Avoid Unwanted Credit Card Charges

I think it’s safe to say that all credit card charges are unwanted, but today I’m talking about so-called “grey charges”—those out-of-the-blue credit card charges that sneak up on us and require our time, attention, persistence and aggravation to get rid of. A study by BillGuard shows the average dollar amount lost by grey charges is around $356.00per consumer annually.

Studies show 1 in 4 people to be victims of grey charges, and because 9 out of 10 people don’t even check their billing statements or only skim them lookingfor large purchases, those grey charges end up eclipsing fraud—as much as 95 percent grey charges to only 5 percent actual fraud!

While fraud certainly is and will always be a hot-button topic that has consumers scrambling to protect their credit cards (which, in reality, can’t completely be protected; all you can do is pay attention to your statements), grey charges have been absent on consumers’ radars in part because the companies that profit from these charges don’t want you to know about them. Fraud consists of 1 percent goods and services not delivered, 1 percent unauthorized charges and 3 percent “other” fraud, which often consists of hacking or unauthorized charges that occur after you hand your card over to a clerk.

Grey charges occur because 1 percent are billing errors, 2 percent are overcharges, 2 percent are duplicate charges, 4 percent are forgotten charges, 5 percent are hidden fees, 34 percent are just totally unrecognizable charges out of nowhere and a whopping 47 percent are unwanted subscriptions such as recurring memberships, “zombie” subscriptions, unwanted auto-renewals, negative option marketing, and “free to paid” offers.

Here’s how to reduce your risk of grey charges and fraud:

  • Always reconcile your bills diligently and on a timely basis
  • Refute unauthorized charges immediately—within one to two billing cycles
  • Use a credit card instead of a debit card, as credit cards offer more consumer protection
  • Use BillGuard to watch your back and protect you from grey charges

Robert Siciliano is a personal security expert & advisor to BillGuard and is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen. See him knock’em dead in this identity theft prevention video. Disclosures.

Simplify and Secure Your Passwords

It seems that almost every site on the Web requires a password. At least twice a week, I get an email from someone who wants me to join yet another site, which requires yet another username and password.

You can cop out and use the same username and password combination, but that’s always possible since some sites let you use numbers and symbols in your password and some don’t, or the user name you want may be taken. Besides that’s just asking for trouble. If you use the same password for your banking account, Gmail account, and your medical account you are leaving yourself open to exposure—if one account ends up getting hacked, all those accounts could be hacked.

But how do you manage all those user names and passwords without having a cheat sheet in a file on your computer or stuck on post-it notes next to your computer? Neither option provides the security you should reserve for passwords.

The key to surviving this is to make a small investment in a password management service that stores your passwords on a security-restricted site that you can access from any device as long as you have an Internet connection. The best thing about a password manager is that you ultimately have just the one master password to remember, which gets you access to all the different passwords for each site.

Password managers also allow you to instantly create secure and complex passwords for each of your accounts, so that you don’t end up using the same one for every account. Usually trying to create complex passwords can be tiresome and it isn’t easily remembering them all, but with a password manager it remembers all your passwords for you.

You might ask how having one password manager that holds the “key” to all my user names and passwords safe? Well it’s much safer than what you’re most likely using today and most of these password managers utilize a high-level of encryption that can’t easily be cracked.

The real security vulnerability is with your own computer and devices and any existing or future malware that it may have that could record your keystrokes or take screenshots. To prevent this, you need to make sure you have a clean device and run scans on a regular basis.

Never forget your passwords again with McAfee SafeKey password manager tool. McAfee SafeKey is available with McAfee All Access and it securely stores your usernames and passwords for your favorite sites, and logs in for you—with just one click. And it works and syncs across all your PC, Mac, iPhone or Android devices.

Robert Siciliano is an Online Security Expert to McAfeeDisclosures.

Maximizing the Use and Efficiency of Your Mobile Device

Time isn’t just money. Time is what you spend with your family, on a vacation or watching a kid’s dance recital. Time can be gained or lost based on how efficiently or inefficiently you use and implement mobile technology.

First and foremost, your mobile phone is a communication tool. It should be set up to access and communicate with everyone in your life that you depend on and who depends on you.

