Debit Cards: Signature or PIN, what’s What?

What kind of debit card do you have? The two types are direct debit cards and deferred debit cards.
2C
Direct debit

  • Use of a PIN (personal identification number), which the bank issues or you choose. Card purchases require entering the PIN, and money is taken out of your checking account on the spot.
  • PIN-based transactions cost retailers less to process, and many banks pass the transaction fee onto the cardholder.
  • Bank fees range from 25 cents to $1.50 per every PIN direct debit purchase. Not all banks blatantly notify the consumer of this, but this should be visible on the checking account statement.
  • Usually safer than the deferred version, as a thief needs to know the PIN to use the card. For obvious reasons, direct debit cards are safer for online use than are deferred debit cards.
  • Cannot be overdrafted unless you opt into overdrafting at the time of account creation.

Deferred debit

Think of a fusion between a traditional credit card and a direct debit card. Rather than on the spot of a purchase, money is withdrawn from your checking account within two or three days of the purchase.

  • No PIN required; only the signature of the cardholder.
  • Has potential for an overdraft, resulting in a fee. The purchase will get cleared even if you don’t have sufficient funds in your account.
  • The overdraft fee could be $30 or more.
  • Tend not to have any transaction fee.

Both of these cards provide a degree of protection for the consumer. With each it is essential the consumer checks their statements frequently as federal law requires banks to refund stolen funds when reported in less than 3 days and up to 60 days depending on the nature of the card.

Robert Siciliano, is a personal security expert contributor to Just Ask Gemalto and author of 99 Things You Wish You Knew Before Your Mobile was Hacked! . Disclosures For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247.

Tax Refund Thieves can be thwarted

If your tax refund doesn’t come, don’t be quick to blame the government. Tax refund fraud is very common. The IRS pays billions in fake refunds.

9DOne well-organized tax refund crime ring that spanned several years, and that involved stolen Social Security numbers and birthdates, scored well into the millions of dollars, costing the Treasury Department millions. The fake tax returns were filed, but luckily, some were intercepted by the government. But how did this happen at all?

The ring leader tracked snail mail routes and purchased address lists covered by single mail carriers. They’d then snatch refund checks. A clue was that most of the stolen identities originated from Puerto Rico. Though Puerto Ricans have SS numbers, the IRS doesn’t tax them unless they’re paid by the U.S. government or U.S.-based companies. These SS numbers are especially prized to crooks.

But the problem goes well-beyond Puerto Rico. A recent report says the IRS paid $132 billion in bogus tax refunds over the past 10 years. In fact, the IRS is in violation of the Executive Order 13520, which President Obama had signed to reduce improper refunds, says the Treasury Inspector General for Tax Administration.

What can you do?

  • If you don’t pay any income tax, you can still claim a refund, due to the Earned Income Tax Credit. In 2012, 21-25 percent of all claims were improper, says the recent report. This translates to $12-$13 billion being misspent. Even audits can be erroneous, meaning your tax refund may never have been approved.
  • Make sure your tax refund is definitely yours.
  • Get a locking mailbox. Locked mail cant be easily stolen.
  • File early. If you file before a crook does you’ll get your refund.

What the IRS should do:

  • One way to determine if an online filing is legitimate is to check the reputation of the device issuing the tax return. If the PC, Mac, tablet or smartphone has a history of online criminal behavior or is exhibiting real-time suspicious behavior, the transaction could be flagged for review before the return is accepted or processed.
  • When using an advanced device reputation as the first check in the fraud detection process, the IRS would be able to stop many more fraudulent tax returns as well as downstream fraudulent activities.

Robert Siciliano, personal security and identity theft expert contributor to iovation. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked! See him knock’em dead in this identity theft prevention video. Disclosures. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247

Burglars ‘jiggle’ doorknobs, then leave their mark

Burglars aren’t dumb: They’re apparently enlisting the help of accomplices to seek out homes that are easy targets, then marking them with stickers.The stickers are small and inconspicuous, placed on front doors, being missed by the actual residents.

3BBut in case the resident notices the sticker, the burglars are thinking ahead: The stickers say “24 hour locksmith,” and have a phone number (fake), and thus masquerade as an advertisement for a fictitious business.It’s not known how many of these stickers have been linked to burglaries, but for sure, there’s something fishy here.

The theory by detectives is that the accomplice scouts for vulnerable homes, and this includes inspecting the locks on doors and windows. One of the methods the would-be burglars must be using to determine if a home is a good target is to simply jiggle a door knob and if it’s unlocked, then the property is immediately tagged with a sticker.

If questioned by a police officer, the scout simply says he or she is distributing locksmith marketing.

MailOnline reports “There is growing evidence that some organized teams of burglars may be using this method to target homes in south London,” says the council’s crime prevention spokesman, Cllr Jonathan Cook.

