4 Surprising Ways Your Identity Can Be Stolen

Smartphone in hand, concept of data protection, blue

Your phone’s SIM card could be taken. This is a hacking con in which a criminal uses a SIM reader or scanner to copy the information on your SIM card, a memory chip in your mobile phone. Once a thief has the code to your SIM card, they can copy it and basically use your phone’s information to make phone calls for free. Well, it isn’t free of course. You get to pay for those calls. Be wary of where you leave your mobile phone.

You could fall prey to visual hacking. This is when you are hacked by someone who spies your computer screen and steals information.

Given how easily strangers can come in contact with us at work – and in life, it’s worth thinking about. It’s also easy to imagine a thief pulling out a smartphone and taking a close-up photo of someone’s driver’s license, credit card or bank statement and slipping away without anyone being the wiser.

A spokeswoman for the Visual Privacy Advisory Council, suggests putting privacy filters and screen protectors on computer monitors, tablets and smartphones. That way, you can see what’s on your screen, but someone next to you, say on an airplane, can’t. And for those who are really worried, there are software filters that use facial recognition to recognize the computer user.

Someone could kidnap your digital identity. It may not be as troubling as getting your Social Security Number or credit card stolen, but it’s easy to imagine how someone could do a lot of damage to your reputation and more in this realm (i.e.; pretending to be you on Twitter).  Be sure to keep an eye out for this and review your security settings, along with changing your password frequently.

You could meet an old school thief. You might think that going off-the-grid has never sounded better. Give up an online presence. Get a landline. Just use cash. But you still need to be careful not to overlook old fashioned methods of identity theft.

One idea – if you use a check book, you may want to leave it at home and put a blank check in your wallet, if you’re going to be writing a check later in the day.  Just make sure your wallet isn’t left somewhere it can be swiped. Or photographed.

10 Signs You Might Be a Victim of Identity Theft

download (1)Identity theft is the fastest growing crime in the country, with almost 10 million incidents a year. In fact, every minute, 19 people become victims, and the average cost to the victim is about $500 and 30 hours. ​

Those are some scary stats. The good news is that you can protect yourself by catching potential problems early and enlisting the support of your financial institution. Here are some tips for keeping your identity out of thieves’ hands:

  1. If you lose your credit card, let your card issuer know right away. Not only will the issuer cancel the card and get a new one with new numbers right away, but the customer service representative will let you know if any erroneous charges have already been made on the card and can ​prevent any new ones from going through.
  2. Avoid using ATMs in obscure locations because it’s easier for thieves to install “skimming” devices on them that steal your information when you swipe your card. According to Shaun Murphy​, founder of PrivateGiant, a company that seeks to protect personal information online, consumers should also avoid using their card on websites that do not have the “lock” icon in the browser, because they aren’t as secure as sites that have the icon.
  3. Check your account statements for errors. This is likely the first warning sign you’ll encounter. When checking your statement, you might see an unexplained or inaccurate entry – such as a withdrawal, a check, an electronic transaction or a purchase that you don’t recognize.
  4. Look for mistakes on your credit report. You can request a free copy of your credit report through annualcreditreport.com and review it for any inaccurate information. The most common indicators of identity theft include a credit inquiry you don’t recognize or a new account you didn’t open. That could suggest someone else is impersonating you. Let the credit bureaus know about any errors so the false information can be removed.
  5. Respond to calls from your financial institution. Financial institutions are constantly on the lookout for strange charges on your account; in fact, they might notice a problem before you do. If you receive a notice about a potential problem, be sure to call them back to sort it out. If the message comes in the form of an email, make sure it’s not a phishing email (where a fraudster masquerades as a trusted entity to try to acquire your personal information).
  6. Follow up on odd bills you receive. If you start getting calls from debt collectors related to accounts that don’t belong to you, or you receive bills for medical treatments you’ve never had, then someone else could be using your identity and your health insurance information. Follow up with the provider and your insurance company to protect your account.
  7. Stay on top of missing mail. If you don’t receive your bank statement by mail and you usually do, there could be a problem. The perpetrator may have changed your address with the financial institution. If other pieces of mail are missing, it may mean the perpetrator is collecting information about you to develop a profile. Similarly, if you don’t receive your email statement, someone may have conquered your online account and altered the settings to lock you out. Follow up directly with your financial institution or the biller to get the problem fixed ASAP.
  8. You receive unexpected mail. You might get a notice from the post office that your mail is being forwarded to another address when you haven’t requested an address change. Or you receive a letter concerning an account you never opened. Other mailings that could be a sign of identity theft: You receive a credit card in the mail that you never applied for or the IRS notifies you about unreported wage income you didn’t earn. If you find yourself in any of these situations, then it’s time to follow up with the institution sending the mail to clarify the issue.
  9. Look out for errors on your Social Security statement. If the earnings reported on your statement are greater than your actual earnings, someone might have stolen your Social Security Number and is using it for wage reporting services. It’s another red flag that there could be a problem that needs your attention.
  10. Investigate if you’re denied an application based on your credit. If you have good credit but are denied an application for a new credit card or a loan, that may indicate that your identity has been stolen. It’s time to pull your credit report and do a full review of all your accounts to get to the bottom of the problem.

