NEW CONTENT 03-24-2024

Page index:
Is Identity Theft Protection Worth It? - - NEW 03-24-24 - -
What To Do If You’re Billed For An SBA EIDL Or PPP Loan You Don’t Owe - NEW 09-24-2023
Ten Telltale Signs That Someone Has Stolen Your Identity - NEW 09-24-2023
How To Safely Wipe Your Phone When Repair Isn't An Option
Military Families Combat ID Theft Amid Life Transitions
You Can Protect Yourself From Identity Theft During Tax Season
Tips To Protect Yourself From Mail Theft This Holiday Season
Email Saying Your Personal Info Is For Sale On The Dark Web?
Is A Credit Freeze Or Fraud Alert Right For You?
Keep Your Personal Information Safe
How To Tell If Someone Is Using Your Identity
Identity Theft Can Happen To Anyone
Stolen identity? Get help at IdentityTheft.gov
7 Ways to Help Protect Your Identity
Your Guide To Protecting Your Privacy Online
Identify Theft
Social Media Is No Place For COVID-19 Vaccination Cards
Identity Theft and Social Security
Fast Growing Form Of Identity Theft
7 FTC Consumer Alert Short Articles.
How to Protect Your Home From Deed Theft
Preventing and Responding to Identity Theft
Upgrading Your Phone? 4 Things You Should Do First
SIM-Swapping Scam
Many Older Articals

Visit our Active Scam Page for more information on how thieves trick you into giving them your personal information.



The U.S. Government's Federal Trade Commission has a pretty good web site to help you with all kinds things like Privacy, Identity, & Online Security Money & Credit, Homes & Mortgages; Health & Fitness, Jobs & Making Money, and Scam Alerts. Federal Trade Commission Consumer Information




Is Identity Theft Protection Worth It?

By Sarah Brady for Kiplinger Personal Finance March 2024
Should you consider identity theft protection? Monitoring services can help you spot red flags quickly, but they won’t stop criminals from targeting you.

“An ounce of prevention is worth a pound of cure.” When Benjamin Franklin penned this enduring phrase nearly three centuries ago, he was advising the public on how to avoid house fires. But his words are also useful when applied to a modern safety issue: identity theft.

By some estimates, roughly one-third of U.S. residents have experienced some form of identity theft - a crime that includes everything from credit card theft to tax fraud to insurance fraud - and that figure is expected to rise. For some consumers, the instinct is to turn to a familiar brand such as Norton, Equifax or McAfee for protection. Each of them offers something different, and you can subscribe to one of their plans for yourself or your family for just a few dollars a month (or in some cases, for free).

Do ID theft protection services really work?

It depends on what you’re looking for. Identity theft plans typically include some combination of account monitoring, alerts and restoration support. In other words, they don’t stop criminals from targeting you — they just respond to identity theft once it has happened.

“ID protection services largely entail cleanup rather than prevention,” says Mitch Mayne, a cybersecurity consultant and former incident responder for IBM Security X-Force. “While these services can offer some benefits to victims, they also create a false sense of security, which leads users to neglect basic cyber hygiene.”

According to Aura, a company that provides identity theft protection plans, you don’t necessarily need ID protection services. “While monitoring and fraud alerts are valuable ways to protect your identity, they don’t do anything you can’t do on your own,” Aura’s website says.

If you do decide to pay for ID protection, keep in mind that not all plans are created equal. The best plans come with tried-and-true, unfussy features such as VPNs, which hide your IP address and encrypt your data while you browse the internet, and password managers, which generate and store unique passwords for each of your accounts. A password manager may be the most valuable offering. “Sign-in credentials are frequently compromised and quickly sold on the dark web,” says Mayne, “so a password manager can provide some solid risk mitigation.”

Many plans, however, are packed with flashy features that may not deliver, such as identity theft insurance, which typically covers the costs you incur during the recovery process but doesn’t cover your financial losses, and live restoration support, which gives you access to live customer service agents after you experience an identity theft incident or receive an alert that your information may have been compromised. “It can be incredibly difficult to get an insurance claim approved by an ID theft monitoring company,” Mayne warns, “and even with their help responding to an incident, it can take years to get your money back and restore your identity. For some people, the damage is never fully undone.”

A multipronged approach

These services are not a cure-all for the myriad threats your identity faces, but when combined with good habits (more on those below), some targeted services can help.

For example, DeleteMe, which has plans starting at $8.71 a month, helps prevent damage by finding and removing your personally identifiable information (PII) from data-broker websites. “Most of us have our PII available for purchase from multiple data-broker sites, so this removal lowers your risk footprint overall,” says Mayne.

For password management, 1Password is well-reviewed and highly recommended for its long list of security features, which include a mix of advanced encryption, biometrics (face and fingerprint identification) and ease of use. Plans start at $2.99 a month, and you can sign up for a free, 14-day trial.

For more-comprehensive monitoring, prioritize services that offer restorative and preventative support. For example, both of the identity theft protection plans from IDShield come with guaranteed identity restoration, which gives you unlimited access to live customer support, but they also include password managers and VPNs. They offer some degree of credit-score and credit-report monitoring as well. ID Shield plans start at $14.95 a month.

Consider the free alternatives

Many people don’t realize they already have free services available to them through their relationships with financial institutions. If you have a Mastercard credit card or debit card, for example, you can visit mastercardus.idprotectiononline.com to sign up for free restoration and monitoring services, including alerts if your user credentials are compromised in a corporate data breach. (Keep in mind that you have liability protections for your bank and credit card accounts, too. For example, American Express, Discover, Mastercard and Visa credit cards all come with zero-liability protection, which means you won’t have to pay a single dollar lost due to a fraudulent charge made on your account.) You may also have a free identity theft protection plan through your employer, and some renters and homeowners’ insurance policies include protection for financial accounts, too.

“Many identity theft protections already come with products you use - your antivirus software, for example,” says Mayne, “so it’s worth your time and money to understand what you already have available before buying another product that does the same thing.”

You can also explore free services online. For example, to find out if your information has been “pwned,” or compromised in a data breach, and sign up for future data breach alerts, try using haveibeenpwned.com. As for securing your credit reports and preventing certain forms of credit card fraud, you can set up a credit freeze, which blocks anyone from opening up a new loan or credit card in your name, by contacting the three national credit bureaus (Experian, Equifax and TransUnion). You can also visit AnnualCreditReport.com to pull your credit reports for free once a week and review them for signs of fraud, such as hard inquiries for loans and credit cards you have not applied for.

Perhaps the best news for people hoping to save money is that you are your own strongest defense against identity theft. “The best way to protect your identity is by consistently taking free, preventative actions,” says Mayne. That includes using unique and complex passwords for each of your accounts, enabling multifactor authentication for account sign-in, and installing software updates for your devices, apps and web browsers as soon as they’re available. Additionally, you should never click links or attachments that appear in unsolicited text messages and e-mails; they may lead to scam websites or install malware on your device.

Return to top of page.


What To Do If You’re Billed For An SBA EIDL Or PPP Loan You Don’t Owe

By Rosario Méndez Attorney, FTC September 26, 2023

Did you get a bill for a Small Business Administration Paycheck Protection Program (PPP) loan or COVID-19 Economic Injury Disaster Loan (EIDL) you never applied for? If the answer is yes, an identity thief probably used your personal information to get the loan. Here's how to report this problem and start the SBA review process to help you clear up any credit problems the identity theft may have caused.

Step 1. Report the identity theft to the Federal Trade Commission at IdentityTheft.gov IdentityTheft.gov.

  • You’ll get an FTC Identity Theft report and a personal recovery plan.
  • Save a copy of your FTC Identity Theft Report. You’ll need to submit it to the SBA.
  • Follow the personal recovery plan to stop further misuse of your personal information and help repair the damage the identity theft caused.

Step 2. Visit the SBA’s website at sba.gov/idtheft sba.gov/idtheft.

  • Follow the steps there to report the identity theft to the SBA. This step is required to start the SBA review process.

Step 3. If the identity theft involved a PPP loan and you know the private lender that issued the loan, contact the lender, too.

  • Explain that an identity thief used your personal information to get the PPP loan without your knowledge or authorization. Tell them the loan is fraudulent.
  • Ask the lender to release you from the loan and to take all the steps needed to remove information about the loan from your credit files.
  • Ask the lender to send you a letter explaining the actions it’s taken.
  • Write down who you spoke with and when. You may need to contact the lender again.
  • Know that the lender may require a copy of your FTC Identity Theft Report and other documents. This sample letter can help you get things started.

For questions about COVID-19 EIDL identity theft, contact SBA COVID-19 EIDL Customer Service at 833-853-5638 or by email at IDTRecords@sba.gov.

For questions about PPP loan identity theft, contact the SBA by email at PPPIDTheftInquiries@sba.gov.

Return to top of page.


Ten Telltale Signs That Someone Has Stolen Your Identity

From recognizing the red flags to getting ahead of trouble before it strikes By Kurt Knutsson, CyberGuy Report in Fox17 News

How would you feel if someone else pretended to be you online? That’s essentially what identity theft is, and it can happen to any of us. You have something very important that makes you who you are – your digital identity. It’s like a puzzle made of pieces of your personal information, financial transactions and online interactions.

Unfortunately, like anything of value, it isn't immune to theft. Bad people want to steal your identity and use it to commit fraud and rob you blind. Identity theft is a serious threat that can be hard to detect. However, you can look for some clues that someone is trying to steal your identity and take steps to protect yourself.

Signs of identity theft and ways to prevent it

1. Unfamiliar credit card charges

Unexpected charges on your credit card statement are one of the earliest warning signs of identity theft. Even small, seemingly insignificant purchases can be a thief testing the waters before a full-blown shopping spree.

What to do

I recommend you regularly review your statements, and if you spot unrecognized transactions, contact your bank to dispute these charges and secure your account.

2. Missing bills

If you notice that your regular bills or correspondence aren't showing up, it might be because an identity thief has redirected your mail to another address. It's a cunning move to keep you in the dark about their illicit activities.

What to do

Regularly monitor your bills. If they stop arriving, contact your service providers to confirm their mailing addresses on file.

3. Sudden surge of junk mail

If you've been targeted, you might notice a significant increase in unsolicited credit card offers or pre-approved loans. This could indicate that someone has been checking your credit history without your knowledge.

What to do

You can reduce such junk mail by opting out of prescreened credit offers and consider instituting a credit freeze to prevent unauthorized credit accounts. When you place a security freeze, creditors cannot access your credit report. This will keep them from approving any new credit account in your name, whether it is fraudulent or legitimate. While this can be an effective deterrent, it comes with the hassle of negotiating access each and every time you apply for credit.

How to freeze your credit report for free

Contact each of the three major credit reporting agencies to submit your request online, by phone or by mail.

Note: To let lenders and other companies access your credit files again to create new accounts, you will need to lift your credit freeze permanently or temporarily.

4. Unexpected IRS notifications

If the IRS flags multiple tax returns filed in your name or if you're declared as an employee in a place you've never worked, it's a telltale sign that someone is misusing your social security number.

What to do

Report these incidents to the IRS immediately, and follow their guidance, which may include completing an Identity Theft Affidavit.

5. Unexplained changes in your credit score

Regular credit checks are your friend. Notice an unexpected plummet in your credit score. It may indicate that an identity thief has been opening credit accounts or making large purchases in your name, and worse, they don’t pay the bills.

What to do

Regularly monitor your credit score. If it drops suddenly, contact the credit bureau to dispute inaccuracies and set up credit-monitoring services.

6. Unrecognized accounts on your credit report

An unexpected loan or credit account appearing on your credit report is a glaring sign of identity theft.

What to do

Such anomalies should be immediately investigated with the credit bureau and the respective financial institution and reported to the FTC.

If you want a service that will walk you through every step of the reporting and recovery process, one of the best things you can do to protect yourself from this type of fraud is to subscribe to an identity theft service.

Identity theft-protection companies can monitor personal information like your Home title, Social Security Number (SSN), phone number, and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals.

One of the best parts of using some services is that they might include identity theft insurance of up to one million dollars to cover losses and legal fees and a white glove fraud-resolution team where a U.S.-based case manager helps you recover any losses.

7. Denied medical claims

If you're suddenly informed that you've reached your limit for a medical claim, it might mean that a fraudster has used your insurance details. Similarly, notices about unknown medical conditions or procedures could indicate that your medical identity has been compromised.

What to do

Notice something fishy? Alert your healthcare provider and insurance company. Scrutinize your explanation of benefits (EOB) and report any services you didn't receive.

8. Calls from debt collectors

Unexpected calls from debt collectors about unpaid bills for products or services you never bought can signal identity theft. An identity thief may have used your details to make purchases, leaving you with the bill.

What to do

Request validation of the debt, dispute it with the creditor, report the situation to the credit bureaus, and file a complaint with the FTC if you suspect you're a victim of such theft.

9. Unexpected contact from financial institutions

Be wary of unsolicited contact from financial institutions you have no relationship with. If a bank you've never used before sends you a notice, someone may have opened an account using your stolen identity.

What to do

Contact the institution to close the fraudulent account, notify your local law enforcement, and report to the Federal Commission (FTC) if you think this has happened to you.

10. Irrelevant job offers

Unsolicited job offers, especially ones that seem irrelevant to your field or too good to be true, may indicate that someone is using your personal information to search for jobs or build a false identity.

What to do

If you suspect that the job offer is fraudulent or part of a scam, report it to the relevant authorities. You can contact your local law enforcement agency or file a complaint with the Federal Trade Commission (FTC).

I've been scammed! What to do next?

Below are some next steps to take if you find you or your loved one is a victim of identity theft.

  • If you can regain control of your accounts, change your passwordsand inform each account provider.
  • Look through bank statements and checking account transactions to see where outlier activity started.
  • Use identity theft protection: Identity theft-protection companies can monitor personal information like your home title, Social Security Number (SSN), phone number and email address and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. One of the best parts of using some services is that they might include identity theft insurance of up to one million dollars to cover losses and legal fees and a white glove fraud resolution team where a U.S.-based case manager helps you recover any losses.
  • Report any breaches to state and local law enforcement and government agencies.
  • Get the professional advice of a lawyer before speaking to law enforcement, especially when you are dealing with criminal identity theft. Seek legal advice if being a victim of criminal identity leaves you unable to secure employment or housing.
  • Alert all three major credit bureaus, and possibly place a fraud alert on your credit report.
  • Run your own background check or request a copy of one if that is how you discovered that your information has been used by a criminal.

If you are a victim of identity theft, the most important thing to do is to take immediate action to mitigate the damage and prevent further harm.

Kurt's key takeaways

In our daily stroll through the digital park, we've encountered some menacing signs of identity theft. While it's important to be aware of the potential pitfalls, it's equally vital to remember that these online spaces are not all doom and gloom. After all, they're the same avenues that allow us to connect, share, and explore like never before.

It's all about learning to walk these paths with our eyes wide open and with as much resilience to fend off all the bad stuff targeting our lives more and more online. The whole idea is not just about reacting to the signs of identity theft but anticipating and arming ourselves against it. It's about taking the steering wheel of our digital lives into our hands and driving with confidence, not apprehension.

Return to top of page.


How To Safely Wipe Your Phone When Repair Isn't An Option

By Kurt Knutsson, CyberGuy Report July 10, 2023 for Fox News

Don't sell, trade in or recycle non-functional phones without doing this first

So, your trusty smartphone has seen better days, and you've come to the realization that it's time for a new one. Maybe it's dead, or perhaps it's beyond repair. Either way, you want to make sure all your personal data is securely wiped from your iPhone or Android device before bidding it farewell. We'll walk you through the steps to safely wipe your smartphone clean, ensuring your sensitive information stays protected, even if it's non-functioning. Let's dive in and give your old device a proper send-off.

4 Steps To Take For A Non-Functional Phone

1. Erase the phone remotely

To erase your phone's data remotely, you'll have needed to previously set up either iPhone's ‘Find My’ app or Samsung's ‘Find My Mobile’. It works on all Galaxy phones and tablets running Android 8 or later. If you had either Find My or Find My Mobile set up, you should be able to log into the site to remotely lock and wipe your device.

To erase your iPhone, using Find My:

  • Go to ‘icloud.com/find’ and sign in with your Apple ID
  • Click on ‘All Devices’ and select the ‘device’ you want to erase
  • Click on Erase iPhone to erase all data on your iPhone

A confirmation email will be sent to your Apple ID email address.

To erase your Samsung's data using SmartThingsFind:

    Go to the SmartThings Find website.
  • Select your ‘device’ on the left side of the screen and tap it
  • Select ‘Erase data’ on the right side of the screen

By doing this, you’ll erase the device’s data, and no one will be able to access your personal information.

Log in and select your device, then follow the steps to either ‘Erase iPhone’ or’ Erase Data’ on Android.

To erase your Android data using Find My Device

If you lose an Android phone, you can erase it remotely using ‘Find My Device’. If you've added a Google Account to your device, ‘Find My Device’ is automatically turned on.

How to erase an Android device remotely:

    On a browser, go to android.com/find
  • Sign in to your Google Account If you have more than one device: At the top of the sidebar, select the device. If your device has more than one user profile: Sign in with a Google Account that's on the main or personal profile
  • If you have more than one device: At the top of the sidebar, select the device.
  • If your device has more than one user profile: Sign in with a Google Account that's on the main or personal profile
  • On the left, select ‘ERASE DEVICE’. It will then ask to confirm that it is really you by using your passkey.
  • It will then prompt you to confirm your decision again. Tap ‘ERASE DEVICE’. Note: This permanently deletes all data on your device but may not delete SD cards. After you erase it, Find My Device won't work on the device.

2. Remove the SIM card

your phone still has a physical SIM card, take it out of the phone before getting rid of the phone in any way. While there may still be data you saved directly to the phone, the SIM card will at least prevent anyone from using your phone number if they are, for some reason, able to get the phone running again. If you use an eSIM, contact your cellphone network carrier to have them disable it from your device.