Cook’s advice is to immediately discard such a sticker if discovered, then report it to the police.“It also goes without saying that if people can beef up their home security by fitting sturdy locks to doors and windows and alarms, then this will always reduce the chances of them falling victim to thieves and burglars,” adds Cook.

Agreed. Certainly Schlage’s Touchscreen Deadbolt would be my recommendation.

The holiday time means longer evening darkness. “There have been a number of front doors found with stickers, giving details of a locksmith, which enquires reveal is not a genuine company,” says Inspector David Bannister from the Wandsworth police.

He says the stickers are placed by the main lock. “It is assessed that these markers are being used by potential burglars to mark potential targets which are then returned to subsequently.”

Robert Siciliano home security expert to Schlage discussing home security and identity theft on TBS Movie and a Makeover. Disclosures. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247.

Burglar Real Estate Agent caught on Surveillance Camera

A homeowner’s video surveillance caught a 60-year-old man—a real estate agent—stealing women’s clothes from the house for sale while the owner and his wife were out of town.

5HThe homeowner presented police with the video, leading to the arrest of and burglary charge for Stephen Brumme. Brumme had arrived at the house in advance of a showing, but rummaged through the homeowner’s wife’s wardrobe in a bedroom closet and dresser, pocketing some shirts.

Police believe that this type of crime happens more often than people consider, and that Brumme has likely stolen women’s attire from other homes.

How can something like this be prevented? Here are tips:

  • Install security cameras as part of your home security system. Not only can they trigger an alarm that sets off additional lighting and loud sounds, but they can notify the homeowner with a phone call or text message.
  • Surveillance systems such as Dropcam allow the homeowner to view what’s going on in the house in real time.
  • The cost of a surveillance system will add value to your house. Plus, some homeowners’ insurance plans give discounts if your property is equipped with a solid security system.
  • A camera that’s in plain sight provides a hefty deterrent to potential intruders or vandals. Imagine the peace of mind this will give you when you’re away—or even at home overnight.
  • And even if someone does break in while you’re home, despite the video surveillance system in place, the crime will be caught on tape. This will prove invaluable in a lawsuit.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.

12 Ways to avoid Locksmith scams

Don’t wait until you’re locked out at night in the cold to contact a locksmith. Know ahead of time who you’d call, should you ever have a need for this kind of service. And keep that number in your phone, wallet, purse and car.

  1. 1SFirst find their address on their ad or website. Try to find on Google and other directory listings customer reviews.
  2. Don’t wait till you need them before calling them; call them simply to learn a few things:
    1) Where are their technicians based? 2) Are they licensed? 3) What is the registered name of the business? If at this point you don’t get good vibes from them, end the transaction. Otherwise, then ask about their preliminary cost estimate. An unbelievably low quote (like $20) probably means a scam or hidden costs.
  3. If they answer your phone call with a generic name such as “locksmith services,” be suspicious. If they can’t give a specific business name, move on.
  4. When it’s time to hire a locksmith, inform the dispatcher you need to see the technician’s certification and ID, and that you would like a written estimate prior to the service.
  5. Before having them come out, make sure you get information about any extra charges such as for mileage, service call minimums or emergency hours.
  6. Check the locksmith’s vehicle; it should be marked, and get the license number.
  7. Ask to see his locksmith license. The following states require locksmiths to be licensed: Alabama, California, Illinois, Louisiana, New Jersey, North Carolina, Oklahoma, Tennessee, Texas.
  8. If the locksmith insists on cash, this may mean a scam.
  9. If the technician won’t give a written estimate before starting the job, end the transaction.
  10. If the onsite estimate doesn’t match the phone estimate, do not permit the job to be performed.
  11. If he says, “The lock needs to be drilled out,” ask why, because a professional locksmith should have the skills and tools to unlock just about any door.
  12. Don’t pay until you’re satisfied with the job.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.

Isis Mobile Wallet goes live

Isis Mobile Wallet allows you to make purchases with your phone—a technology that just went live. Just wave your Isis-compatible smartphone at select cash registers to buy soda or taxi service, via Isis’s near-field communication technology. (iPhone compatibility with NFC will come later on.)

1C

Incentives

Customers of Isis Mobile Wallet can use My Coke Rewards and Isis to get three free beverages at designated vending machines.

Another incentive comes from Jamba Juice: that of giving away one million free smoothies to Isis customers.

The third incentive: Make a purchase via an American Express Serve account through Isis Mobile Wallet, and you’ll be eligible for a 20 percent discount (going up to $200).

An enhanced SIM card is necessary to run Isis. You’ll also need to download the app from Google Play, or, you can sign up at any retail store that’s run by these three carriers mentioned above.