With these strategies in hand, you can help reduce your chances of becoming a victim of identity theft.

ID Theft Risks That Lurk in Your Child’s Backpack

Girl walking away from School Bus while texting on her phoneWhile you’re out searching for the perfect back-to-school backpack for your child, the more important consideration other than style, size, and color should be — what can happen if a dishonest person gets a hold of it? The things your child carries in his or her backpack can become a huge financial headache if they fall into the wrong hands.

With identity-related crimes at historic levels, the odds are better than ever that a dishonest person will know the basics of taking advantage of the kinds of personally identifiable information, sensitive data (like passwords and credit card numbers), and the many other keys to your household economy that can lurk in your child’s backpack.

Here’s a short list of what a relatively creative thief might find in your child’s backpack, and what you can do to prevent the worst from happening.

1. A Smartphone

While obvious to you (hopefully), does your child understand the serious potential for disaster that a walk-about smartphone can bring to your doorstep?

It can be as simple as a scammer dialing 611 and ordering new services. Chances are good that there’s enough information in your child’s backpack for a motivated thief to get your name and thus the keys to your telephonic kingdom.

But there are other identity indignities that can be done. Many people store user name and password information on the Notes app of their phones. The Notes may contain other informational cracks and crevices as well and open up unsuspecting third parties — relatives and friends — to scams. Email scams, grandparent scams, an iTunes or apps shopping spree, malware installation — so many tidbits to exploit.

What to do: Talk to your kids about the dangers of an unsecured phone and discuss basic data storage details with them — like what information shouldn’t be on their phones. Is the phone locked with a passcode? It should be! Also have them set strong (think creatively alpha-numeric) passwords, and a Find Me app to erase the contents should the device fall into the wrong hands.

2. Their Laptop

You don’t need to be a movie buff to know that a computer is a dangerous thing in the wrong hands. Most issues associated with a lost phone come to bear here as well. Emails can be sent to relatives or strangers in the service of stealing money or wreaking havoc.

Beyond the irresistible cornucopia of files that may well be saved on the device, email is a treasure trove of personally identifiable information — everything from credit card numbers to more data like name, address, email addresses and birthdays — pieces of a puzzle that can be assembled to present a believable story to a customer service representative and then steal valuable goods and services, or used as a fly trap to accumulate even more personally identifiable information.

Does your child have access to your Netflix account? How about Amazon or iTunes? Where else have they gone in cyberspace that might have their information — or yours? Open social media sites that are set to login automatically afford a wide vista of scamming opportunities too.

What to do: Make sure your child gets into the habit of logging out of all their online accounts, and that they don’t store sensitive information on their laptops. Talk to them about the wisdom of not saving user ID and password information, and how to make a good one. Finally, have your child set a password — shared with you — to protect their device against the wrong person accessing it.

3. Keys and Name Tags

So, this is pretty straightforward: If your child uses a karabiner to attach his or her keys to their backpack, you’ve got a potential robbery waiting to happen.

Additionally, there are apps that can allow a fraudster (as well as a person who might want to use the app to avoid unnecessary inconvenience) to make a copy of a key that a locksmith can duplicate.

What to do: Tell your child to keep the keys to your home in their pocket rather than on their back.

4. Gaming Device

Playstation Vita is a popular gaming device — and not the only device that could cause you a world of woe should it fall into the wrong hands — but we’ll single it out for the sake of illustration.

The good news: Your personally identifiable information is safe even if someone grabs the device, because it’s password-protected and associated with your gamer’s access to the network.

