4 Surprising Ways Your Identity Can Be Stolen

Smartphone in hand, concept of data protection, blue

Your phone’s SIM card could be taken. This is a hacking con in which a criminal uses a SIM reader or scanner to copy the information on your SIM card, a memory chip in your mobile phone. Once a thief has the code to your SIM card, they can copy it and basically use your phone’s information to make phone calls for free. Well, it isn’t free of course. You get to pay for those calls. Be wary of where you leave your mobile phone.

You could fall prey to visual hacking. This is when you are hacked by someone who spies your computer screen and steals information.

Given how easily strangers can come in contact with us at work – and in life, it’s worth thinking about. It’s also easy to imagine a thief pulling out a smartphone and taking a close-up photo of someone’s driver’s license, credit card or bank statement and slipping away without anyone being the wiser.

A spokeswoman for the Visual Privacy Advisory Council, suggests putting privacy filters and screen protectors on computer monitors, tablets and smartphones. That way, you can see what’s on your screen, but someone next to you, say on an airplane, can’t. And for those who are really worried, there are software filters that use facial recognition to recognize the computer user.

Someone could kidnap your digital identity. It may not be as troubling as getting your Social Security Number or credit card stolen, but it’s easy to imagine how someone could do a lot of damage to your reputation and more in this realm (i.e.; pretending to be you on Twitter).  Be sure to keep an eye out for this and review your security settings, along with changing your password frequently.

You could meet an old school thief. You might think that going off-the-grid has never sounded better. Give up an online presence. Get a landline. Just use cash. But you still need to be careful not to overlook old fashioned methods of identity theft.

One idea – if you use a check book, you may want to leave it at home and put a blank check in your wallet, if you’re going to be writing a check later in the day.  Just make sure your wallet isn’t left somewhere it can be swiped. Or photographed.

ID Theft Risks That Lurk in Your Child’s Backpack

Girl walking away from School Bus while texting on her phoneWhile you’re out searching for the perfect back-to-school backpack for your child, the more important consideration other than style, size, and color should be — what can happen if a dishonest person gets a hold of it? The things your child carries in his or her backpack can become a huge financial headache if they fall into the wrong hands.

With identity-related crimes at historic levels, the odds are better than ever that a dishonest person will know the basics of taking advantage of the kinds of personally identifiable information, sensitive data (like passwords and credit card numbers), and the many other keys to your household economy that can lurk in your child’s backpack.

Here’s a short list of what a relatively creative thief might find in your child’s backpack, and what you can do to prevent the worst from happening.

1. A Smartphone

While obvious to you (hopefully), does your child understand the serious potential for disaster that a walk-about smartphone can bring to your doorstep?

It can be as simple as a scammer dialing 611 and ordering new services. Chances are good that there’s enough information in your child’s backpack for a motivated thief to get your name and thus the keys to your telephonic kingdom.

But there are other identity indignities that can be done. Many people store user name and password information on the Notes app of their phones. The Notes may contain other informational cracks and crevices as well and open up unsuspecting third parties — relatives and friends — to scams. Email scams, grandparent scams, an iTunes or apps shopping spree, malware installation — so many tidbits to exploit.

What to do: Talk to your kids about the dangers of an unsecured phone and discuss basic data storage details with them — like what information shouldn’t be on their phones. Is the phone locked with a passcode? It should be! Also have them set strong (think creatively alpha-numeric) passwords, and a Find Me app to erase the contents should the device fall into the wrong hands.

2. Their Laptop

You don’t need to be a movie buff to know that a computer is a dangerous thing in the wrong hands. Most issues associated with a lost phone come to bear here as well. Emails can be sent to relatives or strangers in the service of stealing money or wreaking havoc.

Beyond the irresistible cornucopia of files that may well be saved on the device, email is a treasure trove of personally identifiable information — everything from credit card numbers to more data like name, address, email addresses and birthdays — pieces of a puzzle that can be assembled to present a believable story to a customer service representative and then steal valuable goods and services, or used as a fly trap to accumulate even more personally identifiable information.

Does your child have access to your Netflix account? How about Amazon or iTunes? Where else have they gone in cyberspace that might have their information — or yours? Open social media sites that are set to login automatically afford a wide vista of scamming opportunities too.

What to do: Make sure your child gets into the habit of logging out of all their online accounts, and that they don’t store sensitive information on their laptops. Talk to them about the wisdom of not saving user ID and password information, and how to make a good one. Finally, have your child set a password — shared with you — to protect their device against the wrong person accessing it.

3. Keys and Name Tags

So, this is pretty straightforward: If your child uses a karabiner to attach his or her keys to their backpack, you’ve got a potential robbery waiting to happen.

Additionally, there are apps that can allow a fraudster (as well as a person who might want to use the app to avoid unnecessary inconvenience) to make a copy of a key that a locksmith can duplicate.

What to do: Tell your child to keep the keys to your home in their pocket rather than on their back.

4. Gaming Device

Playstation Vita is a popular gaming device — and not the only device that could cause you a world of woe should it fall into the wrong hands — but we’ll single it out for the sake of illustration.

The good news: Your personally identifiable information is safe even if someone grabs the device, because it’s password-protected and associated with your gamer’s access to the network.

That doesn’t mean that a bad player can’t do some damage. First, they can play games and wreck your child’s sterling reputation in the community. Worse: Whoever has that device can buy games and run up a hefty bill. One-click purchased games are something any malicious third party can rack up in the way of a very expensive just-because crime.

What to do: Have your child set a passcode for access to the device and make sure they share it with you.

When it comes to data security, best practices are universal. It’s your job to pass on what your kids need to know to stay safe and keep your family out of the crosshairs of ID theft.

Article Source: Adam Levin for Credit.com, http://www.today.com/parents/identity-theft-risks-lurk-your-kids-backpack-1D80042370

Smishing – An ID Theft Scam

Have you been “smished” lately? Be on the alert for text messages with links — they could be an ID theft scam known as smishing.

Similar to phishing (which involves email), smishing uses cell phone text messages to deliver bait that’s intended to get you to divulge personal information. Smishing may involve winning a prize or a message that contains something that requires your immediate attention — the link tells you to “click here.” If you click on the infected link, it downloads malware that allows the bad guys to gain control of your device remotely. They can then use your phone from anywhere in the world to access your banking information, credit card data and the like.

What to do:
If you receive a text message that asks for sensitive information –

  • Do not reply to the message.
  • Do not click on any of the links that may be embedded in the message.
  • Contact your carrier’s privacy or fraud team. If their company name or brand is used in efforts to fraudulently obtain personal information, they may choose to pursue legal action.
  • Contact your financial institution to be sure your accounts have not been compromised.

Visit the FTC Identity Theft website to learn more about how to minimize damage from identity theft. If you believe that you have been a victim of a smishing scam, you can file an online complaint with the Federal Trade Commission’s Report Fraud webpage. You can also call the FTC toll-free at 1.877.FTC.HELP (1.877.382.4357).

Bottom line: Avoid clicking!

Save someone from getting smished:
As technology provides new ways to expose and defend against familiar scams, clever con artists devise new ones. Please share this with loved ones and friends — smish be gone, pass this on!

If you notice any fraudulent activity on any of your First Financial accounts, contact us by calling 732.312.1500, emailing info@firstffcu.com or stopping into any one of our branches.

Article Sources: http://www.andersoncooper.com