Free Smoothies

One million smoothies will be given away for free, courtesy of a business partnership between Isis and Jamba Juice.

All you need do to get the smoothie is make a purchase with your smartphone using the Isis Mobile Wallet.

Why give away a million free smoothies? It’s a promotion to encourage consumers to make mobile payments. This technology is possible by equipping point-of-sale terminals (cash machines) with near-field communication that will read the smartphone as it’s waved at the sensor.

This technology has passed trials with flying colors, and Jamba Juice will implement NFC-enabled terminals in stores nationwide. The goal is to get the idea of mobile payment more universally accepted by consumers.

Robert Siciliano, is a personal security expert contributor to Just Ask Gemalto and author of 99 Things You Wish You Knew Before Your Mobile was Hacked! . Disclosures For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247.

Seniors targeted for Online Dating Scams

The 80-year-old spent $500,000 on his new girlfriend—whom he’d never met. The online romance began with an e-mail (from supposedly a dating service) from a young nurse in Ghana who said she would take care of him. Then requests for money followed. The man’s son believed that the “nurse” was likely a male con artist.

1FAnother case involved an 81-year-old man whose caregiver, whom he met through a dating site, wrote $80,000 in checks from his account.

Online dating scams affect all ages, but seniors in particular are vulnerable due to their loneliness and sometimes compromised mental state.

Some tips:

  • Seniors should enlist support from several people they can trust, to advise them whenever they are conducting financial transactions of any kind.
  • If a loved-one is being scammed, do everything possible to prevent that person from traveling to visit the alleged love-interest. Because really, there isn’t anyone to travel to.
  • Be suspicious of someone who’s falling in love with the elderly person so quickly.
  • Be suspicious if the love-interest suddenly needs large amounts of money.
  • Be suspicious if the love-interest’s photo looks too perfect (this suggests it’s a fake).

All people should be on guard for online dating scams.

  • Use only well-known websites.
  • Seek referrals from friends who’ve met legitimate partners online.
  • Avoid posting personal information in your dating profile.
  • Seek information about potential dates elsewhere online to see if it matches up.
  • Report any potential dates to the website if they ask for money.

Dating sites should incorporate device identification, device reputation and risk profiling services to protect users from scammers.

iovation, Inc., offers ReputationManager 360, the world’s leading device reputation service, protecting more than two billion online dating activities and flagging 2.7 million fraudulent activities.

Robert Siciliano, personal security and identity theft expert contributor to iovation. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked! See him knock’em dead in this identity theft prevention video. Disclosures. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247

Managing your Digital Afterlife

Ever thought of who’d get your assets should you meet an untimely death, or even if you’re 99 and sensing that the time to check out is very soon?

10DYou may know whom you want to receive your assets, but do you know for sure that they actually will? After all, policyholders are not required to find out if the benefactor is deceased; they are only responsible for paying the claim when the beneficiary steps forward.

You must ensure that your beneficiary plans are airtight, which means you must do a lot more than just sign a number of papers outlining an estate plan and other instructions pertaining to end of life.

When it’s your time, will your beneficiaries know where to find your instructions? Will you unintentionally leave behind unclaimed policies?

Essentials

  • Make out an original will.
  • Make it clear who will inherit your assets.
  • Make everything else crystal clear as well, since wills are often challenged by family members in court and subject to probate.
  • Don’t wait till you’re sick or old, either; start this process now.

Ownership Proof

Maintain documentation of your ownership of the following:

  • Housing (owner-occupied and rental)
  • Land
  • Vehicles
  • Cemetery plots
  • Savings bonds
  • Stock certificates
  • Corporate or partnership operating agreements
  • Escrow or brokerage mortgage accounts

Inform your family what you own. Otherwise, after you pass, family members will be burdened trying to figure out everything you owned, and this includes scavenging through every piece of mail that comes to your home.

Bank Accounts

  • Provide family members with a list of all bank accounts as well as online log-in information. This way they can alert the bank to your death. An unused account will become a property of the state.
  • Give your family information pertaining to safe-deposit or security boxes.
  • Register your spouse’s name or child’s with your bank.
  • Next, have your spouse and child sign the registration document; they’ll then be able to access your account without having to get a court order.

Health Care

  • Fill out a durable health care power-of-attorney form. This way, a person you designate can make decisions on your health care should you become incapacitated.
  • Make sure the document complies with the federal health information privacy laws; this way medical professionals and insurance companies can communicate with the designee.
  • Consider filling out an Authorization to Release Protected Healthcare Information form.

Taking these steps will prevent family members from having to go to court to get a guardian appointed.

Retirement Accounts and Life Insurance

  • Make sure family members know your policy carrier name, number and agent.
  • Find out if your employer grants life insurance policies, because often, these get missed by financial planners and end up never claimed.