3. Contact your phone carrier

Inform your phone carrier and let them know that your phone is no longer in use, and they should be able to make sure your phone number and account are no longer associated with that device. While they may not be able to remove any information from the phone directly, they may be able to help you dispose of the phone properly.

4. Plug it into a computer

Sometimes a phone may appear to be completely dead while there is actually just an issue with the screen. You would have no idea of that since you can't turn your phone on, so as a last resort, it doesn't hurt to try plugging it into a computer to see if you're able to retrieve any data.

If you have an iPhone, try opening iTunes or the Photos app to see if your phone appears as an external device. If it does, and you're able to access any content on your phone, back up your data through your computer.

For more information on how to do this, head to Cyberguy.com/MobileBackup.

5. Disposing of your phone properly

It's important to properly dispose of electronic devices, such as iPhones and Androids, as they can contain hazardous materials that can harm the environment. The batteries should not be thrown away with regular household trash.

You can bring any smartphone into most electronics stores, like Best Buy, and have it recycled for free. You can also recycle devices online through sites like Apple (yes, they accept devices other than iPhones), Google or even Amazon, which has an amazing free recycling program. Amazon does also offer trade-ins for functioning devices that can be redeemed as Amazon gift cards. There are other sites like Decluttr that let you sell old devices.

You can also check your local trash electronic recycling programs to see where you can recycle devices locally. The Environmental Protection Agency has a list of donation and recycling programs listed.

Kurt's key takeaways

When it's time to say goodbye to your old smartphone, you have to make sure your personal data is safe and sound. Follow these steps, and you'll keep your info protected, even if your phone is on the fritz or not working. First, use the right app to erase your phone remotely. Then, pop out that SIM card to keep your number secure. Don't forget to give your phone carrier a heads up too. And hey, let's not forget about the environment. Dispose of your phone responsibly by recycling or donating it through Apple, Google, or other organizations. With these tips, you can say goodbye to your old cell phone without any worries.

Return to top of page.


Military Families Combat ID Theft Amid Life Transitions

By Terri Miller, FTC - July 25, 2022

It’s summer, peak moving season for military servicemembers and their families. You’ve got enough on your plate without having to worry about identity theft. But the reality is scammers are getting more and more clever with their tactics to swindle members of the military community. In fact, five years of identity theft data reported to the FTC on IdentityTheft.gov shows that active duty servicemembers are 76% more likely to report that an identity thief misused an existing bank or credit card account. So, here’s the BLUF, the bottom-line up front: Protect your identity by protecting your personal information.

Whether you’re moving, deploying, or simply enjoying your summer plans, protect yourself by following these rules of engagement:
Track your bank account activity. Check to see if your bank offers alerts for every transaction or transactions over a certain amount. Many banks have mobile apps that let you report lost or stolen debit cards and unauthorized transactions immediately.
Lock or freeze cards you’re not using. Identity thieves can’t misuse your debit and credit cards if they’re on hold. Mobile apps give you quick access to lock and unlock your cards as needed.
Sign up for free credit and identity monitoring. The Free Electronic Credit Monitoring for
Active-Duty Military Rule gives you access to free services like notifications whenever there’s activity on your credit reports. Add an active-duty alert to your credit report to require creditors to take extra steps to verify your identity before granting credit in your name.

If you suspect identity theft, report it to the FTC at IdentityTheft.gov.

Return to top of page.


How You Can Protect Yourself From Identity Theft During Tax Season

By Alicia Smith, FOX 17 Jan 26, 2023

Tax season is officially underway, and it's a good time to not only get your papers, receipts and documents in order, but also be proactive in protecting your identity.

Preventing identity theft should be a year-round effort. Ian Lyngklip is a consumer lawyer in Oak Park. He said his office gets calls every day from people who have problems with accounts that are not theirs showing up on their credit report.

He recommends you set up a credit file on your computer where you can put all your credit-related information in one place. "The reason you need it is because people have a lot of accounts that they may not remember. You know, they open credit cards, they close them, they change them because they like the points or the benefits," Lyngklip said.

He also suggests you review your credit reports for free through AnnualCreditReport.com to look for mistakes or irregularities. Also, you can freeze your credit to prevent new fraudulent accounts in your name. Just contact Equifax, Experian and TransUnion for a step-by-step guide.

You can also use a password manager like 1Password , Keeper, or Dashlane.

During tax season, if you're using online tax preparation products or hiring a tax professional, opt for multi-factor authentication to securely access an account. It's optional, and prompts you to enter a username, password, and a number texted to your cell phone.

Tax-related identity theft happens when someone uses your personal information to file a tax return claiming a fraudulent refund.

If you can't e-file because of a duplicate Social Security Number, among other red flags, you'll need to take action.

  • Respond immediately to any IRS notice in the mail, and call the number provided!
  • If necessary, Form 14039, the Identity Theft Affidavit, is a fillable form at IRS.gov that can be printed and attached to your return, then mailed in.

    Be vigilant about protecting your data and your identity.

    Remember, the IRS will never initiate contact with you by email, text, or social media to request personal or financial information.

    The IRS will never call, email, or text to request your Taxpayer Identity Protection PINs.

    If you suspect you've been a victim of tax-related identity theft, you still have to pay your taxes and file your return on time, even if it's a paper return you have to mail in. Consumers who have experienced identity theft an also report it to the Federal Trade Commission. You can request a personalized recovery plan from the FTC at. identitytheft.gov

    Return to top of page.


    Tips To Protect Yourself From Mail Theft This Holiday Season

    By: John Matarese, FOX 17, Dec 05, 2022

    Has any of your mail gone missing this year?

    An unfortunate nationwide trend could be to blame, impacting your holiday season gifts and checks. Reports across the country this year tell of thieves stealing mailbox keys, then grabbing checks out of blue mailboxes.

    It happened recently to Dorothy Glass, who had a check go missing over the summer.
    "We put some in the blue box one time, and it got taken," she said.

    David Maimon, a criminal justice professor at Georgia State University, says the problem is getting worse, not better.

    "Unfortunately, everything that is deposited in the blue box could end up in the criminals' hands" he said.

    His team monitors the number of checks being sold by criminals online, who "wash" the ink off them, then offer the blank checks to the highest bidder. It started with about 115 checks per week in October 2020. A year later, he said, he found 300 checks per week offered for sale.

    But now it's a crisis, with many more stolen checks up for sale to thieves.
    "Nowadays, we're talking about almost 3,000 checks every week," Maimon said.

    In most cases, he said, they were stolen from USPS mailboxes by thieves with a key.

    Ways to protect your mail

    Of course, there are many reasons for delayed or missing mail. The U.S. Postal Service has warned about staffing shortages at the post office leading to delivery delays that are expected to worsen during the busy holiday season. So it's more important than ever to stay on top of what you send and receive. You can do that with the free USPS service "Informed Delivery"

    Mark Lancaster no longer worries about what should be arriving or what might have gone missing. He recently signed up for the program.
    "You will start getting daily emails showing what is on the way that day," Lancaster said.

    He showed us a bill from Capitol One that corresponded to an image he had received in an email that morning.

    In addition, the Postal Service suggests you:
    • Never leave mail in a mailbox overnight.
    • Deposit mail in blue boxes right before the last pickup time posted.
    • Drop checks inside the post office, not in a blue street mailbox.

    David Maimon also recommends paying your bills online rather than with paper checks. Between skipping the blue mailbox and signing up for Informed Delivery, Lancaster sleeps better this holiday season.

    "You don't really have any surprises anymore," he said.

    That way, you don't waste your money.

    Return to top of page.


    Older Articals:

    The Technophobe’s Guide To Cybersecurity
    Thieves Create False Identities Using Child's S. S. Number
    Keep Financial Information Safer on Your Phone
    Latest Hacker Target: Cell-Phone Accounts
    Fake Unemployment Claims On The Rise In Michigan
    Five Things You Must Do If Your ID Is Stolen
    Tax Return Identity Theft
    Protecting Dead Relatives Identity.
    Prevent I.D. Theft After A Loved One Dies.
    File a Complaint with the Federal Trade Commission
    Credit Bureau Contact Info
    Hackers Target Bank Accounts Through Your Phone.
    Good Advice to Help Stop Phishing.
    New Form of Identity Fraud Soars as Crooks Switch Tactics
    What’s left behind: Junkyard identity theft
    Don’t Always Share Everything With Facebook
    Crooks Have a New Way to Break into Cars
    Your Fingerprint Won’t Protect Your Accounts
    Cyber Thieves May Have Your Social Security Number
    Protect Your Password
    Ways To Protect Yourself After A Data Breach
    What To Do After A Personal Data Breach
    You Have Fallen For A Scam! Now What?
    Personal Information Safety Tips
    Simple tips to avoid identity theft
    Your Vehicle and Identity Theft - Partners in Crime
    Heartbleed Security Bug
    Wireless Router Data Safety Basics
    Damage Control Plan After Password Theft
    Travel Safety Tips For Electronic Devices
    New Car Robbery Tactic
    Beware of RFID technology!
    Phishing
    DIY Identity-Theft Protection

    Return to top of page.



    Email Saying Your Personal Info Is For Sale On The Dark Web?

    People are telling us they've gotten emails warning that their sensitive personal information is being sold in the shadowy marketplaces of the dark web. Some emails list the stolen information, like all or part of the person's Social Security number, date of birth, and driver's license number. If you've gotten one of these emails, take steps to help protect yourself against financial loss from identity theft.

    Don't click a link or use a phone number in the message. It could be a “phishing” email, designed to trick you into disclosing sensitive information to scammers. If you think the message is legit - for example, if you have a credit monitoring service or a credit card with a company that monitors the dark web - contact the company using a website or phone number that you know is real.

    Change your passwords to secure your accounts. Start by changing the passwords on your email accounts. Email accounts often are the weak link in online security because password resets for other accounts go to your email. If your email account password has become known, then an identity thief can log into your account and intercept your password reset emails.
        Pro tip: When setting up new passwords, consider using a password manager. Free ones are built into most browsers and will automatically create passwords that are hard to guess. Be sure to use different passwords for each account and, if the account offers multifactor authentication, use it for added security.

    Check your credit reports. After securing your accounts, make sure nobody has opened new accounts using your information. Visit AnnualCreditReport.comto get an annual free credit report from each of the three nationwide credit bureaus, Equifax, Experian, and TransUnion. Through December 2023, you can get a free credit report every week from each of them at the website. If you find an account or transaction you don't recognize, visit IdentityTheft.gov IdentityTheft.govto report the identity theft and get a personal recovery plan.

    Consider freezing your credit. A credit freeze, also known as a security freeze, is free to place and remove and is the best way to protect against an identity thief opening new accounts in your name. Alternatively, place a free fraud alert on your credit to make it more difficult for an identity thief to get new credit in your name.

    Visit IdentityTheft.gov/databreachfor more steps to take, depending on what information was exposed. And, if you get one of these emails, please tell us at. ReportFraud.ftc.gov.

    Return to top of page.


    Is A Credit Freeze Or Fraud Alert Right For You?

    To help, protect against identity theft, consider placing a free credit freeze and a fraud alert
    By Seena Gressin - FTC Feb. 3, 2022

    Credit freezes and fraud alerts can help. Both are free and make it harder for identity thieves to open new accounts in your name. One may be right for you.

    Credit freezes
    A credit freeze is the best way you can protect against an identity thief opening new accounts in your name. When in place, it prevents potential creditors from accessing your
    credit report. Because creditors usually won't give you credit if they can't check your credit report, placing a freeze helps you block identity thieves who might be trying to open accounts in your name.

    A freeze also can be helpful if you've experienced identity theft or had your information exposed in a data breach. And don't let the "freeze" part worry you. A credit freeze won't affect your credit score or your ability to use your existing credit cards, apply for a job, rent an apartment, or buy insurance. If you need to apply for new credit, you can lift the freeze temporarily to let the creditor check your credit. Placing and lifting the freeze is free, but you must contact the national credit bureaus to lift it and put it back in place.

    Place a credit freeze by contacting each of the three national credit bureaus, Equifax, Experian, and TransUnion. (See the link below) A freeze lasts until you remove it.

    Fraud alerts
    A fraud alert doesn't limit access to your credit report, but tells businesses to check with you before opening a new account in your name. Usually, that means calling you first to make sure the person trying to open a new account is really you.

    Place a fraud alert by contacting any one of the three national credit bureaus. That one must notify the other two. A fraud alert lasts one year and you can renew it for free. If you’ve experienced identity theft, you can get an extended fraud alert that lasts for seven years.

    Learn more about credit freezes, fraud alerts, and active-duty alerts. And, if identity theft happens to you, visit IdentityTheft.gov to report it and get a personal recovery plan.

    Return to top of page.


    Keep Your Personal Information Safe

    By Jim Kreidler, FTC, December 27, 2021

    As 2021 winds down, lots of us are making resolutions for a fresh start in the New Year — maybe to exercise regularly, get our finances in order, or spend more time with friends. But your list isn’t complete until you add “update my security software” and “protect my personal information” to the mix. Scammers and hackers are always looking for new ways to steal your personal information online.

    Here are some steps you can take to help protect yourself and your information:

    1st - Keep your security software, internet browser, and operating system up to date. Updating your software regularly helps make sure you have critical patches and protections against security threats.

    2nd - Create and use strong passwords. Making a password longer - 12 characters or more - is one of the easiest ways to increase its strength. Consider using a passphrase of random words so that your password is more memorable, but avoid using common words or phrases. Check out this password checklist , and don’t use the same password for different accounts.

    3rd - Use multi-factor authentication. Some accounts offer extra security by requiring two or more credentials to log in. You may have to give both a password and a passcode you get from an authentication app to log into your account. Multi-factor authentication makes it harder for scammers to log in to your accounts even if they manage to steal your username and password.

    4th - Back up your data to protect it. Keep an extra copy of all your files with a secure cloud storage service, or save your files to an external storage device. That way, if something happens - say a virus, your device crashes, or you’re hacked - you still have your files.

    5th - Protect your home network. Your devices, accounts, and whole network are only as secure as your router, since it’s the connecting point between your devices and the internet. Check out how to make your router more secure.

    By taking a few steps, you’ll be able to enjoy the feeling of accomplishment that comes with checking something off your list! Also, remember to report fraud, scams, or bad business practices to the FTC at ReportFraud.ftc.gov.

    Return to top of page.


    How To Tell If Someone Is Using Your Identity

    By Alvaro Puig, FTC, February 2, 2022

    Have you seen:
    An unfamiliar account on your credit report?
    An unfamiliar transaction on your bank statement?
    Did the IRS say you already filed a tax return?

    Taking steps to protect your personal information can help you minimize the risks of identity theft. But what if a thief gets your information anyway? Here are some of the ways thieves might use your stolen information and signs you can look out for.

    An identity thief could use your information to get credit or service in your name.
    !    How to spot it: Get your free credit report at
    AnnualCreditReport.com. Review it for accounts you didn’t open or inquiries you don’t recognize. A new credit card, a personal loan, or a car loan will appear as a new account. A new cell phone plan or utility service — like water, gas, or electric — will show up as an inquiry.

    An identity thief could use your credit card or take money out of your bank account.
    !    How to spot it: Check your credit card or bank statement when you get it. Look for purchases or withdrawals you didn’t make.
    !    Bonus advice: Sign up to get text or email alerts from your credit card or bank whenever there’s a new transaction. This could help you spot unauthorized or fraudulent activity on your account.

    An identity thief could steal your tax refund or use your Social Security number to work.
    !    How to spot it: A notice from the IRS that there’s more than one tax return filed in your name could be a sign of tax identity theft. So could a notice that you have income from an employer you don’t work for.

    An identity thief could use your health insurance to get medical care.
    !    How to spot it: Review your medical bills and Explanation of Benefits statements for services you didn’t get. They could be a sign of medical identity theft.

    An identity thief could use your information to file a claim for unemployment benefits.
    !    How to spot it: A notice from your state unemployment office or employer about unemployment benefits that you didn’t apply for could be a sign of fraud.

    If you discover any signs that someone is misusing your personal information, find out what to do at IdentityTheft.gov.

    Return to top of page.


    Identity Theft Can Happen To Anyone

    By Jim Kreidler; February 1, 2022

    It’s the second day of Identity Theft Awareness Week and today we’re talking about steps that can help reduce your risk of identity theft.

    Many of us access our online accounts — credit cards, investments, insurance, or checking and savings accounts — nearly every day. In our digital world, bits of our personal information are everywhere. Identity thieves know this and look for ways — both high-tech, like lifting our passwords, or low-tech, like stealing our mail — to get their hands on our money and personal information.

    Since identity theft can happen to anyone, here are some ways to keep your money and personal information safe.

    # Protect documents that have personal information. Keep things with personal information — think financial records or Social Security and Medicare cards — in a safe place. Shred them before you throw them away. If you get statements with personal information in the mail, take your mail out of the mailbox as soon as you can.

    # Don’t share your Social Security number with someone who contacts YOU. While some organizations might need your Social Security number to identify you, they won’t call, email, or text you to ask for it. So if someone contacts you, asks you for your Social Security number, and says they’re from the IRS, your bank, or your employer — it’s a scam.

    # Protect your information online and on your phone. If you’re logging in to an online account, use a strong password [See: How Long Does It Take To Hack Passwords, on our
    Active Scam Page – Webmaster]. Add multi-factor authentication for accounts that offer it. Multi-factor authentication makes it harder for scammers to log in to your accounts if they do get your username and password.

    # Review your bills. Charges for things you didn’t buy, or an unexpected bill, could be a sign of identity theft.

    Remember to check out the free events and webinars each day of Identity Theft Awareness Week. And if you think someone has been using your personal information to open accounts, buy things, or file taxes, report it and get recovery help at IdentityTheft.gov.

    Return to top of page.


    Stolen identity? Get help at IdentityTheft.gov

    By Bridget Small FTC February 4, 2022

    When identity theft happens, it’s hard to know where to begin. That’s why the FTC created IdentityTheft.gov, a one-stop resource for people to report identity theft to law enforcement and to get step-by-step instructions on how to recover from any type of identity theft.