That doesn’t mean that a bad player can’t do some damage. First, they can play games and wreck your child’s sterling reputation in the community. Worse: Whoever has that device can buy games and run up a hefty bill. One-click purchased games are something any malicious third party can rack up in the way of a very expensive just-because crime.

What to do: Have your child set a passcode for access to the device and make sure they share it with you.

When it comes to data security, best practices are universal. It’s your job to pass on what your kids need to know to stay safe and keep your family out of the crosshairs of ID theft.

Article Source: Adam Levin for Credit.com, http://www.today.com/parents/identity-theft-risks-lurk-your-kids-backpack-1D80042370

3 Ways Consumers Can Fall Victim to Identity Theft

Identity-Theft-CreditThere’s really only one way to protect yourself from identity theft. Stop spending money and trust no one. It’s pretty easy.

OK, it isn’t easy. Talk to enough victims of identity theft, and you start to realize that it really can happen to anyone – and sometimes, no matter how careful you are, it can happen to you. That’s why it helps to study how people’s identities were stolen and learn from it. Here a few ways identity theft happens along with strategies to prevent it.

1. Information is out there for anyone to see. Of course you don’t want to leave credit card statements lying around in public places, and when you discard your financial paperwork, it’s smart to run it through a shredder. But sometimes when you’re out in the world, your information can’t help but become a little exposed. You type a PIN number onto a pad and realize someone might have been looking over your shoulder. You hand your credit card to a waiter, who disappears for a while with it. Or you’re in a crowded store, practically rubbing elbows with an identity thief.

Sarah Dugo, co-founder of College Savings Dolls, got an unwanted education on identity theft when she was at a crowded Best Buy and bought a big-screen TV for the Super Bowl.

“The cashier took my credit card and delivery information, but they left it all on the computer screen and walked away from the check-out area. I was at one of the checkouts in the smaller section of the store, not the main front exit,” Dugo says.

It turns out that the thief used Dugo’s credit card information to order the same big-screen TV – and had it sent to his address. “That’s how they caught him,” Dugo says. Still, the crook did enough damage to her credit report and credit score that it took two years for her to straighten it all out.

She was in one of those situations where the employee ringing her up was interrupted by a customer before finishing her transaction. Dugo isn’t positive, but she thinks that’s how someone was able to see her information and either jot everything down or snap a photo of the computer screen.

Dugo isn’t sure what she could have done differently, but she figures that if she is ever shopping on another crowded weekend, she may make her purchase at the main entrance, where department sales clerks aren’t likely to be pulled away from the register.

2. You put your wallet or handbag in a vulnerable position. “Several years ago, I was shopping at a Safeway near my house. I was in the shampoo aisle and a well-dressed man asked me to help him find a product his wife asked him to get,” says Caren Kagan Evans, CEO of ECI Communications. While Evans pointed to the top shelf to show him where the product was, another man took Evans’ wallet out of her handbag, which was in the top part of her cart.

“I didn’t realize my wallet had been stolen until I went to check out,” Evans says. “I ran home, contacted the credit agencies, contacted my bank and of course contacted my credit card companies.”

Unfortunately, her Social Security Number was printed on her health insurance card, so the thief now had that information as well.

“This was a large group of people that were doing this kind of thing up and down the East Coast,” she says. “In a matter of just an hour, the team had used my cards at gas stations, Target, and other locations. They also were able to get checks printed since they had my social, and thousands of dollars disappeared from my checking account.”

Evans says she was lucky because she got her money back and was able to fix everything relatively quickly. “I have heard stories of people who had their identities stolen where the perpetrator took out mortgages on properties, and stories of people who literally spent years getting everything straightened out,” she says.

As for where Evans went wrong, she says it is easy to look at the situation now and realize her handbag was vulnerable. It was in the top part of the cart, and she was never planning on leaving it out of her sight. So you could take away from this story that you should never trust a stranger, even one who simply wants some help finding shampoo – or, better yet, remember to keep your eye on your purse or wallet since somebody else otherwise will.

Evans also says she no longer signs her credit card receipts, reasoning that a thief can study the receipt and later fake her signature. Sales clerks don’t push her to sign for merchandise, she says – they’ll just ask to see her identification. “And when they do, I thank them,” Evans says. “I appreciate it.”

3. You trusted someone a little too much. Everyone knows the importance of vetting people who work for you, and yet you can never say it enough.