Marriage and Divorce

  • Your spouse must know where you keep your marriage license. If your spouse dies and you don’t know where the license is, you’ll likely need to pay for a new license and prove you were married to your deceased spouse before you can make a claim.
  • Divorced individuals should make known their divorce judgment and decree (or the stipulation agreement if the case was settled out of court). These documents spell out alimony, child support and property settlements, and may also outline division of investment or retirement accounts.

Robert Siciliano, is a personal security expert contributor to Just Ask Gemalto and author of 99 Things You Wish You Knew Before Your Mobile was Hacked! . Disclosures For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247.

Merchants: Do you know where you Card Data is?

Card fraud affects merchants, not just shoppers. The Data Security Standard 3.0, released by the Payment Card Industry (PCI), urges companies to create a data flow diagram. This diagram would reveal all the systems, applications and employees who have access to cardholder data.

1D“In the majority of compromises we’ve seen over the past few years, the merchant was trying to do the right thing but was unaware that cardholder data existed in a location that was not being protected,” states Troy Leach, PCI’s Security Standards Council chief technology officer, to StorefrontBacktalk.

Data flow diagrams include all types of data pertaining to users, suppliers and customers, and businesses should do a full analysis of their systems to know what’s what.

Businesses should also learn details about security levels at all stages, and figure out whether different data is covered under PCI jurisdiction or the protocols of foreign entities.

Data must be “overlaid with a diagram of servers on- and off-premise, and all mobile devices, including those owned by employees,” reports PaymentsSource.

Merchants should know where all their cardholder data is; how their organization operates; and “how their customer’s cardholder data moves throughout their environment,” says Leach, so they can formulate decisions that will minimize risks and costs.

PaymentsSource recommends mapping the application of data flows, since businesses today are “super-interconnected” to other networks.

January of 2015 is when PCI’s Security Standard 3.0. will be in full effect. In the meantime, retailers should promptly start creating data flow diagrams.

Oregon-based iovation Inc. has created an exclusive network of global brands across the retail industry and others, with thousands of fraud professionals reporting more than 10,000 fraud and abuse attempts each day.

iovation’s shared database contains more than 1.6 billion unique devices including PCs, laptops, iPhones, iPads, Android, Blackberries—practically every Internet-enabled device that exists.

Many big brand retailers use this device reputation service to detect fraud early by not only customizing their own real-time rules to set off triggers, but by leveraging the experiences of other fraud analysts to know if the device touching them at this moment has been involved in chargebacks, identity theft, bust-outs, and any other kind of online abuse you could imagine.

Robert Siciliano, personal security and identity theft expert contributor to iovation. He is the author of 99 Things You Wish You Knew Before Your Mobile was Hacked! See him knock’em dead in this identity theft prevention video. Disclosures. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247

5 Home holiday security myths

It happens every 15 seconds in America: a burglary, says the FBI’s 2010 Crime Clock Statistics. Don’t fall for the following myths.

Myth 1: “I can’t afford an alarm system.”

2HThere are security systems for every budget. You can even get monitoring from an alarm company for just $9.95 a month—easy money if you give up a little soda and chips every month.

Myth 2: Never tell anyone when you go away on trips.

Someone should know when you’re away—such as a trusted family member, friend or neighbor, to keep watch of your home. Yes, don’t reveal your travel plans on social media and to someone you just met in the slow moving line at the grocery store. But a trusted person should know your travel agenda.

Myth 3: Hide a spare key under the door mat, fake (or real) rock or flower pot.

This advice went out with the dinosaurs. The first place a burglar will look is under these items. Leave the key with a trusted person, or better yet, go keyless:

There are no more keys to lose, hide, carry or forget, so you can secure your home while you run or walk around the neighborhood.

I run and used to have to wear a small runner’s pouch just to keep my house key on my person, but not anymore. Schlage’s Touchscreen Deadbolt is the best keyless lock out there. It’s a motorized bolt that automatically locks and unlocks when a four-digit user code is entered, and its lock-and-leave functionality requires only one touch to instantly safeguard the home.

Myth 4: “Intruders wouldn’t be interested in my home.”

Many people who’ve been burglarized thought their neighborhood was too safe for such a crime. What’s to stop a robber from a “bad neighborhood” from venturing into your neighborhood? A burglar may be drawn to what seems like an idyllic neighborhood because he figures there will be few home security systems, not to mention plenty of unlocked doors and windows.

Myth 5: “I don’t have anything of value.”

A burglar will grab anything that’s easy to grab and run off with, then sell on the street or eBay. Portable electronic gadgets may be just what the thief is looking for.

Robert Siciliano home security expert to Schlage discussing home security and identity theft on TBS Movie and a Makeover. Disclosures. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247.