    The first step in avoiding identity theft, or stopping the damage, is placing a fraud alert on your credit report. This makes it harder for a thief to open new credit in your name, and lets you get free copies of your credit report from each of the three credit bureaus. Next, read through your reports and note any accounts or transactions that don’t belong. Then, go to IdentityTheft.gov.

    When you report at IdentityTheft.gov, you’ll answer questions and give details about what happened. Include information about any problems you spotted on your credit reports. IdentityTheft.gov will use that information to create your personalized:
    1. Identity Theft Report, which shows that someone stole your identity
    2. A recovery plan with step-by-step advice to help you fix problems.

    Your Identity Theft Report, recovery plan, and sample letters sample letters from IdentityTheft.gov will help you repair problems caused by identity theft. Your recovery plan may tell you to:
    a. Close new accounts opened in your name
    b. Remove charges made on your existing accounts
    c. Contact the three credit bureaus to correct your credit report
    d. Consider an extended fraud alert or credit freeze.
    e. Check your credit reports regularly. Through April 2022, you can check your reports every week for free at AnnualCreditReport.com.

    Return to top of page.


    7 Ways to Help Protect Your Identity

    From the Federal Trade Commission’s website FTC.gov

    Identity theft happens. It's an unfortunate fact of modern life. But there are certain steps you can take to help keep your personal information from falling into the wrong hands. Every day, you do things to protect what's most important to you. And you know what? You do them almost automatically. Routine things like looking both ways before you cross, brushing your teeth, and buckling your seat belt.

    Another routine to get into is keeping tabs on your identity and personal information. Here are seven easy ways you can do it:

    1. Read your credit card and bank statements carefully and often.

    2. Know your payment due dates.

    3. If a bill doesn't show up when you expect it, look into it.

    4. Read the statements from your health insurance plan.

    5. Make sure the claims paid match the care you got.

    6. Shred any documents with personal and financial information.

    7. Review each of your three credit reports at least once a year. It's easy, and it's free.

    And before you know it, protecting your personal information can be as routine as locking your doors at night.

    For more tips and tools on dealing with identity theft, visit ftc.gov/idtheft (Webmaster here – This is a great resource article!).

    Return to top of page.


    Your Guide To Protecting Your Privacy Online

    Maneesha Mithal, Division of Privacy and Identity Protection, FTC June 2, 2021

    The things we do throughout the course of our day give businesses access to information about our habits, tastes, and activities. Some might use it to deliver targeted ads to you, or to give you content based on your location, like stores nearby or the weather forecast. Others might sell or share that information.

    Whether you use a computer, tablet, or mobile phone to go online, there are things you can do to protect your privacy. Check out ftc.gov/yourprivacy, your guide to protecting your privacy online. Here’s what it covers:

    Online Tracking

    Learn how online tracking works and what you can do about it. Plus:
    * How to change your privacy settings on your browser, your internet-connected TV, and your phone
    * How to opt out of target ads
    * What to know about ad blockers
    * How to opt out of data broker sites that sell your personal information
    * What to know about privacy and mobile apps

    How To Secure Your Devices

    Find out how to secure your internet-connected devices, starting with your router — it’s the key to privacy at home and in your small business. Plus:
    * How to know when your voice assistant is listening and ways to protect your privacy * Important security features for smartwatches
    * Using internet-connected (IP) cameras safely
    * Why it’s important to remove your personal data before you sell your car
    * What to do if you’re selling a home and leaving behind a smart thermostat, refrigerator, or other device

    What To Know About Online Abuse and Harassment

    Did you know some apps let people track you through your phone without your permission? Learn about stalking apps, how to tell if there is one on your phone, and what to do if there is.

    If someone took or shared an intimate image of you without your consent, that’s considered non-consensual pornography. And that’s not OK. If that’s happened to you or someone you know, learn what steps you can take. ftc.gov/yourprivacy

    Return to top of page.


    Identify Theft

    By: Gerry Hafer; AMAC Foundation, March 26, 2021

    Webmaster – If you are looking for an alternative to the liberal AARP; try the conservative Association of Mature American Citizens; amac.us.

    What is Identity Theft?

    Let’s begin with a review of actually what identity theft is, using an official definition available from the U.S. Government Services and Information website, USA.gov. It goes like this: “Identity (ID) theft happens when someone steals your personal information to commit fraud. The identity thief may use your information to apply for credit, file taxes, or get medical services. These acts can damage your credit status, and cost you time and money to restore your good name.”

    According to the website IdentityTheft.gov, operated by the U.S. Federal Trade Commission, “Once identity thieves have your personal information, they can drain your bank account, run up charges on your credit cards, open new utility accounts, or get medical treatment on your health insurance. An identity thief can file a tax refund in your name and get your refund. In some extreme cases, a thief might even give your name to the police during an arrest.

    Preventing Identity Theft
    The USA.gov website offers a fairly comprehensive set of steps you can take to keep identity theft from occurring and impacting your life. We’ve re-printed them here for your convenience:
    • Secure your Social Security number (SSN). Don’t carry your Social Security card in your wallet. Only give out your SSN when necessary.
    • Don’t share personal information (birthdate, Social Security number, or bank account number) because someone asks for it.
    • Collect mail every day. Place a hold on your mail when you are away from home for several days.
    • Pay attention to your billing cycles. If bills or financial statements are late, contact the sender.
    • Use the security features on your mobile phone.
    • Update sharing and firewall settings when you’re on a public wi-fi network. Use a virtual private network (VPN), if you use public wi-fi.
    • Review your credit card and bank account statements. Compare receipts with account statements. Watch for unauthorized transactions.
    • Shred receipts, credit offers, account statements, and expired credit cards. This can prevent “dumpster divers” from getting your personal information.
    • Store personal information in a safe place.
    • Install firewalls and virus-detection software on your home computer.
    Create complex passwords that identity thieves cannot guess. Change your passwords if a company that you do business with has a breach of its databases
    • Review your credit reports once a year. Be certain that they don’t include accounts that you have not opened. You can order it for free from Annualcreditreport.com.
    • Freeze your credit files with Equifax, Experian , Innovis, TransUnion, and the National Consumer Telecommunications and Utilities Exchange for free. Credit freezes prevent someone from applying for and getting approval for a credit account or utility services in your name.

    How do you know if your identity has been stolen?
    Here are some clues that someone has stolen your information, courtesy of IdentityTheft.gov:
    + You see withdrawals from your bank account that you can’t explain.
    + You don’t get your bills or other mail.
    + Merchants refuse your checks.
    + Debt collectors call you about debts that aren’t yours.
    + You find unfamiliar accounts or charges on your credit report.
    + Medical providers bill you for services you didn’t use.
    + Your health plan rejects your legitimate medical claim because the records show you’ve reached your benefits limit.
    + A health plan won’t cover you because your medical records show a condition you don’t have.
    + The IRS notifies you that more than one tax return was filed in your name, or that you have income from an employer you don’t work for.
    + You get notice that your information was compromised by a data breach at a company where you do business or have an account.

    If your wallet, Social Security number, or other personal information is lost or stolen, IdentityTheft.gov provides some helpful direction on how to proceed to help protect yourself from identity theft. Click here to review them.

    Reporting Identity Theft
    Report identity (ID) theft to the Federal Trade Commission (FTC) online at IdentityTheft.gov or by phone at 1-877-438-4338. The Federal Trade Commission (FTC) and the FBI strongly suggest timely reporting of identity theft situations. In fact, reporting it to the FTC can provide you with a personal recovery plan designed to help you through the steps to close accounts opened in your name, eliminate fraudulent charges on your accounts, correct entries on your credit report, enacting credit freezes, block debt collectors from taking action on fraudulent charges, address criminal charges associated with the theft, and so on. In addition, the guidance can help you correct a variety of complications that arise from identity theft, like utility account charges, student loans, investment activities undertaken in your name, and even the correction of bankruptcy actions undertaken fraudulently in your name. To learn more about executing a recovery plan, visit the IdentityTheft.gov website.

    Return to top of page.


    Social Media Is No Place For COVID-19 Vaccination Cards

    By Seena Gressin, FTC February 5, 2021

    Some of you are celebrating your second COVID-19 vaccination with the giddy enthusiasm that’s usually reserved for weddings, new babies, and other life events. You’re posting a photo of your vaccination card on social media. Please — don’t do that! You could be inviting identity theft.

    Your vaccination card has information on it including your full name, date of birth, where you got your vaccine, and the dates you got it. When you post it to Facebook, Instagram, or to some other social media platform, you may be handing valuable information over to someone who could use it for identity theft.

    Think of it this way — identity theft works like a puzzle, made up of pieces of personal information. You don’t want to give identity thieves the pieces they need to finish the picture. One of those pieces is your date of birth. For example, just by knowing your date and place of birth, scammers sometimes can guess most of the digits of your Social Security number. Once identity thieves have the pieces they need, they can use the information to open new accounts in your name, claim your tax refund for themselves, and engage in other identity theft.

    Want to share the news about your vaccination? How about a photo of a nifty adhesive bandage on the injection site? (You can show off your tattoos and deltoids at the same time.) Or, post a photo of your white or orange vaccine sticker. The stickers are really cool.

    As for your social media networks, be sure that you’re not oversharing informationthat can serve as a key to your PIN number or answer a security question. And, while you’re checking, check your privacy settings too. If you want to limit access to a small group of family and friends, make sure the settings are configured to avoid sharing information with strangers.

    Visit How to Keep Your Personal Information Secure for more tips about protecting your information against identity thieves.

    Return to top of page.


    Identity Theft and Social Security

    By Tom Margenau, October 14, 2020, The Epoch Times

    Q: My purse was stolen, and now I worry that someone might be using my Social Security number. I called the Social Security office and was told to contact credit-reporting agencies and possibly the police. And they gave me some website to look up. It seems to me they should have done more. Can’t they just cancel my old number and give me a new one? Was I informed correctly?

    A: Yes, you probably were given correct information. When a Social Security card is stolen, so many people just naturally assume it is a problem for the Social Security Administration to resolve. But when you think it through, it really isn’t.

    And before I go on, let me give some advice. It’s too late for you. But it may help other readers. There is no need for you to be carrying your Social Security card in your wallet or purse. I haven’t carried my card around with me in more than 40 years. And I’ve never needed it. You generally might need to show your Social Security card to someone if you are applying for a job. Or maybe for some kind of government assistance. So, if you are doing that, then carry your card with you on that day. Otherwise, just keep it in a safe place at home.

    The same used to be true for Medicare cards. I never put mine in my wallet, unless I was going to the doctor. But now that Medicare cards no longer have our Social Security numbers on them, that is not such a big issue.

    Anyway, back to the story of what the Social Security Administration can do for you in cases of identity theft. As a general rule, the SSA gets involved in your life for three reasons. Their first job is to issue you a Social Security number. Their second job is to keep a lifetime record of all the earnings your employer reports under that SSN. Or, if you are self-employed, to keep track of the income you report on the Schedule SE (the Social Security part) of your annual tax return. The SSA’s third job is to pay you monthly retirement or disability benefits that are based on all those earnings that are posted to your Social Security account. Or if you die, they pay your widow(er) and/or children survivors benefits based on those same earnings.

    I don’t want to sound too flip or dismissive about this, but if someone steals your Social Security card, it’s really not the SSA’s problem. To put that another way, there isn’t that much they can do about it. About all they can do is help you monitor your Social Security earnings record. If you see earnings posted to that record that don’t belong to you, they can work with you to correct that record.

    But I doubt if that is your major concern right now. You are probably much more worried about someone misusing your Social Security number and other personal information to create credit problems. The first step you can take to getting this resolved is to go to IdentityTheft.gov to report the theft and to start a recovery plan. (I am sure this was the website the Social Security people referred you to.) This website is a one-stop resource managed by the Federal Trade Commission, the nation’s consumer protection agency. Or you can call them at 1-877-IDTHEFT.

    The identity thief also may use your SSN to get a job. That person’s employer would report earned income to the IRS using your Social Security number. This could get you in trouble with the IRS because it will make it appear that you didn’t report all of your income on your next tax return. If you think you may have tax issues because someone has stolen your identity, go to irs.gov/identity-theft-central.

    Also, you should file an online complaint with the Internet Crime Complaint Center, or the IC3. The IC3 gives victims of cybercrime a convenient and easy-to-use reporting mechanism that alerts authorities of suspected criminal or civil violations. IC3 sends every complaint to one or more law enforcement or regulatory agencies with jurisdiction. According to their website, the IC3 reflects a partnership between the Federal Bureau of Investigation, the National White Collar Crime Center, and the Bureau of Justice Assistance.

    Here’s another thought: You should also monitor your credit report periodically. You can get free credit reports online at annualcreditreport.com.

    And I’m sure you’ve done this already, but if you haven’t, you should report your stolen purse to your local police department.

    You wondered why the SSA didn’t just cancel your old number and give you a new one. That is something that can be done, but it really should be a worst-case scenario solution. In other words, if you have taken all the steps you can to resolve your problems with no luck, a new SSN can be issued to you.

    But you should keep in mind that a new number probably won’t solve all your problems. This is because other governmental agencies (such as the IRS and state motor vehicle agencies) and private businesses (such as banks and credit-reporting companies) will have records under your old number. Along with other personal information, credit-reporting companies use the number to identify your credit record. So, using a new number won’t guarantee you a fresh start.

    For some victims of identity theft, a new number actually creates problems. If the old credit information isn’t associated with your new number, the absence of any credit history under your new number may make it more difficult for you to get credit in the future.

    And finally, here is some more advice for all readers. Identity theft doesn’t just happen when someone grabs your purse or pickpockets your wallet. Nowadays, it happens more and more online, with scam artists posing as legitimate businesses. I get a dozen such emails every day, supposedly from my bank, my cable provider, or one of my credit card companies. They are usually bringing an alleged problem to my attention that requires me to send them account numbers or my SSN to resolve. But there is always some little hint, usually involving awkward language or syntax, that the message is fake.

    Just today, I got a message, supposedly from my email provider, telling me this: “The Classic version of Your Email is being replaced by a NEW version. It goes FAR in superiority. Click here before you lose your access.” I’m guessing that email, with such clumsy wording and misplaced capital letters, was written by some Ukrainian hacker using some bad Russian-to-English translation software!

    Return to top of page.


    Fast Growing Form Of Identity Theft Slips Through Traditional Protections

    Published in Bottom Line Personal newsletter 11-1-2020

    Says scam expert Steven J.J. Weisman, Esq., founder of the scam information website scamicide.com A scammer applies for credit using your Social Security number but different name and address so the fraud won't appear on credit reports and avoids a credit freeze. Watch for unfamiliar "aliases" on your credit reports. If your credit score drops 50 points or more despite no new problems or major activity, ask the credit bureaus for any "sub files" associated with your Social Security number but not your name. If they exist, follow procedures for reporting identity theft.

    Return to top of page.


    7 FTC Consumer Information Short Articles

    Equifax data breach: Pick free credit monitoring! - Just last week, the FTC and others reached a settlement with Equifax about its September 2017 data breach that exposed personal information of 147 million people. We’ve told you to go to ftc.gov/Equifax, where you can find out if your information was exposed and learn how to file a claim with the company in charge of the claims process. The public response to the settlement has been overwhelming, and we’re delighted that millions of people have visited ftc.gov/Equifax and gone on to the settlement website’s claims form.

    But there’s a downside to this unexpected number of claims. First, though, the good: all 147 million people can ask for and get free credit monitoring. There’s also the option for people who certify that they already have credit monitoring to claim up to $125 instead. But the pot of money that pays for that part of the settlement is $31 million. A large number of claims for cash instead of credit monitoring means only one thing: each person who takes the money option will wind up only getting a small amount of money. Nowhere near the $125 they could have gotten if there hadn’t been such an enormous number of claims filed.

    So, if you haven’t submitted your claim yet, think about opting for the free credit monitoring instead. Frankly, the free credit monitoring is worth a lot more – the market value would be hundreds of dollars a year. And this monitoring service is probably stronger and more helpful than any you may have already, because it monitors your credit report at all three nationwide credit reporting agencies, and it comes with up to $1 million in identity theft insurance and individualized identity restoration services.

    For those who have already submitted claims for this cash payment, look for an email from the settlement administrator. They’ll be asking you for the name of the credit monitoring service you already have. Or, if you want to change your mind, you’ll have a chance to switch to the free credit monitoring. The email from the settlement administrator will tell you what to do next, in either case. And the settlement administrator has said that the claims website will soon be updated with that information, too.

    Please also note that there is still money available under the settlement to reimburse people for what they paid out of their pocket to recover from the breach. Say you had to pay for your own credit freezes after the breach, or you hired someone to help you deal with identity theft. The settlement has a larger pool of money for just those people. If you’re one of them, use your documents to submit your claim.

    August 1, 2019. Read the original article.


    Online Security - The internet offers access to a world of products and services, entertainment and information. At the same time, it creates opportunities for scammers, hackers, and identity thieves. Learn how to protect your computer, your information, and your online files with Tips from the FTC.


    Check your child's credit history. A new federal law that went into effect in September makes it easier to do this and it can be important, because thieves are increasingly stealing children's Social Security numbers and using them to create phony identities under which they take out loans or credit cards. In 2017, the Federal Trade Commission received 14,000 complaints of identity theft targeting people age 19 and younger. The fraud can go unnoticed for years unless parents check their children's credit histories; which few parents do. For information on what to do under the new law, visit the special FTC web page, IdentityTheft.gov.
    From The Wall Street Journal.


    Netflix phishing scam: Don’t take the bait! Phishing is when someone uses fake emails or texts to get you to share valuable personal information – like account numbers, Social Security numbers, or your login IDs and passwords. Scammers use your information to steal your money, your identity, or both. They also use phishing emails to get access to your computer or network. If you click on a link, they can install ransomware or other programs that can lock you out of your data. Scammers often use familiar company names or pretend to be someone you know. Here’s a real world example featuring Netflix. Police in Ohio shared a screenshot of a phishing email designed to steal personal information. The email claims the user’s account is on hold because Netflix is “having some trouble with your current billing information” and invites the user to click on a link to update their payment method. Read the rest of the article at Don’t take the bait!