Arthur Gregory is a serial entrepreneur. He’s a partner in two restaurants and owns EatUsa.net. The printer who made his menus overheard Gregory tell a colleague that he was looking for a bookkeeper.

“I do that,” the printer said. And Gregory, who liked how his menus were made, figured he’d give him the job.

As it turns out, the man was trustworthy when it came to menus, but not when it came to bookkeeping. “He stole my identity,” Gregory says.

And he didn’t just go out to a department store and buy things in Gregory’s name. He took out corporate credit cards in Gregory’s name and tried to take over his business, contacting vendors and doing a ton of damage. He now keeps all of his personal information in a lock box, so not even his current bookkeeper can see it.

Gregory, unfortunately, is also a case study in why it’s impossible to prevent identity theft. Even if you were willing to live out the rest of your life on a deserted island or in a cave to wall yourself off from problems, you could still discover you’re already a victim of identity theft.

As you can see, identity theft is an immense problem throughout the world and only becoming more and more frequent. As previously stated, there is no way to completely prevent identity theft, but there are certainly ways to minimize your risk and protect your finances.

Article source courtesy of Geoff Williams of US News.

5 Things You Probably Didn’t Know About Identity Theft

WideModern_IdentityTheftComposite_121813620x413We’re all experts on identity theft.

Not by choice – but live your life, and it’s hard not to pick up something on the topic. And odds are, you or a friend or family member has been a victim. According to a U.S. Bureau of Justice Statistics survey of 70,000 people, 1 out of every 14 Americans ages 16 or older has been a target or a victim of identity theft.

So in the interest of protecting yourself and learning even more about identity theft, here are some things you probably didn’t know.

Military members are particularly at risk. Military veterans file more complaints about identity theft than any other group, according to Scott Higgins, CEO and founder of Veterans Advantage, a national program that partners with corporations, offering discounts on various goods and services. The Federal Trade Commission even designated July 17 as Military Consumer Protection Day to help educate the military about the dangers of identity theft.

What is it about being in the military that makes members such prime targets? Higgins says servicemen and women are conditioned to provide whatever personal information is asked of them throughout their service. “Unfortunately, this ‘conditioning’ often stays with them beyond their careers, leaving them susceptible to both ID theft and data grabbers who bird-dog veterans – offering a small perk and then selling their personal data wherever they can make the biggest buck.”

Medical identity theft is becoming a problem. Just because someone isn’t using your credit card illegally doesn’t mean you’re safe from identity theft. Someone could be using your name to get free medical services at a clinic or hospital, “possibly sticking you with the bill,” says Van Zimmerman, compliance and solutions architect at DataMotion, an email encryption and health information service provider in Morristown, N.J.

According to the Ponemon Institute, a research center devoted to privacy, data protection and information security policy, medical identity theft has increased 20 percent, and almost two million Americans have fallen victim. How does it happen? A thief with access to your personal information can create a fake ID with your name on it, and suddenly they’re you – at least as far as a hospital or doctor’s office staff knows.

Unfortunately, there isn’t much you can do to avoid this since, as Zimmerman says, so many of consumers’ medical files are managed by third parties. But it may give you yet another reason to be careful when it comes to giving out personal information.

Identity theft via computer games is a growing trend. According to Rob D’Ovidio, an associate professor of criminal justice at Drexel University in Philadelphia, video game accounts “are increasingly coming to the attention of identity thieves as they realize that these accounts hold real-world monetary value. Trends in phishing show attacks against financial services, online payments services and online auction brands decreasing, while attacks against video game and social networking brands are increasing.”

Phishing, in case you’re not aware, occurs when scammers construct a fake website with the goal of luring consumers to provide their personal and financial information. For instance, an email hits a gamer’s inbox, stating there is a problem with their account information. The gamer clicks on the link and provides information to the scammer posing as the legitimate service. Or a consumer might receive an instant message, seemingly from a friend, with a link to a gaming website – but clicking on the link brings malware, a type of software that can disrupt your computer or steal your personal information.

D’Ovidio says criminals who manage to access video game accounts through phishing and other methods can also steal virtual money and virtual goods and sell them for real-life dollars. “As well, video game and video game console community accounts are, at times, tied to the account holder’s or their parents’ credit card,” D’Ovidio says.

