive.


Michael G. Solomon is a security speaker, consultant and author who specializes in assessing and fixing security vulnerabilities. Michael has written several security certification, security education, and project management books and offers more educational materials at http://www.thesecurityguy.net.

Labels: , , , ,

Saturday, February 9, 2008

5 Simple Steps To Protect Yourself Against Identity Theft

Are you the victim of identity theft? According to Joanna Crane of the Federal Trade Commission's Identity Theft Program, 80% of the victims who call the FTC say they have no idea how it happened.

Furthermore, an FTC survey reported that 4.6% of those polled reported that they had been a victim of identity theft within the past year. Additionally, according to a recent General Accounting Office report, it is estimated that as many as 750,000 Americans are victims of identity theft every year.

Is this an invisible enemy and are American's personal and financial information that easily accessible to identity thieves? What can the average American do to protect themselves from these personal attacks on their privacy? Although there are no guarantees, here are five simple steps to help prevent identity theft:

1) Shred private credit card statements, tax documents, bank statements, pre-approved credit card offers or any other documentation with private financial information.

2) If you are inundated with pre-approved credit card offers you can call toll free 1-888-567-8688 to opt out and request to have your name removed from the mailing list. In addition, you can call the national do not call registry at 1-888-382-1222 to stop unsolicited telemarketing calls where you could divulge personal information.

3) Monitor your credit report at least once a year. You are entitled to a free credit report and can get one by calling 1-877-322-8228. Look for suspicious activity. It is also wise to subscribe to a credit protection service which will inform you of changes in your credit report.

4) Check your mailbox daily and do not allow mail to sit overnight in your mailbox. Mail theft is an easy way for thieves to secure personal information. It is best to mail outgoing bills and checks at the post office or other secure locations. If you believe your mail has been stolen you must contact the nearest postal inspector. You can look in the white pages under Government Services or call 1-800-ASK-USPS.

5) Be defensive and more guarded with your information. Do not divulge your personal information freely. Never "validate" your personal or financial information when contacted through an email, even if it is a company you do business with; they have this information on file. It may look legitimate and realistic, but these attempts are getting more sophisticated and these types of scams are what is known as "phishing".

We have explored five simple steps that the average person can do to help themselves prevent identity theft. In this age of advanced communications and technology and with the thieves getting more deceptive than ever, it is imperative to continue to educate yourself. Be cautious and understand that this information can be abused and it is up to you to safeguard yourself and your famliy from this growing trend.Robert Benson operates http://www.ezshoppinghere.com a web site devoted to helping shoppers find unique gifts in unique places. Find Three Stooges Memorablilia, Collectibles, Home Decor, Novelties and more articles from Robert at the web site.

Labels:

Wednesday, December 26, 2007

Easy Ways To Protect Yourself From Identity Theft

It's no surprise that thousands of Americans are victimized by identity theft each year. What are we actually doing to protect ourselves from identity theft?

Many of us don't think about it and some may not even know what it is. The fact is it happens. Identity thieves victimize thousands of people each day. Causing havoc and destruction to all it seeks.

Last year over 9,000,000 people suffered devastation caused by identity theft; averaging over 45 billion dollars yearly.

As modern technology advance and become more sophisticated; identity thieves advance and become more sophisticated. By taking advantage of expensive, yet adequate technologies and software, these introducers are able to become undetectable.

By the time the average person realizes they have become a victim of identity theft; it is too late. By this point, the victim financial stability and credit ranking may be impacted significantly.

The truth is that the number of victims is growing everyday and there is no absolute solution; however, there are simple steps that can be taken to limit your chances of becoming a victim.

* The most important step in guarding yourself from identity theft is to keep your confidential information confidential. Social Security Numbers, Credit Card Numbers, Bank Account Information or any other confidential information should never be given to unknown companies or unidentified individuals.

Never tell anyone your personal information over the phone or send it through email, nor fax. Most legitimate companies will not request this information from you via phone or any other unprotected source.

If you are an online consumer, always make sure that you have a secure connection with the online eCommerce site, before submitting your credit card information and other identifiable information. Irresponsible credit card usage is the most common way to fall victim of identity theft.

* Monitoring your credit report monthly is a great step in stopping introducers in their tracks. By keeping close tabs on your credit activity you may be able to prevent major damages to your credit and financial wealth.

* Important documents containing your confidential information should be kept in safe, unexposed places. Even in the privacy of your own home, documents with such content should not be exposed. You may opt to use P.O. Box or Private Mail Boxes to send private documents.

By following these steps you can lower your risk of becoming an identity theft victim. Being informed is the most valuable protection against identity theft.


Discover useful advice and information about low interest credit cards. What to look out for, and how to find the best low interest deals.  http://www.lowinterestcreditcardsinfo.com/

 

Labels: , , , , ,