    Keep hackers out of your home by protecting all of your connected applinces. TVs, refrigerators, baby monitors and other objects now may be connected to the Internet for remote operation—and therefore may be vulnerable. Self-defense: Use multifactor authentication for each appliance, such as a password plus a security key or onetime code sent to your phone. Pay attention to all notices of security updates and download and install all of them. Install malware protection on every device. Change default user names and passwords on each device as soon as you set it up.
    From: Roundup of experts on Internet of Things


    Do not use Facebook to log on to other sites. Logging on to websites through Facebook is very convenient, but it can give hackers access not only to your Facebook account but also to any account that you reach through Facebook. That means a single hacking incident at Facebook can jeopardize your security at a huge number of sites; which is exactly what happened in the recent Facebook breach affecting at least 50 million users. Facebook says it has no evidence that the hackers got into accounts at other sites through Facebook, but this is uncertain; and the risk of having it happen outweighs the small convenience of using Facebook as a sign-on service.
    From: Roundup of experts on computer security.


    New Medicare cards coming.
    Starting in April 2018, Medicare will begin mailing new cards to everyone who gets Medicare benefits. Why? To help protect your identity, Medicare is removing Social Security numbers from Medicare cards. Instead, the new cards will have a unique Medicare Number. This will happen automatically. You don’t need to do anything or pay anyone to get your new card. Read the entire article at FTC Consumer information.

    Return to top of page.


    How to Protect Your Home From Deed Theft

    By Pat Mertz Esswein, Kiplinger’s Associate Editor June 27, 2019

    You don’t need to pay a company to protect you from criminals who put their names on your home title. You can protect yourself for free with these steps.

    In 2008, the FBI identified “house stealing” as the “latest scam on the block.” Since then, it has popped up periodically in cities such as Chicago, Dallas, Detroit, Los Angeles, New York City and Philadelphia. Is it a growing problem? That’s hard to know because the FBI doesn’t break it out separately in its crime statistics. The American Land Title Association doesn’t have data on the problem, either. “I suspect that companies that offer title-monitoring service use that [the claim] as a marketing strategy,” says Jeremy Yohe, vice president of communications at the association.

    The scheme works like this: Fraudsters pick out a house—often a second home, rental, vacation home or vacant house—to “steal.” Using personal information gleaned from the internet or elsewhere, they assume your identity or claim to represent you. Armed with forged signatures and fake IDs, they file paperwork with the county’s register of deeds to transfer ownership of your property to themselves or a third party. They then sell the home or borrow against it, stealing your equity. When they fail to make payments on a loan secured by your property, you could end up in foreclosure or be unable to sell, refinance or pass the home on to heirs.

    Home Title Lock is one of the services that says it will monitor your home’s deed 24/7 to prevent title fraud; it costs $15 a month ($150 annually, two years for $298). But you can protect yourself—for free—by periodically checking your property record on the website of your county’s register of deeds. Look for deeds that you or your attorney didn’t prepare or sign, or loans you didn’t take out, as well as liens of contractors, subcontractors, real estate brokers or attorneys whose services you didn’t hire, or court filings, says the Cook County (Chicago) recorder of deeds.

    Even better, many counties now provide a consumer notification service. Register for free, and you’ll quickly receive an e-mail or text any time a document is recorded on your property.

    The New York City department of finance advises homeowners to make sure the appropriate authorities have the correct mailing address for you or the person who should receive notices about your property. In your absence from your home, have mail forwarded or ask someone you trust to pick up mail or visit your home. Visit a vacant house periodically to ensure that no one has taken up residence illegally.

    You may get clues when title fraud occurs: You stop receiving your water bill or property tax assessment or bill, for example. Utility bills on a vacant property rise suddenly, or you find people living there. You stop receiving your tenants’ rent payments and learn that they’ve been making the payments to another person and location. You receive payment books or other information from a lender with whom you haven’t done business. Or you find yourself in default on a loan or notified of foreclosure proceedings.

    If you experience or find something amiss, notify the register of deeds and local law enforcement. In New York City, for example, homeowners who think they are victims of deed fraud are urged to act quickly to report fraud to the city’s sheriff, get a certified copy of the fraudulent document from the city register’s office, report the crime to the district attorney’s office in the borough where the property is located, and consult an attorney to help confirm ownership of the property. (Legal action known as “quieting the title” may be required to resolve any questions about your ownership of the property.)

    Return to top of page.


    Preventing and Responding to Identity Theft

    Department of Homeland Security

    Is identity theft just a problem for people who submit information online?

    You can be a victim of identity theft even if you never use a computer. Malicious people may be able to obtain personal information (such as credit card numbers, phone numbers, account numbers, and addresses) by stealing your wallet, overhearing a phone conversation, rummaging through your trash (a practice known as dumpster diving), or picking up a receipt at a restaurant that has your account number on it. If a thief has enough information, he or she may be able to impersonate you to purchase items, open new accounts, or apply for loans.

    The internet has made it easier for thieves to obtain personal and financial data. Most companies and other institutions store information about their clients in databases; if a thief can access that database, he or she can obtain information about many people at once rather than focus on one person at a time. The internet has also made it easier for thieves to sell or trade the information, making it more difficult for law enforcement to identify and apprehend the criminals.

    How are victims of online identity theft chosen?

    Identity theft is usually a crime of opportunity, so you may be victimized simply because your information is available. Thieves may target customers of certain companies for a variety of reasons; for example, a company database is easily accessible, the demographics of the customers are appealing, or there is a market for specific information. If your information is stored in a database that is compromised, you may become a victim of identity theft.

    Are there ways to avoid being a victim?

    Unfortunately, there is no way to guarantee that you will not be a victim of online identity theft. However, there are ways to minimize your risk:
    1. Do business with reputable companies – Before providing any personal or financial information, make sure that you are interacting with a reputable, established company. Some attackers may try to trick you by creating malicious web sites that appear to be legitimate, so you should verify the legitimacy before supplying any information. (See
    Avoiding Social Engineering and Phishing Attacks and Understanding Web Site Certificates for more information.)
    2. Take advantage of security features – Passwords and other security features add layers of protection if used appropriately. (See Choosing and Protecting Passwords and Supplementing Passwords for more information.)
    3. Check privacy policies – Take precautions when providing information, and make sure to check published privacy policies to see how a company will use or distribute your information. (See Protecting Your Privacy and How Anonymous Are You? for more information.) Many companies allow customers to request that their information not be shared with other companies; you should be able to locate the details in your account literature or by contacting the company directly.
    4. Be careful what information you publicize – Attackers may be able to piece together information from a variety of sources. Avoid posting personal data in public forums. (See Guidelines for Publishing Information Online for more information.)
    5. Use and maintain anti-virus software and a firewall – Protect yourself against viruses and Trojan horses that may steal or modify the data on your own computer and leave you vulnerable by using anti-virus software and a firewall. (See Understanding Anti-Virus Software and Understanding Firewalls for more information.) Make sure to keep your virus definitions up to date.
    6. Be aware of your account activity – Pay attention to your statements, and check your credit report yearly. You are entitled to a free copy of your credit report from each of the main credit reporting companies once every twelve months. (See AnnualCreditReport.com for more information.)

    How do you know if your identity has been stolen?

    Companies have different policies for notifying customers when they discover that someone has accessed a customer database. However, you should be aware of changes in your normal account activity. The following are examples of changes that could indicate that someone has accessed your information:

  • Unusual or unexplainable charges on your bills
  • Phone calls or bills for accounts, products, or services that you do not have
  • Failure to receive regular bills or mail
  • New, strange accounts appearing on your credit report
  • Unexpected denial of your credit card

    What can you do if you suspect or know that your identity has been stolen?

    Recovering from identity theft can be a long, stressful, and potentially costly process. Many credit card companies have adopted policies that try to minimize the amount of money you are liable for, but the implications can extend beyond your existing accounts. To minimize the extent of the damage, take action as soon as possible:
    Start by visiting IdentityTheft.gov – This is a trusted, one-stop resource to help you report and recover from identity theft. Information provided here includes checklists, sample letters, and links to other resources.
    Possible next steps in the process – You may need to contact credit reporting agencies or companies where you have accounts, file police or other official reports, and consider other information that may have been compromised.

    Other sites that offer information and guidance for recovering from identity theft are:
    Federal Trade Commission
    United States Department of Justice
    Social Security Administration.

    Return to top of page.


    Upgrading Your Phone? 4 Things You Should Do First

    By Alvaro Puig, FTC Nov. 2019

    If you’re thinking about upgrading to a new phone, make sure you remove your personal information before you trade it in. Why? Because your phone could have a lot of sensitive, personal information on it – like your passwords, account numbers, emails, text messages, photos, and videos. If that information ends up in the wrong hands, someone could use it to wreak havoc. They could open accounts in your name, spend your money, hack into your email, or take over your social media accounts. Here’s how to remove your personal information before you trade in your phone.

    Step 1. Back It Up
    If you're going to trade in your phone, the first thing you should do is back up your data.
    How to
    Back up your data on an iPhone and Back up your data on an Android phone

    Step 2. Remove SIM and SD Cards
    If your phone has a SIM card, it may store your personal information. Remove the SIM card. If you'll keep the same phone number, you may be able to transfer your SIM card to your new phone. But if you don't re-use the SIM card, destroy it. If your phone has an SD memory card for storage, remove it.
    How to remove an SD card from an Android phone

    Step 3. Erase Your Personal Information
    Remove information from your old phone by restoring or resetting it. After you restore, or reset your phone, confirm that you erased things like your contacts, text messages, photos, videos, and browsing history.
    How to Restore your iPhone to factory settings and Reset your Android phone to factory settings

    Step 4. Disconnect Your Phone From Accounts and Devices
    Before you turn in the phone, double check that it’s no longer connected to your online accounts or other devices.

  • If your phone was paired to another device, like a watch or a vehicle, make sure it’s un-paired.
  • Make sure that passwords for your accounts or Wi-Fi are no longer saved on the phone.
  • If you use 2-step verification or multi-factor authentication to log in to any accounts, remove your phone from the list of trusted devices.
  • If you’re not keeping your phone number, change the number on file with any accounts or services that may be using it to identify you.

    Just got a new phone? Find out how to protect it and your data. These tips work for not-so-new phones, too!

    Return to top of page.


    SIM-Swapping Is Another Technology Scam That Can Create Chaos With Personal Info

    KimKomando komando.com

    Here’s a new term to fear: SIM-swapping.
    In short, a cyber-criminal steals a certain amount of your personal data, including your phone number. He contacts a different carrier, pretending to be you, and claims to have lost “his” phone. He convinces the carrier to supply a new phone and SIM, disconnects the “old” line, then transfers “his” apps and information from the cloud.

    But it gets worse.
    In theory, you have two-factor authentication, which would help prevent a security breach. With SIM-swapping, the criminal controls your phone using a different device. So the 2FA text message that typically would alert you to the thief’s presence never reaches you. Suddenly your phone doesn’t work. While you’re trying to figure out what’s wrong with it — without being able to make calls — the hacker is digging through your apps and files, gorging himself on your private data, and likely even your bank account information. By the time you’ve caught up, your passwords have been changed, and you are stuck desperately trying to regain control of your own accounts. More than 3,000 people have lost access to critical accounts, thanks to SIM-swapping, with some reporting being blackmailed in addition to having their identities stolen. It’s one of the most difficult cybercrimes to prevent and fight against.

    Here are a few ways to stay safe:

    KEEP YOUR PERSONAL INFORMATION SAFE
    One thing makes SIM-swapping possible: the leaking of personal data. In many cases, this data is stolen through major breaches and sold on the Dark Web. Cybercriminals use fake IDs or cherry-pick public records. They may even bribe retail employees into providing the information they need. These kinds of leaks may be beyond your control.

    But phishing scams, in the form of emails and texts, are designed to trick unsuspecting users into exposing private data. Deflecting these attempts is your first line of defense. You should always investigate suspicious emails or unexpected correspondences to prevent identity theft.

    INVEST IN A SECURITY KEY

    Security keys are a new way to authenticate your identity online, and they’ve received acclaim from cybersecurity experts across the board. These small, USB-powered devices act as a physical key to your account and must be inserted into your computer when you log in.

    Two of the most popular brands on the market are Yubico and Google Titan, both of which provide keys that work with computers and mobile products. The phone-based products are Bluetooth compatible and give you the same benefits a USB key would for a desktop machine. Unfortunately, not every platform currently supports security keys.

    SET UP A TWO-FACTOR AUTHENTICATION APP

    As I mentioned, SIM-switching is designed to circumvent 2FA, but only if your 2FA relies on text messages on your phone. A 2FA application will help protect yourself because you can use this app without your phone, or by using Wi-Fi.

    One example: Gmail users can enjoy a free 2FA protection plan by signing up for Google’s in-house Authenticator app. This app essentially replaces the need for your phone number and generates a one-time code for you to enter each time you log in. This is one of the most direct ways to circumvent SIM-swapping. To use Authenticator, you’ll need to set up 2FA on your Gmail account. Once you’ve set up Authenticator, you’ll stop receiving text messages when you try to log in.

    Keep in mind, if you lose your phone, you’ll have difficulty getting back into your account; however, this is by far the most ironclad protection against SIM-swapping.

    CREATE A PIN

    A cybercriminal may trick your carrier into switching SIMs, but you can also work with your carrier to catch potential identity thieves. One of the most popular ways is setting up a passcode or PIN for your mobile account. Some carriers, such as T-Mobile, require a PIN to make any changes to your account by default. If you’re not sure whether your account has a PIN, call your carrier and explain you want to set up an authentication passcode or PIN to verify your identity.

    Once your carrier has set up a code, any would-be impostor will need to provide this number to gain access to your phone number. Make sure to write your PIN down and keep it in a safe place where nobody else can access it. We recommend not storing this digitally and choosing a number no one can guess.

    NOTIFY YOUR CARRIER

    If all these defenses fail and your SIM is compromised, you’ll have to act fast. Contact your carrier, either in person or by using a trustworthy phone. Notify the company that your SIM has been stolen and you need to switch off the new phone immediately. You also want to remotely log out of any accounts that have been accessed by said cybercriminal. This kind of invasion can cause ripple effects for months and years, but the faster you act, the less damage you’ll need to control.

    Return to top of page.


    The Technophobe’s Guide To Cybersecurity

    Alice Holbrook, NerdWallet

    Having your data exposed in a breach feels inevitable, so securing your information online is a must. But with terms like VPN, SSO and HTTPS being bandied about, it’s hard to know where to start. It’s true, there are many, many steps you could take to improve your security — some involving acronyms — but experts say a few basics will help a lot.

    “It can seem overwhelming, but it’s really not,” says Kelvin Coleman, executive director of the National Cyber Security Alliance. “Low-hanging fruit can be very, very effective in keeping you safe.”

    These simple habits will protect you against some of the most common threats to your personal and financial data, such as identity theft.

    Use secure passwords

    “Unfortunately, a significant number of people still use 123456 and password1,” as well as other easy-to-guess login credentials, Coleman says. If you reuse the same password, it’s easy for criminals who’ve hacked one of your accounts to access others. If you’re not interested in designing and remembering complicated passwords for all of your approximately 500 online accounts, Dukes recommends a password manager — consider 1Password or Last-Pass — that can suggest and store them for you.

    Erin Shepley, Cybersecurity Awareness Month Lead for the Department of Homeland Security, also suggests using multifactor authentication on your most important accounts, such as your email and bank logins. This process requires you to approve a sign-in on a separate device — such as your phone — making it easier to detect and foil unauthorized logins. If your account offers it, the option is typically available under security settings. (Google calls it “two-step verification.”) “If it takes more time for the malicious actor, they’ll move on to someone who doesn’t have that in place,” Shepley says.

    Be wary of public Wi-Fi

    You’ve heard it before, but “public wireless ‘hotspots’ are just that, public,” Dukes says. Information you transmit on them — including credit card data or logins — can be intercepted by a hacker on the same network. Networks without passwords, such as the ones you’ll find at some airports or hotels, are especially risky. Not only that, but criminals might spoof a legitimate access point. It’s always smart to confirm you have the correct network name before you use it, according to the DHS.

    If you really must do sensitive tasks — such as shopping or checking your bank balance — outside of your home network, using your own personal hotspot is safer than public Wi-Fi. And always make sure the URLs you’re using for these tasks begin with “https://,” Shepley says.

    Don’t fall for phishing scams

    It’s not new, but criminals still do it because it works: They contact you, claiming to be someone — maybe someone you know — who needs your financial data, Social Security number or other personal information. They can then use this data to access your accounts.

    “Phishing is still the threat vector of choice,” Shepley says. “They prey upon the human nature in people.”

    It’s not always easy to tell a legitimate message from a scam, but if you’re being asked for money, login credentials or other personal data, you should verify the message before responding. For example, if you receive an email purporting to be from your bank, the DHS recommends calling your bank for confirmation on a phone number you have Googled; don’t click any links within the suspicious email.

    Update your devices

    “Security software is quite effective against known malware,” says Curtis Dukes, executive vice president of the Center for Internet Security. That’s because engineers are constantly creating new versions in response to current threats. Your computer and mobile devices likely have security software built into their operating systems, and they should notify you of updates automatically. The pop-ups might feel intrusive, but they’re there to protect you.

    So you should resist the urge to delay updates. “I wish I could lobby to have that ‘or later’ button deleted,” Coleman says.

    Safety doesn’t have to be complicated. Once you have mastered these steps, you can absolutely take further action to lock down your online presence. You might even be inspired to set up a VPN, or virtual private network, a service that can create a secure connection on a public network.

    But the good news is that simple changes — like using unique passwords — can go far in keeping you safe online. “It won’t save you every time. But … it’s better to have it than not have it,” Coleman says.