Search engine poisoning is more popular than ever. “Identity thieves are increasingly using a technique known as search engine poisoning to manipulate the results that show up and bend reality,” says Hugh Thompson, a Columbia University computer science professor and the program committee chair of RSA Conference, an annual information security conference.

Thompson says identity thieves, hackers and attackers can manipulate search engines so that their fake websites “appear higher in the search results than the real thing.”

Then, if it works, you’ve just been phished. Fortunately, there are ways you can spot a fake, and some of them are pretty obvious. If there are a lot of grammatical errors on the site, for example, that may be a danger sign. Many of the rules in the next section can help you realize you’re about to be had.

Criminals like to put fake Wi-Fi hotspots up at public Wi-Fi hotspots. If you go to a hotel or airport and log onto the official Wi-Fi hotspot, generally speaking, you’re perfectly safe. The problem is that you may wind up logging onto a fake Wi-Fi hotspot that simply looks like it belongs to your hotel or the airport, says Thomas Way, associate professor of computing sciences at Villanova University in Villanova, Pa.

He says there’s no sure-fire way to identify a criminal’s hotspot, but there are red flags to look for. First, look for the SSID (service set identification), the “name you see in the list of hotspots, and see if it is the one that the hotel, airport, et cetera, has told you to use,” Way says. “Second, when you get the typical approval page, where you usually click on a button or checkbox to agree to the terms of use, you should never have to enter identifying information, only, at most, a hotel room number and last name. If it asks for more, don’t do it.”

Way adds that just to be safe, look at the URL of the first page. “It should match whatever the page claims to be,” he says. “If it is a hotspot provided by the hotel, it should either be the hotel Web address or it should match the company that is providing the hotspot. If it is a spoof page, it’ll be noticeably different.”

Despite all the talk about online identity theft, you still need to watch your wallet. According to Phrantceena Halres, CEO of Total Protection Services Global, a Charlotte, N.C.-based security services company, only a fraction of identity theft cases are related to online fraud. “The majority is made up of stolen credit cards, checkbooks and wallets,” she says.

That’s because plenty of criminals aren’t computer geniuses. Most of them are hoping you’ve been careless enough to leave your wallet, filled with cash and credit cards, lying on the passenger seat of your unlocked car.

*Article by Geoff Williams of USNews. Click here to view the article source.

new%20ncua%20disclaimer-resized-600

7 Safety Tips for Using a Public Computer

How-to-Check-If-Your-Computer-Is-Safe-400x350Public computers in libraries, Internet cafes, airports, and copy shops can be safe if you follow a few simple rules when you use them. Read these tips to help keep your work, personal, or financial information private.

  • Don’t save your login information: Always log out of websites by clicking “log out” on the site. It’s not enough to simply close the browser window or type in another address. Many programs (especially social networking websites, web mail, and instant messenger programs) include automatic login features that will save your user name and password. Disable this option so no one can login as you.
  • Important – Don’t leave the computer unattended with sensitive information on the screen: If you have to leave the public computer, log out of all programs and close all windows that might display sensitive information.
  • Erase your tracks: Internet Explorer offers InPrivate browsing that leaves no trace of specific web activity. Internet Explorer also keeps a record of your passwords and every page you visit, even after you’ve closed them and logged out.
  • Disable the feature that stores passwords: Before you go to the web, turn off the Internet Explorer feature that “remembers” your passwords. 1. In Internet Explorer, click Tools , and then click Internet Options. 2. Click the Content tab, and then click Settings, next to AutoComplete. 3. Click to clear the check box for User names on passwords and forms.
  • Delete your temporary Internet files and your history: When you finish your use of a public computer, you can help protect your private information by deleting your temporary Internet files.
  • Watch for over-the-shoulder snoops: When you use a public computer, be on the lookout for thieves who look over your shoulder or watch as you enter sensitive passwords to collect your information.
  • Don’t enter sensitive information into a public computer: These measures provide some protection against casual hackers who use a public computer after you have. But keep in mind that an industrious thief might have installed sophisticated software on the public computer that records every keystroke and then emails that information back to the thief. Then it doesn’t matter if you haven’t saved your information or if you’ve erased your tracks. They still have access to this information. If you really want to be safe, avoid typing your credit card number or any other financial or otherwise sensitive information into any public computer.

T.H.I.N.K First because There’s Harm INot Knowing

new%20ncua%20disclaimer-resized-600