    Return to top of page.


    Thieves Create False Identities Using Child's Social Security Number

    By Bev O'Shea, NerdWallet. Published April 27, 2018 by 13 on your side.com.

    Identity theft, or identity fraud, once meant crooks were churning out fake credit cards. But as that became easier to detect, a more insidious crime has evolved: the creation of completely new identities. Known as “synthetic identity theft,” it involves fraudsters using a combination of fake information, such as a fictitious name, and real data, like a child’s Social Security number, to create fraudulent accounts. It is a growing problem, says Eva Casey-Velasquez, president and CEO of the nonprofit Identity Theft Resource Center. But the scope of the problem is difficult to determine because the crime can go undetected for years, she says. However, the rate of children’s identity theft was more than 50 times that of adults, according to a 2011 report by Carnegie Mellon University’s CyLab, which studied the identities of over 40,000 children. And that report was published before a change in the way Social Security numbers are issued made identity thieves’ work a bit easier.

    How does synthetic identity theft work?
    First, thieves assemble an unused Social Security number — typically that of a minor — along with a fictitious name and birthdate, and an address controlled by the thief. With those pieces in hand, identity thieves apply for a credit card. While an initial application will be turned down because the “applicant” doesn’t have a credit profile, it creates a record of a “person” who doesn’t actually exist. The next step is to add that “person” to a legitimate account, or more likely several.

    One way to do that is by “piggybacking” — or becoming an authorized user — on a legitimate account, perhaps that of an accomplice or a patsy, who doesn’t understand what’s going on, Casey-Velasquez says. A second, more pernicious piggybacking involves paying a credit-boosting company for the persona to be temporarily added as an authorized user to someone else’s card — a card that has a long history and low utilization. It doesn’t include getting a physical card or a card number or having charging privileges.

    In time, there will be a credit history and score for this fictitious person, making it easier to qualify for credit. Casey-Velasquez said the identity often includes an occupation and income, and as long as it seems reasonable, it can go undetected by card issuers. Over a period that can span years, identity thieves may make small charges and pay them off, thus building a good credit score and receiving higher credit limits. Then, when they decide the limits are high enough, they do what is called a “bust-out”; suddenly charging the cards up to their limits, paying nothing and discarding the identity.

    How do thieves get minors’ Social Security numbers?
    Taking over a child’s Social Security number was made easier after the federal agency’s switch to randomization in 2011. Before then, the digits were tied to birthdate and geography, so it was more difficult to use a child’s Social Security number without it being discovered. Now a child’s number can more easily be used to establish a credit history. Minors are especially vulnerable because they are likely to have an unblemished credit history.

    Some thieves have even been able to make made-up, random numbers work. Casey-Velasquez said criminals have used Social Security numbers that haven’t even been issued yet — and when that number is eventually assigned to a newborn, parents find out that the number already has a credit history. In some cases, thieves get access to a child’s stolen Social Security number. And since address verification measures for credit applicants are often out of date, anyone with a printer can produce a fake utility bill for an abandoned property to “prove” the fictitious person lives there.

    What are the uses of synthetic identity?

    According to the Government Accountability Office, there are three main reasons people create these false identities:

    • Identity fraud for nefarious activities: stealing money or benefits. This is the one that costs businesses the most in terms of credit card fraud.
    • Identity fraud for residency or work: a false identity created to live or work in the U.S.
    • Identity fraud for credit repair: the perpetrator combines his or her real name with an unblemished Social Security number to create an alternate credit history.

    Who is most at risk?

    Randomized Social Security numbers put children born after 2011 at especially high risk for synthetic identity theft — and the theft of a child’s Social Security number can go undetected for years. Only later, when a victim tries to apply for credit using that number, is he or she likely to discover it has been misused. For example, a high school student applying for a student loan or a first job might find their Social Security number is already in use. Then, it’s their mess to clean up. Anyone with a pristine credit history can be a target. Data breaches mean a lot of Social Security numbers are out there and up for sale. It’s best to assume those digits aren’t private and to try to ensure they aren’t misused.

    How can you protect your child?

    • Freeze your child’s credit: If this is an option in your state, consider it. Most states now require that a record is created for the purpose of freezing a child’s credit. But that protects your child from only one kind of identity theft — credit identity theft. Synthetic identities have also been used to file fraudulent tax returns and to qualify for benefits and medical care, and freezing credit won’t help that.
    • Minimize exposure: Don’t provide your or your child’s Social Security number when requested on a form. In many cases, there’s no issue. If someone requires it, ask why, and how the information will be protected.
    • Monitor communications carefully: Investigate anything that seems unusual or suspicious. If you or your child gets a medical insurance Explanation of Benefits that doesn’t make sense, follow up.

    Return to top of page.


    How to Keep Financial Information Safer on Your Phone

    By Eva Velasquez IDTheftCenter.org as published in Bottom Line Personal July 1, 2017

    More and more of your financial life happens right on your smartphone—and not just buying stuff on Amazon and elsewhere. Banking and brokerage apps let you check accounts…move money…pay bills…manage investments. Payment apps let you pay with your phone at stores. And then there is the financial information that could be mined from your e-mails, texts, downloaded documents and contact list. Is it all secure?

    It probably isn’t. Eva Velasquez, who runs the Identity Theft Resource Center, a nonprofit that helps victims of identity theft, knows the mistakes that can compromise smartphone security and make a user’s financial information vulnerable. Bottom Line Personal asked Velasquez how our readers can improve the security of their smartphones, and she shared her best ideas…

    TAKE RESPONSIBILITY

    With all the convenience we enjoy by having our finances on our phones, we should—and indeed, we must—accept some responsibility for improving the security. As you add apps, you add layers of vulnerability. So you should also take advantage of some added layers of protection.

    I work with victims of identity theft, and I can tell you that people often don’t know how their information was compromised. It could have been a computer virus…a data breach at a company you did business with…or even someone who snooped directly on your phone transmissions. No computer—and your smartphone is a computer—will ever be impenetrable. But there are many things you can do to make yourself safer.

    Steps that smartphone users should take to protect themselves…

    • Create better passwords. The front-line protection for your digital life is your password or, more accurately, the collection of passwords that you use across the Internet. This is where better security must begin. Make your passwords stronger. You want a longer string of characters, with symbols, numerals and upper- and lower-case letters—not the usual passwords made from the name of a pet or your child’s birth date. And then you must vary your passwords—don’t use the same one for multiple sites. That way if a password is compromised, it’s less useful to hackers and thieves.

    Of course, if you’re good about varying your passwords, you will soon face a sizable challenge in remembering all of them. Keeping a list on your laptop or your phone or a yellow sticky on your computer monitor is not OK! I use a system that’s going to sound complicated as I explain it—but isn’t hard once you get the hang of it. Start with a phrase you’ll remember but that isn’t terribly common—“The dude abides,” for example, from the movie The Big Lebowski. Capitalize each word, and substitute a symbol such as the % sign for the spaces. This is your core password phrase—in this example, The%Dude%Abides. Then you can vary your core password according to a rule that you set, such as using the first two letters of the website as a prefix and the season and year as a suffix, so you can change it multiple times a year. By this system, your password for Chase Bank could be chThe%Dude%AbidesSP2017. No one’s going to break that password, and if you keep the rules of your system consistent, it’s really not hard at all to keep track of it.

    That said, a password manager—a phone app to store all your passwords safely—can be a good alternative. (See the article“You Can Escape Password Overload”) If you really can’t master my memory system or the technology of a password manager app, and you resort to pen and paper, keep your password list in a locked drawer, not in an easily accessible place such as your wallet or purse.

    • Avoid public Wi-Fi. There was a time when I would have told you to be careful and limit your activities when you use public Internet access in cafés, hotels, buses, planes and so on. But at this point, such networks are just too fraught with potential for your personal data and financial information to be stolen. My advice now: Don’t use public Wi-Fi without also using your own virtual private network (explained below). You should be particularly wary when public Wi-Fi doesn’t require a password, but even networks that require a hotel room number or other credential are likely to have very weak security. Accessing the Internet through your cell-phone service is a much safer option.

    • Avoid public charging stations. I’m talking about the charging stations, usually plastered with advertising, that are proliferating at airports and convention sites and that provide the USB or Apple Lightning connector to plug into your phone. That’s not just a charging cable—it also can be a two-way street for data. Security experts have demonstrated that public charging stations might be used to collect passwords and other information from users’ phones. If you plug your own charging cable into a wall-type power outlet, you’re almost certainly safe. Or buy a rechargeable external battery pack, and use that to charge your phone when you are on the go.

    • Use a virtual private network (VPN). Many people will first encounter a VPN on devices issued by their employers for their work, but this is an option for individual consumers now, too. A VPN is a way of creating a safer network that still operates over a public Wi-Fi connection. With encryption and some other technical tricks, the VPN makes it much harder for a snoop to intercept data as it moves across the Internet. To get a VPN on your phone, you must sign up for a service, pay a small monthly fee and download an app. A VPN is especially important if you use your smartphone on an airplane, where cell-phone service is unavailable and public Wi-Fi is the only option. You can find VPN services on Google Play for Android phones and in the App Store for Apple devices.

    • Update your software. Keep your phone’s operating system and individual apps up-to-date. One of the things that happens in software updates is that ¬security flaws get fixed!

    • Choose two-factor authentication. This is a way of authenticating your identity when you log into sensitive apps, such as for banking or brokerage accounts. It adds an extra step in which, typically, a code is texted to your phone or e-mailed and must be used in addition to your password as you log in. This adds an extra layer of security because a hacker would need to access both your password and your phone to obtain the code. Not every financial institution offers two-factor ¬authentication, but when it’s available, go for it.

    • Sign up for account activity notifications. A growing number of banks and other financial companies have systems to notify you by text, e-mail or a phone call about activity on your account. This helps you keep track of routine things, such as automated bill payments, and allows the bank to flag suspicious activity, such as a big online purchase or a withdrawal from an ATM in an unusual city. You have to sign up for some of these notifications. Then you also have to pay attention. The point of getting messages about routine transactions is that someday one of them might be something not routine, something unauthorized, perhaps the start of a fraud. And one more thing—make sure that you keep your contact information up-to-date at all the financial companies that might legitimately need to reach you.

    • Make yourself phishing-proof. You have no doubt heard of phishing scams—e-mails or texts that pretend to be from legitimate companies but that try to get you to follow dangerous links and reveal private information. And you can try to identify and selectively ignore them. But there’s an even better way to avoid ever being the victim of phishing. Even when a communication from a company doesn’t seem suspicious, my best advice is, don’t click—go to the source. You already know how to reach your bank or brokerage or insurance company. If you get an e-mail or text that purports to be a warning about a problem with your account or any other matter, contact the purported sender the way you normally would. That is, go to the app or website you always use for that financial institution, or call the phone number on your credit card or statement.

    Phishing scams are ever more sophisticated. I used to tell people they might spot one with visual clues such as a funky logo or bad spelling or grammar. But such tips aren’t that useful anymore and can provide a false sense of security. Many texts and e-mails do a good job of looking like real communications from companies you do business with.

    Return to top of page.


    Latest Hacker Target: Cell-Phone Accounts

    John Sileo, as published in Bottom Line Personal, November 15, 2017

    Hackers are hijacking cell-phone numbers as a way to take over financial and social-media accounts.

    How it works: A hacker calls your mobile-phone service provider, claims to be you, says that your phone was lost or broken and asks to have the phone number and account transferred to a different cell phone—one that the hacker controls. If the customer service representative doesn’t fall for the ruse, the hacker keeps calling back until he/she reaches a rep who does.

    To verify customers’ identities, many sites send a onetime security code to a phone number that the customer ¬provided—which now may be the number that the hacker controls. If accessing an account also requires a password, the hacker may claim to have forgotten this password and ask to have it reset, knowing that a new temporary code will be sent to the number he now controls. Using this method, he might be able to loot your financial accounts, take over your social-media accounts and/or send messages in your name to your contacts.

    What to do: Ask your cell-phone service provider whether it’s possible to add a special verbal “call-in” password or PIN to your account that will have to be provided by anyone trying to make changes to the account over the phone. Most providers now will do this upon request. Also avoid entering your cell-phone number on forms unless it’s mandatory—prying eyes at many companies could be collecting numbers. Supply a landline phone number instead.

    Ask your financial companies whether they offer “app-based” two-factor authentication, and sign up for it if they do. With this, the onetime code needed to access your account is sent to your phone not as a text message but through a password-protected app on your phone, creating an additional layer of security.

    If your phone screen says “no signal” or “emergency calls only” when you are somewhere where you usually have reception, and turning the phone off and back on does not fix the problem, immediately contact your cellular provider from a different phone to ask whether any changes have recently been made to your account.

    Return to top of page.


    Fake Unemployment Claims On The Rise In Michigan

    The city of Walker took 100 reports since November.
    Author:Sarah Sell Published: January 25, 2018

    Police agencies across Michigan say they are seeing a major increase in unemployment fraud complaints. It's an issue the WZZM 13 Watchdog team told you about two months ago, when a few of our employees had unemployment claims filed in their names. Since then, it's gotten worse. In Walker, there have been over 100 reports taken since November. Victoria Russman, Operations Supervisor at WZZM 13 was just hit this week. "It's a weird feeling. I'm feeling a bit violated. So, I’m thinking, now what do I have to do? I need to get on top of this."

    She now must file a fraud complaint with the UIA and either freeze or put a fraud alert on her credit.

    It can be a frustrating process.
    "I guess waiting on hold on the phone, I called the credit agencies and it was all automated, I never got to talk to a person," Russman said. You might find it easier to do everything online. The UIA has a page on its website
    to report fraud.

    The agency says it has seen an increase in fake claims, which it anticipated after the recent data breaches. "You're as careful as can be, so that's the frustrating thing," Russman said.

    West Michigan communities, like Walker have been hit hard. Police have taken just over 100 reports since November. Wyoming had 19, and Kent County has seen about one to six per week. Grand Rapids has taken 107 fraud complaints, but couldn't tell us how many were related to unemployment. Michigan UIA spokesperson Chris DeWitt says, “We are increasing our efforts to stop the criminals from getting any unemployment insurance benefits and then have them brought to justice for their crime.”

    "There's just so many ways I guess people can get info. It's out there and it’s scary", said Russman. Investigators say the criminals are from out of state and using the UIA because the agency typically tries to get people benefits as soon as possible. However, increased security measures have been put in place, and the agency is catching most of the fraud, before money is doled out. Some of the West Michigan police agencies we talked to said that this week has been a bit slower for complaints, so they are hoping the worst, is over.

    Webmaster:
    Just another reason to guard your personal info. If you get anything that isn’t quite right, text, letter, phone call, something on a statement, call your provider directly from the phone number you will find on last months statement or in your personal address file. NEVER NEVER EVER use the number on the suspected communication ! !

    Return to top of page.


    Five Things You Must Do If Your ID Is Stolen

    By David Bailey, WZZM TV 13

    Today I'd like to give you the top 5 things I did immediately after I knew I was a victim of identity theft.

    1. Pull everything!
    Pull your credit reports, financial statements and bank account information and highlight all items that are not correct. This will help to show you the depth of the assault on your credit.

    2. Contact the financial institution involved in the fraudulent transaction(s).
    They need to know immediately that what's been done was a criminal act. In my experience, they handled it professionally and took me seriously. I was very clear with them I did not complete this transaction and had nothing to do with it. I told them I would like them to investigate what happened so it didn't happen again to somebody else.

    3. Put a fraud alert or freeze on your credit reports.
    I did this with all three credit reporting agencies (Equifax, Experian and TransUnion). Initial fraud alerts are free and will be in place for at least 90 days. I doubled down and subscribed to constant monitoring from Equifax to make sure once anything changed on my credit report, I would be alerted immediately.

    Here are the links:
    TransUnion Freeze
    Experian Freeze
    Equifax Freeze

    4. File complaint with the federal government.
    One of the easiest and most official things to do is to file a report with the Federal Trade Commission. I provided them all the information and that allowed me to spit out a detailed report I could use to provide the financial institutions and the police a detailed explanation of what happened.

    Get started with the FTC ID Theft Report.

    5. File a police report.
    In my identity theft case, the investigating agency was going to be in the state of Alabama. But I live in Michigan. I called the policy agency in Alabama where the boat was purchased to alert them to the case and they wanted me to go to my local police department to file a police report. Once your local police department finishes the report, it's up to them to send it to the agency that can handle the investigation. Make sure that gets done or you can get your own copy of the police report to send it to the investigating agency.

    More tips:
    A. Check with the IRS or Social Security Administration to make sure somebody hasn't filed a tax return or claim in your name and social security number.
    B. Make sure you are getting your U.S. Mail. Contact the Post office if you feel you are missing information.
    C. Order credit monitoring for an extended time to make sure no new accounts are opened in your name.

    Return to top of page.


    Tax Return Identity Theft

    From WZZM TV 13

    Signs Your Tax Records Have Been Affected:

    1. Identity thieves often use stolen Social Security numbers to file fraudulent tax returns to obtain false refunds.
    2. Suspect the possibility of identity theft if you receive correspondence from the IRS stating any of the following:
    • More than one tax return was filed using your Social Security number.
    • You owe additional tax.
    • Your refund is being offset or reduced.
    • The IRS is taking collection action against you for a year you did not file a return.
    • IRS records show that you received wages from an unfamiliar employer.

    Action Steps If Your Records Have Been Compromised:

    • Immediately respond to any notices you receive from the IRS.
    • Complete the IRS Identity Theft Affidavit, Form 14039, located at IRS.gov
    • If you are a victim of identity theft or simply believe you may be at risk of identity theft, you should call the IRS Identity Protection Specialized Unit at 1-800-908-4490 so the IRS may take steps to secure your account.
    • Contact local law enforcement.

    Preventing Identity Theft:

    • Be skeptical!
    • Official IRS correspondence will arrive via traditional paper mail. However, be aware that some fraudsters have learned to develop clever forgeries of IRS and state-specific document formats, fonts and logos.
    • The IRS does not contact taxpayers via e-mail, text messages or social media. Forward scam e-mails to phishing@irs.gov.
    • Guard your Social Security number as if it were gold.
    • Never provide personal information via phone, e-mail, mail or the Internet unless you initiated the contact or you are certain regarding the third party with whom you are corresponding. IRS impersonation schemes are most prevalent during tax season. They can take the form of e-mail, phone calls, websites or even social media outlets.
    • Secure electronic and paper forms of financial information.
    • Destroy sensitive information that you discard. Identity thieves may even search through your trash.
    • Utilize anti-spam and anti-virus software. Regularly update security patches.
    • Regularly change Internet passwords.
    • Check your credit reports frequently. A convenient resource is. annualcreditreport.com

    Resources for identity theft victims:

  • Federal Trade Commission identitytheft.gov and ftccomplaintassistant.gov
  • The FTC published a comprehensive Guide for Assisting Identity Theft Victims
  • You may also file a complaint with the FTC.
  • Social Security Administration: ssa.gov.
  • Among other resources, the SSA website provides links for placing fraud alerts on each of your credit files maintained by Equifax, TransUnion and Experian.
  • Internet Crime Complaint Center (IC3): ic3.gov. IC3 is a partnership between the FBI and the National White Collar Crime Center. You may file a complaint via the IC3 website.

    Courtesy: Christopher Harper, Senior Manager | Hungerford Nichols

    Return to top of page.


    Protecting Dead Relatives Identity

    By Adam Levin, as published in Bottom Line Personal June 15, 2017

    Don’t assume that the risk of having your identity stolen lasts only as long as you are alive. More than two million dead Americans become victims of identity theft each year. To an identity thief, the recently deceased are ideal targets. Unlike the living, the dead never notice that they are being victimized and don’t take steps to stop these crimes.

    There is a system in place that is supposed to prevent this when Americans die, their Social Security numbers are added to the Social Security Administration’s “Death Master File.” Once that occurs, credit-reporting agencies note the deaths in their files and credit issuers should not issue new credit. But this process can take months, leaving plenty of time for identity thieves to strike. During these months, it falls to surviving spouses, heirs and executors to protect the identities of the deceased. It’s in their best interests to do so.

    Although these spouses, heirs and executors are not legally responsible for financial losses caused by postmortem identity theft; it’s the duped creditors who are left holding the bag. These crimes can cause them major headaches as they struggle to convince creditors and bill collectors that the debts are not the responsibility of the estate.

    And if the executor of the estate is not paying close attention, identity theft could even go unnoticed, meaning that fraudulent account withdrawals might not be corrected and/or fraudulent bills might be paid, reducing the size of the estate.

    Here’s what you should do…

    SAFEGUARD SENSITIVE INFORMATION

    If you are a surviving spouse or heir, take the following actions to reduce the odds that identity thieves will steal the deceased’s identity…

    Edit the obit. Do not mention the deceased’s home address, birthday or mother’s name in his/her obituary. Some identity thieves scour the obituaries for potential targets, and this information could be useful to them.

    Watch the wallet. There have been cases of hospital or emergency services personnel stealing credit cards from the wallets of the deceased. These thieves sometimes leave most of the contents of the wallet in place in order to decrease the odds that a loved one will realize anything is amiss. What to do: Cancel the deceased’s credit cards as soon as possible. Carefully check the final bill for charges that occurred after the deceased went to the hospital and/or passed away.

    Discard the deceased’s documents with care. Identity thieves have been known to pick through garbage cans outside the homes of the recently deceased. They’re hoping that heirs threw out sensitive paperwork while cleaning out the house. Documents that should be shredded with a paper shredder include tax returns…financial account statements…credit card statements…bank account statements…and anything with a Social Security number.

    Relocate the wake. If you hold a wake or reception in the deceased’s home, an identity thief (or burglar) could show up, claim to be an old friend of the deceased and then slip away from the crowd to steal sensitive information, credit cards and small valuables. Also, an employee working for the caterer, florist or cleaning company you hire for the event could be a crook bent on ID theft.

    Prevent over-sharing on social media. Some identity thieves search the social media accounts of the recently deceased to find the facts they need. If the deceased has Facebook and/or other such accounts, log into each of these and either delete the accounts (assuming that you can gain access or, if you prefer to leave the accounts open as a way to remember the deceased, at least confirm that the account settings restrict access to only a small circle of family members and friends.

    Also read through the posts, deleting any that mention ID-related information such as mother’s maiden name or birth date. If you do not log into the account because you don’t have the password and cannot find it near the deceased’s computer, report the death to the social-media site. This often leads to the account being shut down or “memorialized” in a way that could at least limit access, though this can vary depending on the site and the settings that the deceased selected.

    Have the deceased’s mail held at the post office or forwarded to the estate’s executor. Otherwise, mail containing account information and other sensitive data might sit in the deceased’s mailbox where an identity thief could grab it. Exceptions: This is not necessary if a spouse or some other trusted loved one still lives at the deceased’s address…and/or the deceased has a post office box or locking mailbox.

    SPREAD THE WORD

    Even if you take all the right steps to safeguard your deceased loved one’s sensitive information, he/she still could be victimized by an identity thief. There have been so many data breaches of retailers, financial institutions, government agencies and others in recent years that the information an identity thief needs might already be in circulation. What’s more, postmortem identity theft sometimes is committed not by a stranger, but by a family member who has access to the deceased’s sensitive information. Informing key agencies and institutions about the death can at least contain the damage that a postmortem identity thief can do. Obtain copies of the death certificate as soon as possible—death certificates typically are available through the funeral home or mortuary—and send them along with letters reporting the death to…

    Government agencies including the IRS, Social Security Administration, Department of Motor Vehicles and the tax authority in the deceased’s state. This should prevent identity thieves from having duplicate driver’s licenses, Social Security cards or other documents issued to them in the deceased’s name. Notifying the IRS and state tax authorities promptly should prevent an identity thief from filing a phony tax return in the deceased’s name and receiving a refund.

    The deceased’s creditors and other financial institutions. This includes investment companies and advisers, banks, credit unions, credit card issuers, lenders and insurance companies. If you are not certain which financial companies the deceased used, go through his recent mail, checking account registers, filing cabinets, recent tax returns and wallet in search of clues. Or identify these creditors and financial companies by obtaining a free copy of one of the deceased’s credit reports at AnnualCreditReport.com.

    To obtain this report, you will have to provide identifying information about the deceased, including his Social Security number. It generally is easier to obtain the credit report before the credit-¬reporting agencies are informed of the death. After they learn of it, extra steps might be required for the estate’s executor to obtain a copy.

    The three major credit-reporting agencies. Ask Equifax, Experian and TransUnion to place a “deceased alert” on your loved one’s file. This is like putting a security freeze on the file—it prevents the credit-reporting agency from releasing the file, which should, in turn, prevent new credit accounts from being opened in the deceased’s name. Send certified copies of the death certificate along with brief letters identifying the deceased by full name, Social Security number, last five years of addresses, date of birth and date of death to…

    Equifax, PO Box 740241, Atlanta, GA 30374

    Experian, PO Box 4500, Allen, TX 75013

    TransUnion, PO Box 2000, Chester, PA 19016.

    Helpful: If there are signs that identity theft is occurring despite your efforts—these signs might include money disappearing from the deceased’s accounts…or account mailings arriving from creditors that the deceased did not have—the estate’s executor should call the credit-reporting agencies and the deceased’s financial institutions as quickly as possible to confirm that they received the death certificate and placed a death alert on the file or account. The executor also should call the Social Security Administration and ask whether the deceased’s Social Security number has been added to the Death Master File. If it hasn’t, explain that identity theft is occurring and ask whether anything can be done to speed along the process.

    Return to top of page.


    Prevent I.D. Theft After A Loved One Dies.

    Send copies of the death certificate by certified mail to the three credit-reporting bureaus (Experian, TransUnion and Equifax), and request that a “deceased alert” be placed on the credit report. Mail copies to banks, insurers and other financial firms, along with a request to close the account or change it to joint ownership. Report the death to the Social Security Administration at 800-772-1213; the IRS at 800-829-1040; and your state’s Department of Motor Vehicles. In the obituary, don’t include the deceased birth date, last address, or most recent job. Check the deceased’s credit report at annualCreditReport.com for suspicious activity starting one month after the death and continue to do so for about one year.
    AARP Bulletin.

    Return to top of page.


    Hackers Target Bank Accounts Through Your Phone

    As published in October 15. 2016 BottomLine PERSONAL

    Cyber thieves might use your smart-phone to steal money from your bank account. In this scam, the thieves sneakily get you to download malware onto your phone, possibly by sending you a link to a free app for a card game or risqué content. The malware, known by names such as Acecard and GM Bot, has been around for years but has been adapted to specifically target banking apps on smart-phones. Using the malware, thieves record credentials, such as your user name and password, when you log into your bank account. With that information, they can initiate electronic transfers from your account to accounts they control.

    You can’t necessarily rely on typical bank security measures, such as the use of a verification code that the banks send you by text, because some forms of the malware can capture that code, too. And most smartphone owners don’t use anti-malware software on their phones. Federal law says you can get all of your money back if you notify your bank within 60 days after the fraudulent transaction appears on your bank statement. However, you also typically are required to show that you weren’t lax about safeguarding your information.

    Self-defense: Don’t click on a link in a text message if you don’t recognize the sender. Download apps only from reliable sources such as financial apps on your bank’s website or other apps at Play.Google.com or iTunes.Apple.com. Also, install security software, and make sure it automatically updates. Recomended: For smartphones and tablets with Android operating systems, Malwarebytes Anti-Malware (Malwarebytes. org)...for iPhones and iPads, Avast SecureLine (Avast.com). Both are free.

    Bottom Line Personal interviewed Steven J. Weisman, Esq., an attorney based in Waltham, Massachusetts, founder of the scam-information website Scamicide.com and author of The TruthAbourAvoidingScams.

    Return to top of page.


    Good Advice to Help Stop Phishing

    The following very well done info is from a company I do business with. I substituted ‘your provider’ for their name.

    What is phishing?
    Phishing is an attempt to obtain sensitive account information such as a username or password by posing as a legitimate company, mainly through email or unsolicited phone calls.

    How to spot a phishing email
    Here are some common giveaways:

    • Subject line is "Urgent" or "Immediate Action"
    • Sender name looks odd or unfamiliar
    • Dear Customer… The greeting is not personalized with your name
    • Please confirm your identity... Legitimate sites won't ask to verify identity
    • Misspellings and grammatical errors, including UK spellings
    • Attachments: Unless you requested a document from your provider to be sent via email
    • Links that look modified or unusual (yourprov1der.com or the link [hover your cursor over the link to see the address] may not contain your provider’s name)
    • Vague information

    We will never ask you for your SSN, PIN, card number or any personal information via email, text, phone/recorded audio, or through social media, though we may ask for your SSN and other personal information to verify your identity when you call us.

    Protect your information
    Here are a few things that you can do to help reject "phish" bait:

    Log into your account: As soon as your account is open, log in and create a new unique and secure password. Do not use the same password for multiple sites. See The Word on Passwords article for info on creating strong passwords.
    Change your password frequently: We recommend changing passwords every 90 days.
    Don't click on email links: Manually type in the website that you know is correct or use the one you have in your address book.
    Learn to identify suspicious details: Understand what to look for to uncover an email scam.
    Look for secure site indicators: Authentic login sites have certificates of security indicated by a locked keypad icon by most browsers or an "s" added to the URL.
    Review transaction history frequently for fraudulent charges.
    Enable email notifications to alert you when information has changed on your account
    • When in doubt, CALL your provider using the phone number in your address book.

    Return to top of page.


    New Form of Identity Fraud Soars as Crooks Switch Tactics

    MoneyTalkNews By Jim Gold on February 3, 2016

    Now that new chip-and-pin credit cards are keeping our transactions safe, criminals are turning to another way to commit fraud in your name. Just as new chip-and-pin credit cards help shield us from one kind of identity fraud, crooks are turning to another way to commit crimes — and it’s harder to spot.

    Criminals increasingly are opening credit card and other accounts in victims’ names, says a new identity fraud report by Javelin Strategy & Research, a firm that advises the financial industry. Rather than seeing suspicious charges show up on monthly statements - as would happen if criminals used your existing credit card number fraudulently - you might not spot new-account fraud unless you were checking your credit report, Javelin says. New-account fraud jumped 113 percent in 2015 and now represents 20 percent of all fraud losses.

    Al Pascual, Javelin’s research director and head of fraud and security, says in a press release: “This just shows that when the industry cracks down on one type of fraud, criminals quickly shift their attack.”

    Javelin and others offered tips to combat identity fraud:

      • Monitor your credit report: Cobble together regular free access and monitoring from sites like CreditKarma.com, WalletHub.com or CreditSesame.com. Learn more about how major credit reporting bureaus offer consumers the ability to upload documents to support their case when challenging inaccuracies.
      • Secure your mobile device: Smartphones and tablets have become high-profile targets for both cybercrooks and thieves. Apply software updates when they become available.
      • Exercise good password habits: Strong, unique, regularly updated passwords reduce their value to fraudsters if they’re stolen in a data breach or through malware.
      • Place a security freeze: If you do not plan on opening new accounts soon, a credit report freeze can prevent anyone else from opening an account in your name.
      • Sign up for account alerts: Banks, credit card issuers and brokerages can send emails or text messages about suspicious activity.
      • Take data breach notifications seriously: 1 in 5 data-breach victims suffered fraud in 2015.
      • Seek help fast: The sooner banks, credit card issuers, wireless carriers or other service providers are notified that fraud has occurred on an account, the sooner they can limit the damage.
      • Be alert for international transactions: Let your financial institution know when you are planning to cross borders.
      Return to top of page.


      What’s left behind: Junkyard identity theft

      Susan Shaw Published: November 2, 2015, by WOOD TV8

      Identity thieves could have a field day at a place most people would never considered a threat: a junkyard. Salvage yards have acres and acres of vehicles that aren’t fit for the road. Cars are either crushed or sold off piece-by-piece after a serious crash. But what’s left behind in those cars could be a treasure trove for identity thieves.

      “People use their car as a filing cabinet, and it looks like it when it comes in. It’s shocking what’s left in vehicles,” Stuart Rapaport of Grand Rapids Auto Salvage Yard said. “There’s papers all over the place quite often, but there’s all kinds of things that shouldn’t be in the car.”

      In some vehicles at the salvage yard, Target 8 found stacks of personal information, including what appeared to be house keys and a driver’s address. The story was the same across town at Grand Valley Auto Parts, where Target 8 found more stacks of personal information just lying on the front seat of a junked car. There was a statement from Chase Bank and a credit union statement that listed the account holder’s name, address, account numbers and phone number. Also in the car was a tax annuity statement with an account number, phone number and address.

      That particular vehicle was in a wreck in New York and found its way to Grand Rapids via an auction. Target 8 contacted the previous owner of the car to inform them papers with identifying information had been found lying unprotected in their old car. “I’m shocked,” the owner said. “I feel violated knowing that somebody else has that information on me, very much so.”

      Salvage yard workers say it isn’t at all unusual to find personal information in a junked car. If your vehicle has been in an accident, don’t let out of sight be out of mind. Salvage yards will usually empty a vehicle, but not always. You should get back to your car yourself and check that nothing identifying has been left behind. In some salvage yards, customers are supervised on the grounds. But at other pick-and-pull yards, anyone is free to rummage through everything on their own, which could be the biggest risk for identity theft.

      Webmaster’s note: This also goes for when you take your car into a service facility. Never ever never leave any documents in your car that has your Social Security Number, account numbers of any kind, medical bills, utility bills, charge card bills, and all other personal identification information in your car. Your car is not as secure as you think. It is surprisingly easy to break into. Keep all your personal info at home, preferably in a lock box.

      Return to top of page.


      Don’t Always Share Everything With Facebook

      By Kim Komando as published in the G.R. Press 9-6-15. Visit komando.com

      The point of Facebook is to share your life with other people. You probably have more than a few friends who fall into the over-sharing category. Before you snicker, you may be one too and not even know it. Here are personal tidbits Facebook asks you to share that you’re much better off keeping to yourself.

      Your Phone Number
      It’s a really bad idea to add your home or cell phone number to your Facebook page. Prank callers, stalkers, scammers and identity thieves would love to use this information against you. Not only that, but there’s a Facebook trick that works most of the time. Anyone can use your number to search and find your Facebook page.

      If you do give your phone number to Facebook, hide it in your profile. Go to Facebook and click on your name at the top of the page. When your profile page loads, click the “Update Info” button in the lower-right corner of your cover image. Go to “Contact and Basic Info” in the left column and next to your phone number click the “Edit” link. Click the “audience selector” icon, which will either be a globe or a silhouette of two people, and change it to “Only me.”

      Your Home Address
      Post a picture of your recent vacation or major new purchase and this puts you at risk. Think of all the things that might happen if some nefarious person knew your home address. Remove it from your Facebook profile. Follow the previous directions with your phone number to get into the “Contact and Basic Info” section of your profile information. Look for “Neighborhood,” and if there’s an address there, click the “Edit” link and wipe out the information. Then click “Save Changes.” One other place you might not think about your address being is under events. If you create an event, it often has your address so people know where to go. If that gets set to Public, anyone can see it. Either delete the event after it happens, or tell people attending to message you for the address. Be sure to check your history to get rid of any old events or posts that have your address in them.

      Anything Work-Related
      Try not to leave any information on your Facebook that reveals where you work. If someone from your workplace tries to search for employees on Facebook, they might find a post or photo that they don’t like. Similarly, if a hacker wanted to figure out whom to target if they wanted to break into your workplace’s computers, social media would be their first stop. Of course, they’re more likely to hit LinkedIn first.

      You can use Facebook’s timeline tools to do a scan of your past posts. Remove any information about your current job, especially if it’s of a complaining nature.

      Relationship Status
      Including your relationship status on your Facebook page just invites awkwardness. The number of “likes” that you might get from people after you change your status from “married” to “it’s complicated” will creep you out. Certain relationship statuses are also a draw for cyber stalkers. At one point, there was even a Facebook app that would notify you if friends you flagged changed their relationship status to “single.”

      Don’t forget the scammers out there who specialize in sweetheart scams. They use social media, email and dating sites to create a romantic connection with you and then swindle you out of money. You don’t want them to see that you’re single on Facebook and get ideas. It’s easier to just remove your relationship status entirely.

      Payment Information
      Facebook is free, but it still wants your credit card number. Adding your financial information lets you buy gift cards and other products through the website. Of course, one of the best ways to accidentally get your credit card charged for something could be to leave your Facebook profile open on your home computer. A family member or “joking” friend at your home could use it to spend money on something straight through Facebook.

      Open Facebook, click the upside-down triangle in the top right corner and choose “Settings.” In the left column, select “Payments,” and then on the right go the “Account Settings” tab. You can see if you have any saved payment information and remove it.

      Return to top of page.


      Crooks Have a New Way to Break into Cars

      By Michael Calkins; Bottom Line Personal July 1, 2015

      Thieves have discovered a new high-tech way to break into certain types of cars. The vehicles that are vulnerable constantly emit a low-power signal that automatically allows entry when the car’s remote key fob is within a few feet of the lock, even if the fob is in a person’s pocket or purse. The person who has the fob does not need to touch the fob—he/she just pulls the door handle open to gain entry. The thieves don’t steal the key fob—instead they use a portable radio-signal booster to trick the car into thinking that the fob, which might be, say, somewhere inside the owner’s house and as far as 100 feet away, is close enough to the car to release the lock. If the fob also allows the car to be started with the push of a button on the dash, as some do, the thief even can drive the car away without having a key.

      What to do: If your vehicle has this type of entry system, park in a locked garage when possible. If you park outside, do not leave valuables in view—even when the car is parked in your own driveway. (And remember – Thieves can also steal your identity from your driver’s license, car registration, and insurance certificate. If you have to leave your purse, wallet, etc., in the car; lock them in the trunk! – Brian See Your Vehicle and Identity Theft - Partners in Crime)

      If you want to be especially cautious, store your key fobs inside a metal container when they are not in use to block any incoming radio waves. Encasing the fobs in aluminum foil or storing them in a small decorative tin also works. Don’t leave them in a wooden drawer. Do not store your key fobs inside a freezer, refrigerator or microwave oven, as some people have recommended. While these appliances can block radio waves, key fobs can be ruined by condensation when repeatedly cooled and warmed…and they definitely will be ruined if someone accidentally turns on the microwave with the fobs inside.

      Source: Michael Calkins, manager of technical services at AAA, Heathrow, Florida. He has more than 35 years of experience in the automotive industry…is a certified Master Automobile Technician…and has an Associated Applied Science degree in auto mechanics. AAA.com

      Return to top of page.


      Your Fingerprint Won’t Protect Your Accounts

      Gary Miliefsky as published in Bottom Line Personal May 1, 2015

      Biometric security confirms your identity by scanning some characteristic of your body—such as your fingerprints, irises or the shape of your face—or by listening to your vocal patterns. Recent iPhones and iPads and some other devices already include fingerprint scanners, and a few investment companies have launched biometric-security programs, Vanguard offers voice verification, for example. Facial or iris scanners would use the cameras built into computers. There are problems; however...

      The bad guys can beat biometrics. Biometric technology is improving, but for now, the face, iris and fingerprint scanners sometimes can be fooled with photos. Voice scanners can be fooled with voice recordings.
      Biometric systems can be frustrating to use. A finicky biometric system might deny you access to your own account if, for instance, you have a cold that distorts your voice.
      Some biometrics require additional hardware. Most of today’s computers and Smartphones do not include fingerprint readers, for example.
      You can’t change your biometric data if it’s stolen. If an investment company uses biometric security, it must store your biometric data in its computers. If that computer is hacked, the crooks might get their hands on details about your fingerprints, face, eyes or voice that they could use to invade accounts.

      Return to top of page.


      Cyber Thieves May Have Your S. S. Number

      By John Sileo as Published in Bottom Line Personal April 1, 2015

      Social Security Numbers Are Key
      Unlike the hacking incidents at such companies as Target and The Home Depot, the Anthem breach could lead to long-lasting and even life-altering identity theft for many of the up to 80 million current and former customers potentially affected. That’s because the hackers who invaded Anthem’s computers stole data including names, employment and contact information, health insurance IDs, addresses, birth dates and Social Security numbers. Social Security number breaches are especially dangerous because they don’t just help crooks gain access to your accounts, the way a credit card breach does. Social Security breaches allow the crooks to pose as you in a myriad ways that could wreck your life. Victims might spend the rest of their lives fending off bill collectors about purchases they never made…fighting to remove inaccurate and potentially lethal information from their medical files…explaining to police that it was really someone else who was arrested and skipped bail…and praying that no one steals their tax refunds. That’s far worse than having your credit card information stolen—credit cards can be quickly canceled, passwords can be changed and any losses usually are covered by the issuer.

      If you become a victim of a corporate data breach, don’t be fooled into thinking that you’re safe just because…
      Months have passed and your credit reports remain fine. A 2012 survey by consulting company Javelin Strategy & Research found that 22.5% of people who receive a notice informing them that they were the victim of a data breach later become victims of identity theft, but it doesn’t always happen fast. Data thieves sometimes wait years to use stolen data. You have never been an Anthem customer. There have been other comparable data breaches, and more are sure to follow. Examples: Community Health Systems, a network of more than 200 hospitals across 29 states, had approximately 4.5 million patient records breached. Experian, which maintains confidential credit files, was breached, exposing an unknown number of files. Possible consequences for victims of the Anthem breach—and other similar breaches—and what to do about each…

      Phony Debts In Your Name
      An identity thief who has your Social Security number might open new credit accounts in your name or even borrow against the value of your home. You would not be held legally responsible for these debts ultimately, but it could take decades to clear up the mess. In the meantime, your damaged credit score could mean higher interest rates on loans…higher auto insurance rates…and even rejections from potential employers.

      What to do: Place a security freeze on your credit files. The usual advice is to put a fraud alert on your files, but that does not provide sufficient protection. Alerts generally expire in 90 days, and while lenders are supposed to take added precautions when an alert is in place, these precautions can fail. A freeze completely blocks your credit report from being accessed and credit from being issued until the freeze is lifted.

      Contact all three credit bureaus by phone or online to establish this freeze (Experian.com, Equifax.com and TransUnion.com). You will have to contact the bureaus again and provide a password whenever you wish to temporarily lift the freeze to apply for credit. Costs vary by state, but expect to pay $3 to $10 to each reporting agency each time the freeze is lifted. In some states, there also is a fee to establish or reestablish a freeze.

      Helpful: Ask lenders and credit card issuers which credit-reporting agency or agencies they use, and then lift the freeze only with those—generally only mortgage lenders check all three. In some states, you will be exempt from the fees cited above if you are 65 or older (62 or older in Louisiana and North Carolina) and/or can provide a police report showing that you are a victim of ID theft.

      If you are unwilling to place a security freeze on your credit—perhaps because you are in the process of applying for loans or jobs—at least sign up for an ID-theft-monitoring service. These services do not prevent ID theft, but they can notify you quickly of certain signs of trouble and help you navigate the often frustrating recovery process. Warning: The ID-theft-monitoring services provided to the victims of large-scale data breaches for free usually are badly lacking, possibly monitoring ¬credit reports with only one of the three major credit bureaus, for example. Instead, consider spending around $250 per person a year for a high-¬quality ID-theft-monitoring service. Choose one that monitors credit reports from all three credit-reporting agencies plus address-change requests, court records, driver’s license activity, payday loan applications and websites where stolen identities are bought and sold. Services that use the underlying monitoring technology of a company called CSID tend to be among the most robust. These include IDT911 and LifeLock.

      Phony Debts in Kids’ Names
      If your children are covered through your health insurance, they also could be at risk for identity theft if your insurer or one of your medical providers is breached. This wasn’t a risk with retailers such as Target and The Home Depot that do not normally have minors’ confidential information on file. ID theft can be especially troublesome for minors because it often isn’t noticed for years. One frustrating twist for parents—you generally cannot place a fraud alert or a security freeze on a young child’s credit file. If the child doesn’t yet have credit, he/she probably doesn’t yet have a credit file. If you try to set up a fraud alert or credit freeze for such a child, it could trigger the creation of a credit file, which in some ways makes it easier to steal the child’s identity.

      What to do: An ID-theft-monitoring service that includes family protection can monitor databases for signs that the child’s Social Security number is being used by identity thieves. Even the free monitoring product being offered by Anthem likely can do this, though a higher-quality service offered by a pay service probably could do it better.

      Phony Health Insurance Bills
      Someone could use your health insurance ID number to obtain health services in your name, leaving you to battle health-care providers and bill collectors about co-pays and other fees that you don’t owe. What’s more, your medical records could become corrupted with someone else’s information, leading to a potentially lethal misdiagnosis.

      What to do: Read every “Explanation of Benefits” statement you get from your insurer. If any don’t correspond to a medical visit you made or treatment you had, contact the provider and the insurer immediately to alert them to potential medical identity theft. If you have access to your medical records through a health-care provider’s online patient portal, check this every month or so.

      Stolen Tax Refunds
      An identity thief who has your Social Security number and date of birth could file a phony tax return in your name to claim a tax refund. Not only could this greatly complicate your own tax filing, it might mean that you can’t receive the refund you are due until the situation is cleared up, which could take years. If you filed taxes last year in Florida, Georgia or Washington, DC—the places with the highest rates of tax-refund identity theft—you can apply for an identity-protection personal identification number, or IP PIN, through the IRS website. On IRS.gov, enter “IP PIN” into the search box, then select “The Identity Protection PIN (IP PIN).” Once you receive your six-digit IP PIN, enter it on your tax return to confirm that the return actually is from you. IP PINs also are available to the approximately 1.7 million taxpayers who received a letter offering them this safeguard because the IRS identified what it considered suspicious activity in their accounts. IP PINs cannot be used on state tax returns, however. For more information on eligibility and rules, go to IRS.gov
      - Get An Identity Protection PIN

      Source: John Sileo, president and CEO of The Sileo Group, a Denver-based data-security think tank that has worked with the Department of Defense and Federal Reserve Bank of New York, among other clients. He is author of Privacy Means Profit: Prevent Identity Theft and Secure You and Your Bottom Line (Wiley). Sileo.com

      Return to top of page.


      Protect Your Password

      When signing up for a website or online account, don’t answer security questions honestly, such as your mother’s maiden name or your birthplace. You will actually better protect your password, account, and personal identity if you use the wrong answers to the security questions. You will be amazed by the amount of your personal information that is available on the web to anyone. With a little research about you, a bad guy can answer most security questions. Be sure to use something that you can easily remember, or write it down on paper and keep it in a drawer. For instance; answer the question “What make was your first car?” with the nickname you named your car or the color. “What was your mother’s maiden name” you might answer with her middle name instead.

      Return to top of page.



      Ways To Protect Yourself After A Data Breach

      By Koco McAboy Published on WoodTV.com February 7, 2015

      The nation’s second largest health insurer, Anthem, is now scrambling to notify millions of customers who may be the victims of a massive data breach. Hackers broke into the health insurance database storing information for about 80 million people. The hackers did gain access to names, birthdates, email address, employment details, Social Security numbers, incomes and street addresses of people who are currently covered or have had coverage in the past.

      “Every one of us is vulnerable and every one of us has to be vigilant in protecting our identity from theft and protecting our credit ratings,” said Phil Catlett, the President and CEO of the Western Michigan Better Business Bureau. Catlett said there are a few things customers can do now to help avoid more issues in the future.

      “Probably the one thing you ought to do is put a fraud alert out there in a number of places, and if you put a freeze on your credit alert, anytime anybody is trying to get information by pretending to be you with your social security information, they won’t be able to get it,” said Catlett.

      Catlett said to put out a fraud alert or place a security freeze, you have to contact one of the three credit reporting bureaus, which are Equifax, Experian or TransUnion online (See credit bureau contact info.) or by certified mail. A customer would then tell the bureau that you would like to put out a fraud alert and place a security freeze. The customer must provide identifying information including a social security number. The freeze will remain on your credit report until you request to remove it. According to the Michigan.gov website, a security freeze is free to identity theft victims, but if you are not an identity theft victim, it will cost you $10 to place a freeze with the bureau.

      A security freeze will impact a customer who is trying to take out a loan or buy items like furniture or a car. “But if you are an Anthem customer, it might be worth that bit of difficulty to protect you from the other things that could be happening. There are already people attempting to commit fraud right now. They’re putting out huge emails saying they’re from Anthem and they’re giving you this free service to protect your credit and then they’re trying to loop you in. Don’t click on those links. If you want to find out what they are offering, go directly to Anthem’s website,” said Catlett.

      Anthem said they will send notices through mail to impacted customers and will be providing a free credit monitoring service. The specifics of the program have not yet been released.

      Return to top of page.



      What To Do After A Personal Data Breach

      If you suspect or are sure your personal information has been stolen here are some steps to take to minimize the damage :

    1. Change all of your passwords and user names. Yes it is a pain in the rear, but necessary. See our Active Scam Page for ‘The Word on Passwords’.
    2. Beware of phishing emails and regular mail. See our Active Scam Page for more info on ‘email scams’.
    3. Carefully scrutinize all of your financial statements and bills for errors and unauthorized transactions.
    4. Put a fraud alert on your credit report and get a copy of your credit report every year to check for unauthorized transactions. See credit bureau contact info.
    5. Put a security freeze on your credit report. A security freeze is free to identity theft victims, but if you are not an identity theft victim, it will cost you $10 to place a freeze with the bureau.
    6. If you can, get a police report. This will come in handy working with credit bureaus and financial institutions.

      Return to top of page.


      You Have Fallen For A Scam! Now What?

      By Lincoln Spector published in P.C.World Aug. 2014

      Cybercriminals tricked you into giving away some sensitive information. Now you need to know how to mitigate this situation. Don’t feel bad. We all make mistakes. But with these sorts of mistakes you have to act fast to avoid disaster.

      What you need to do depends on how you were tricked. Did you give them your email password? Your bank and/or credit card numbers? Your passwords for social media accounts? Did they remotely access your PC or phone; or trick you into installing software?

      If you have reason to believe that criminals can access your financial accounts, call your banks and credit card companies immediately! Explain the situation and follow their instructions.

      Next, change any passwords that may have fallen into criminal hands. This includes email, social media, and all other passwords. While you are at it change the passwords you are using for more than one account. Never ever never use the same password for multiple accounts! NEVER!

      If you can’t change the password – or even log into a site – That means the criminal got there first. Check the FAQs for information on how to recover a hi-jacked account. Conduct a web search for “Hijacked Account – (name of your hijacked account - Google, Facebook, etc.) and follow the instructions. By the way; If you set up your account with two step verification, chances are slim that that criminals will be able to access and hijack your accounts.

      Next call the police and ask to make a report. No the cops will not find the criminal and return what was stolen; but the banks, credit card companies, and other institutions may want to see a police report. It makes your claim of being victimized official. DO NOT call 911 unless the criminal is inside your home! Use the non-emergency number.

      Were you tricked into allowing someone to remotely control your computer? Or into downloading software? If so there is no telling what information they got or are getting. In that case, change your windows login password immediately! And scan your computer for malware using multiple antimalware tools. Go to www.pcworld.com for more info.

      Return to top of page.



      Personal Information Safety Tips

      Identity thieves LOVE the holidays! Everyone is so busy that they rarely remember to guard their personal information. Here are a few basic safe holiday shopping tips:

      CREDIT / DEBIT CARDS – Try not to have your card number saved by vendors. I know it is a pain, but if the bad guys hack your account they are still missing one piece of information. Use a low limit Credit Card or a Debit Card linked to a low balance separate bank account dedicated to online shopping so the bad guys can’t bankrupt you. Now set your accounts up to send you a text alert for all purchases. Be sure to check your Credit / Debit Card and bank accounts once a week or more often to look for unauthorized purchases. Save all your receipts and balance your accounts every month. The bad guys are at it 24 hours a day; every day, they never stop, they never sleep.

      BEWARE OF SHOULDER SURFERS – when using ATMs, gas pump card readers, and store checkouts; be sure to guard your information. Always assume that the bad guys are watching and trying to steal your info. Check the card reader for anything that could be wrong. Look for non matching colors, textures, or loose wires and panels that might indicate a card reader skimmer attached to the card reader. Also look around for people and cameras trying to see your pin #. Shield the pin pad with your body and free hand.

      MAKE SURE YOUR ELECTRONIC ITEMS ARE SECURE – see “Travel Safety Tips For Electronic Devices” on this page.

      WIRELESS INTERNET - be careful of wireless Internet use and make sure that the wireless network you are using is password protected. Be aware of the fact that hackers can hack into wireless Internet networks and can view what you are viewing, such as bank account information. When you join a store or mall’s WI-FI EVERYONE on the network can see you. All your information is at risk. This is how the celebrity nude picture scandal happened! The bad guys joined the network and hacked celebrity’s phones.
      Now that they have your account information, password, and credit card number; they can log in, buy something, change the ‘Ship to address’; and rob you blind. And you will not know about it till it is far far too late.

      SOCIAL MEDIA - review, update and confirm the personal and professional information that you have on any social network. Set ALL of the privacy settings to maximum security; i.e. ‘only friends’. Do not communicate to the world where you are and when, as criminals want to know when you are not home so they can rob you in peace. Post those pictures after you get back.

      ONLINE SHOPPING - do business with companies you know and trust. If you are unfamiliar with a website, research the company, its website and privacy policies. Use a credit (only) card instead of a debit/credit card or checking account, as your credit card is protected under the Fair Credit Billing Act. Using a credit (only) card also prevents thieves from draining your bank account as they have no access to it.

      HOLIDAY PACKAGES - many thieves are stealing packages delivered to your doorstep. The thief simply follows United Parcel Service, US Postal Service, or FedEx trucks, waits for a delivery and then grabs the package(s) before you can get home and bring them in. It is a good idea to have packages delivered to your work or a neighbor who is home during your work hours.

      AND ALL THE REST – be sure to scan down this page for many more basic tips on personal information safety.

      Return to top of page.



      Simple tips to avoid identity theft:

    7. Get your mail everyday as soon as possible.

    8. If you are going on vacation request the post office to hold your mail until the day after you return, or elect to pick it up in person.

    9. DO NOT advertise you are on vacation! Do not Tweat, facebook, etc. that you are gone. Wait until you are home to post all those pictures. Thieves love to know you are not home. You just make yourself a juice target for them.

    10. Pay attention to your billing cycles. If bills or financial statements are late, contact the sender. The bill may have been stolen from your mail box. The thieves can use the info in an average bill to get your personal financial info to steal you blind.

    11. Keep your receipts to reconcile your statements. Ask for carbons and incorrect charge slips as well. Promptly compare receipts with account statements looking for unauthorized transactions and overcharges. You would be surprised how easy it is for an unscrupulous clerk to rip you off. They really like out-of-towners because it will be awhile till you get home and figure it out.

    12. Don’t carry your Social Security card in your wallet or write it on your checks. Only give out your SSN when absolutely necessary. Use an alternative form of ID as often as possible.

    13. Protect your PIN. Never write a PIN on a credit/debit card or on a slip of paper kept in your wallet.

    14. Watch out for “shoulder surfers”. Use your free hand to shield the keypad when using pay phones and ATMs. Take a good look at the ATM for anything odd. Loose wires or tape near the keyboard or extra cameras for instance may mean scammers have compromised the ATM.

    15. Shred unwanted receipts, credit offers, account statements, expired cards, etc., to prevent dumpster divers getting your personal information. Ideally, these items should be shred in a cross-cut or micro-cut shredder. Shred anything with a barcode, any personal, or financial info. Shred, shred, shred for safety.

    16. Store personal information in a safe place at home and at work. Don’t leave it lying around.

    17. Don’t respond to unsolicited requests for personal information in the mail, over the phone or online. If you did not initiate the request it is a scam. If you think it might be legitimate request from your provider, use your personal list of provider information to contact them. Never trust unsolicited requests contact information unless you can verify it.

    18. Install firewalls, virus detection, and malware detection software on your home computer and phone/tablet. I use 2 different antivirus programs and 1 anti-malware program to keep my computer problem free every week. The programs are set to auto-update, but I always update them before I run them every week.

    19. Check your credit report once a year. Check it more frequently if you suspect someone has gotten access to your account information.

    20. Return to top of page.



      Your Vehicle and Identity Theft; Partners in Crime

      From – AZCentral.com – Mark Pribish

      It is estimated that one-third of all motor-vehicle thefts could potentially translate into identity theft because the contents of the vehicle reveal personal information about the owner. According to the FBI’s Uniform Crime Reports, there were 721,053 motor-vehicle thefts in the U.S. in 2012, equating to 1,975 vehicles per day. Your car, truck or SUV will almost always be an opportunity for ID theft. In order to finance a vehicle, register it, acquire license plates and insurance, you are required to share your personally identifiable information. State law requires that you possess your vehicle registration and proof of insurance when driving. Most of us simply keep this information in our cars.

      So what can happen when financing a vehicle? Specific to auto dealerships, there have been multiple news reports on how auto dealers lose vehicles to identity thieves acting as a new-car buyer while fraudulently using someone else’s personally identifiable information to create fake identification and credentials. Once the vehicles are purchased, the actual individuals whose information was stolen are stuck with the problem of resolving these fraudulent purchases. At the same time, there have been a number of news reports on how individual consumers have been victimized by auto-dealership employees who have stolen the personal information of customers. This has resulted in the opening of fraudulent credit cards and personal loans of individual car-buying customers.

      “The fact is your car is your identity,” said Joe Annoreno, CEO of Scottsdale based Vero, LLC, an automotive finance and insurance products company. Annoreno said “the contents of your car, such as a laptop, smartphone, tax information, driver’s license, insurance card, registration, garage door opener and personal mail/bills increase your risk of identity theft if your information is not locked up and secure.” Unbelievably, 31 percent of drivers fail to lock their vehicle doors, and 14 percent leave the keys in the ignition, according to the National Insurance Crime Bureau. But even if we do lock our vehicles, it doesn’t stop various third parties and burglars from accessing your personal info. When using car-wash services, valet services, auto-repair services, or any other automotive-related service where you give an unfamiliar person access to your vehicle, you should either take the contents from your vehicle or secure the contents to prevent any individual from stealing your personal information.

      Mark’s Most Important: Protect your vehicle documents as if they were cash and regularly check for unusual activities after purchasing a vehicle or after it’s been in the possession of others.

      Mark Pribish is vice president and ID-theft practice leader at Merchants Information Solutions Inc., a national ID-theft and background-screening provider based in Phoenix.

      Return to top of page.



      Heartbleed Security Bug

      How do you know if you have been a victim of the Heartbleed Security Bug? If you use a password manager like LastPass, Dashlane, or KeePass they have a program to check for you. If you don’t use a password manager you can try to find out on each individual web site you did business in the last 2 or 3 years. Here is a partial list of sites:
      • Amazon Web Services • Dropbox • Facebook • GitHub • GoDaddy • Google • LastPass • OKCupid • Soundcloud • Tumblr • Turbo Tax • Yahoo

      Your best bet is to change your password and username AFTER the site has closed the critical programming flaw in OpenSSL—an open source implementation of the SSL/TLS encryption protocol. Most proprietary SSL/TLS sites did not have this flaw, only open source OpenSSL had it. You may have also had other personal info stolen such as email, IM, and possibly credit info.

      By now most web sites should have fixed the flaw. As a precaution you should monitor all of your credit / debit cards and bank statements for unusual activity.

      Return to top of page.



      Wireless Router Data Safety Basics

      Change the Default Password – This is extremely important! Default passwords are easy to guess or obtain. Consult your owner’s manual or go online for the correct directions. You do not want just anybody to lurk on your Wi-Fi network. Don’t forget to choose a strong 12 or more character password. See The Word on Passwords.

      Use Only WPA2 Encryption – This is the latest, greatest, and strongest encryption available today. All modern day electronic devises can use it.

      Avoid Common SSID Names – Hackers can easily use a common name to back hack your router.

      Disable you WPS – This is designed to make it easy to add new devises and hackers love it.

      Set Up A Separate Guest Network – It is a good idea to set up a separate guest network with its own SSID name. This way you can have a medium secure password that can be changed often to foil hackers without having the hassle of changing all of your strongly protected equipment.

      Forget MAC Address Filtering – It can be very difficult to do unless you are a true pro.

      Disable Administrator Access From Wi-Fi – That means you can only access the router from a LAN cable attached to a computer. This is just another layer of security to make the hacker jump thru. Hopefully they will just give up because there are easier victims to hack.

      Return to top of page.



      Damage Control Plan After Password Theft

      After any of your passwords are stolen you need a plan to regain control of all of your accounts. It doesn’t matter which password was stolen, or how important that account was, that one password could be the key to losing control of all your accounts in a dominos style cascading breach.

      First change the passwords to all of your email accounts! Why start here? Because changing most on-line account passwords start with email confirmation. I know it is a pain, but you MUST use a unique 10 or 12 character password for each account. For help in creating a very strong password see “The Word on Passwords” at our Active Scam Page

      Now you can safely change all of your financial, medical, utility, social, and other account passwords. You can use a ‘Password Manager’ program, memorize them, or write them down on paper which you keep in a safe place. I have so many accounts I couldn’t remember them all. I memorize the ones I use often and write the others down. Do not forget to change the challenge / security questions too. And mix it up. DO NOT use the same questions for multiple accounts. Try to use less obvious questions that can’t be looked up on Facebook or Google. Have fun with it. Use a goofy question or answer.

      REMEMBER : The best offence is a strong defense. Beef up your passwords and challenge / security questions. Thieves like easily guessed passwords and answered questions. If it looks too hard they most likely will go away.

      Return to top of page.



      Travel Safety Tips For Electronic Devices

      When traveling beware of ALL public Wi-Fi! If it is free the bag guys will be on it too!

      1st – UPDATE all of your security & antivirus programs and operating systems on ALL of your devices INCLUDING your Smartphone. You do have security & antivirus programs on your Smartphone, right?

      2nd – NEVER use public computers for financial transactions. They probably contain spy wear and key loggers to steal your info.

      3rd – NEVER respond to update requests. You just did that and these requests on public Wi-Fi probably contain Trojan horses or send you to a thieves’ look-a-like site to steal your info. ALWAYS use the site you already have bookmarked.

      4th – DO NOT use the phone number on the flyer slipped under your hotel door to order from a restaurant. A new scam involves recreating a legitimate restaurant’s flyer with the thieves’ phone number. They steal your card number and you never get the food.

      5th – NEVER download an app from an unknown site. ALWAYS use a trusted vendor site. It is best not to download anything off public Wi-Fi. Use your own data plan.

      6th – SET a password or code on ALL of your devices. This makes it harder on thieves if the steal it. Better yet, get a tracking service so you can recover or wipe your device if stolen.

      7th – Contact your credit card issuer about security when traveling. Not all merchants are as honest as the ones you use at home/online.

      8th – DO NOT provide details about yourself on social networks that could be used to answer security questions to steal your money/credit/identity. The less personal info out there about you the better.

      9th – DO NOT click on links in social media messages on public Wi-Fi. It is probably a spoof message and the link is to the thieves’ site to load spy-wear to steal your identity.

      Return to top of page.


      ATTENTION WEST MICHIGAN:

      There have been several ATM skimmers in use in the Grand Rapids Metro area. Be VERY careful when using ATM machines. Always assume that the bad guys are watching and trying to steal your info. Check the ATM for anything that could be wrong. Look for non matching colors, textures, or loose wires and panels that might indicate a card reader skimmer attached to the ATM. Also look around for people and cameras trying to see your pin #. Shield the pin pad with your body and free hand.

      Return to top of page.


      10

      New Car Robbery Tactic - Cloning Your Key Fob

      Information keeps pouring in on my iATN professional mechanics forum from all over North America. After reading over 40 responses and a dozen other articles, here is what I have determined.

      The Questions:

    21. 1. Is it possible to clone your Key Fob code? A qualified YES.
    22. 2. Is it possible to jam your Key Fob code so the doors will not lock? Definitely YES.
    23. 3. Is it possible to open your car door with someone else’s remote? A qualified YES.
    24. 4. If the thief wants your stuff, will they get it? Definitely YES.
    25. 5. Can you take reasonable precautions to substantially reduce the possibility of theft? Absolutely YES.

    26. The Explanations:

    27. 1. Newer cars and better after-market Remote Keyless Entry systems are much harder to clone the code due to the use of an algorithm to generate a rolling (new) code every time you press a button on your key fob. Apparently cloning was an issue when Remote Keyless Entry was first coming out 15 or 20 some years ago, and may still be with bargain aftermarket R.K.E.s. It seems to be a bigger issue in Europe. So I deem it a possible, but not likely. Just remember that any security device a man can create, a woman can defeat.
    28. 2. Jamming your Key Fob code so the doors will not lock is a lot easier to do and doesn’t attract attention. Thieves like easy and no attention. Definitely YES.
    29. 3. Again this was an issue 15 or 20 some years ago, and may still be with bargain aftermarket R.K.E.s. One response said he set off the panic mode on the car next to him with the radio remote. So I deem it a possible, but not likely.
    30. 4. Gaining access to your car is frighteningly easy. Auto part stores, hardware stores, and other retail stores sell unlocking tools. Most first responders carry spring loaded center punches to shatter window class.
    31. If a thief wants you stuff, they will get it.
    32. 5. So I stand by my original advice.
      First - Hide your stuff. You hear it every holiday season. The police plead with everyone to hide their stuff. Lock it in your trunk or cover it up on the floor YEAR ROUND. INCLUDING the mounts and power cords!
      Second – Lock your car doors with the door button or key because they are mechanical and do not use radio signals like your key fob to communicate with the car.

    33. The harder you make it to get your stuff, the more chance that the thief will pass you up for an easier target. If your car is locked and all they see is a blanket on the floor, but the car next to you is unlocked; which car are they going to mess with?? Most thieves are thieves of opportunity. Don’t be an easy opportunity.

      PS: Do NOT program your GPS with your home address! Use your work address or a major intersection near your home.

      Return to top of page.



      Beware of RFID technology!

      Recently I have been reading and seeing stories on using RFID technology to skim your credit card information from your wallet simply be waving a card reader within a few feet of your wallet. Then they can clone any magnetic card strip with your info and charge things in person or use it online. Here is the latest story I saw - The Risk Inside Your Credit Card.

      Return to top of page.


      More Identity Theft Information

      A visitor emailed me this link to a page with more good information. It has many good links to other pages with some sound advice. Credit Card & Identity Theft Protection page

      Return to top of page.



      PHISHING

      So what exactly is phishing? It is someone who is trying to get your personal financial or identity records so they can steal your identity or rob you. There have been reports of crooks trying to steal your house by getting a mortgage on your house without your permission or knowledge. Then they take the money and disappear, defaulting on the loan and leaving you to prove you didn't do it. Usually the crooks opens credit accounts with your personal information and leave you to prove you didn't open those accounts. It can cost you Thousands of dollars and months of time to straighten these things out.

      How To Avoid Phishers

      Usually it starts with an e-mail or phone call supposedly from your bank, credit card, government, or other business you do business with. They claim there is a problem and need your social security number, or credit card number, or other personal information to verify it really is you so they can fix the problem. DO NOT GIVE THEM ANY INFORMATION! ! Hang up or close the e-mail. Then using your own phone and the customer service number from your own personal phone book, contact the customer service department directly. NEVER EVER click on a link provided in a suspicious e-mail! These crooks are very good at reproducing a legitimate business' web page to steal information from you. Always use the e-mail address or web site address that you already have in your personal address book.

      If you did not initiate the contact, there is a very good chance it is a crook phishing for your information.

      Sometimes a credit card company will call you and ask if you are on vacation in France, or did you just buy a new Corvette with your credit card? That is probably a legitimate call, but they already have your information and will not ask for it.

      When in doubt, hang up! Then call customer service yourself.

      Return to top of page.


      DIY IDENTITY-THEFT PROTECTION - A 12 STEP PROGRAM

      Author - Dan Tynan

      You can read the complete article in PC World June 2008


      YOU DO NOT have to spend $100 to $200 a year to defend yourself from Identity Theft at the level of protection that a paid for service offers. You can do almost everything those services do, for free. But the following steps will require time and effort.

      1. Get a free copy of your credit report at Annual Credit Report.com Do not be fooled by look alike sites that promise free reports if you subscribe to their credit-monitoring services. Better yet, order by phone at 877-322-8228.

      2. For DIY credit monitoring, order a free report every three (3) months from a different credit-reporting bureau (see below). Scan the report for unfamiliar information such as accounts you don't remember opening.

      3. Place a fraud alert on your credit report by calling one of the credit bureaus. You can find the contact information for all three bureaus by browsing to the Fight Identity Theft web sight. (see below)

      4. Put a recurring event in your online calendar to remind you to renew your fraud alert in 90 days.

      5. Tell the bureaus to stop selling your information to credit services by calling 888-567-8688 or visiting Opt Out Prescreen.com Doing so will reduce but not eliminate the number of preapproved credit card offers you receive.

      6. Request a free public records report from ChoicePoint You'll have to print a form and mail it, along with copies of your driver's license and proof of address. Scan the report for addresses and other details not related to you.

      7. Take your name off other marketing lists by signing up for ProQuo.com's free service. In some instances, you may have to mail letters or navigate to a marketer's own site to complete your opt-out request.

      8. Buy a mailbox that locks or use a post office box. This will help prevent thieves from stealing your identity via paper mail.

      9. Buy a crosscut paper shredder and shred junk mail to frustrate dumpster diving identity thieves. *

      10. Never click a link from an e-mail message to log into your bank or to any other financial institution. Type the secure site's address into your browser, bookmark it, and use that link to access your accounts. Otherwise, you risk having your identity stolen by phishers.

      11. If you believe that you are a victim of identity theft, contact the Identity Theft Resource Center. Volunteers there can walk you through the process of restoring your identity.

      12. Get educated. Mari Frank's IdentityTheft.org, the Privacy Rights Clearing House, and the Federal Trade Commission maintain huge libraries of information on how to avoid being victimized, and what to do if it has already happened.

      *I recommend that you shred anything with any personal information on it. Theives love your trash! Shred all Bank correspondence & records, insurance correspondence & records, credit/debit card receipts, credit statements, old bills of any kind, unsolicited applications of any type. ANYTHING with your Social Security or drivers license number or your birth date!! And just for luck - anything with an account number on it and your address. Better to wear out a shredder than get your identity stolen from the trash. - Brian

      Return to top of page.


      File a Complaint with the Federal Trade Commission

      Phone 1-887-438-4338
      or click I.D. Theft

      Return to top of page.


      CREDIT BUREAU CONTACT INFO:

      Equifax
      PO Box 740241
      Atlanta GA 30374
      1-888-766-0008

      OR

      Equifax Security Freeze
      P.O. Box 105788
      Atlanta, GA 30348

      www.Equifax.com

      Experian
      PO Box 2002
      Allen TX 75013
      1888-397-3742

      OR

      Experian Security Freeze
      P. O. Box 9554
      Allen, TX 75013

      www.Experian.com

      TransUnion
      PO Box 1000
      Chester PA 19022
      1800-680-7289

      OR

      TransUnion Fraud Victim Assistance Department
      P. O. Box 6790
      Fullerton, CA 92834-6790

      www.TransUnoin.com

      Return to top of page.

      To report a DEAD LINK