Contacts: There are apps built into all devices that store your contacts’ names, addresses, phone numbers and email addresses, and you really should make sure all these points of data are entered and backed up. Google’s Gmail Contacts is one way to have all your contacts backed up and in sync with your device. It baffles me whenever I text someone and the person responds, “Who is this? I lost my phone and my address book.” Gmail backs up automatically from your desktop or your mobile device.

Calendar: Every device has a built-in calendar. Again, I prefer Google Calendar. I can set appointments from my desktop or device, and every appointment has a set of alerts to remind me one to two days and then two to eight hours ahead of time. I get lots of pings and beeps as reminders, but with a busy life, I need that extra bit of reminding.

Docs: Yes, I use Google Docs too. There are dozens of documents I need access to wherever I am. I have yet to find a more efficient program than Google Docs to safely store and access my documents right on my mobile.

Google Chrome browser: The beauty of this browser on your desktop and on your mobile device is in that you can access whatever tabs you have open on your desktop from your mobile and vice versa.

All this works just as well on a tablet as on iOS and Android. Thank you for saving me time and making life more efficient, Google. Robert Siciliano, is a personal security expert contributor to Just Ask Gemalto and author of 99 Things You Wish You Knew Before Your Mobile was Hacked! . Disclosures

Just One of Many Internet Scams

A good friend of mine called me recently to ask what I knew about scams from online sales. He had placed an ad on CraigsList for something he was trying to sell and had asked for $150 for the item. He had received a call from a woman and she offered to send him a check for the item.

Shortly thereafter, he received a $2,400 check from a major chemical company and was confused about why the check was so much more than the amount he listed and why it was coming from a chemical company.

If you ever run into this, rip up the check. This is advanced fee fraud, or a shipping scam. I explained to him that he would undoubtedly be receiving an email requesting that the difference be paid to shipper via a wire transfer.

But why send a check for $2,400, and why from a chemical company? It was probably the only seemingly legitimate check the scammer on hand from a “business.” If you fall for this scam, you end up sending $2,250 back to the scammer and you never get paid on the $2,400 check.

The day after we spoke, he received this email:

“Hello XXXX,

The check has been delivered, thanks for your honesty towards this transaction so far. Well, the overpayment is meant to cover the cost of shipment for the item alongside my other properties including tax and insurance plus the movers and agents fees.

Please deposit the cheque today so that it clears tomorrow after the check has cleared, All you have to do is go the bank and have the rest of the money withdrawn in cash and have it sent to the movers via wire transfer.

Do let me know your schedule for the week regarding pickup as i have some other properties to be moved alongside the item. Please do act accordingly as agreed after deducting your money for the item, make the rest fund available to the movers via money gram Money Transfer at any of their outlet around you or check on moneygram.com and check for their outlets around and get back to me with the transfer details below (as it appears on the receipt) so i can contact the movers for the pick-up at your location ….Deduct the money gram money transfer charges from my fund also $50 for yourself (meant for any hassle or run around).

1) Sender’s name and address

2) Reference number {which is the 8 digits number on the Money Gram receipt}

3) Actual amount sent after the fee had been deducted

Hope i can trust you with the overpayments? Your Honesty and transparency will be appreciated”

 

The vast differences in the sale amount of the item versus the amount of the check are a huge red flag. Another thing to pay attention to is the email itself. It’s full of bad grammar and has some inconsistencies in wording that should be a warning sign to you.

This scam works on a small percentage of people who are naïve and by their nature are overly trusting of others. Help put a stop to this kind of fraud by learning about these scams and making an effort to educate others on the risks and pitfalls of phone, email, snail mail and web based scams.

Robert Siciliano personal security and identity theft expert and speaker is the author of 99 Things You Wish You Knew Before Your Identity Was StolenDisclosures.

FTC: Identity Theft Top Complaint Once More

Last year, 2012, marks the first year in which the FTC received more than two million complaints overall, and 369,132, or 18 percent, were related to identity theft—an increase of 30% over 2011. Of those, more than 43 percent related to tax- or wage-related fraud.

As the internet grows ever more pervasive and essential, we find ourselves conducting most of our business online. We use the internet to shop, pay bills and manage bank accounts. We will increasingly rely on the electronic exchange of personal information as the internet continues to evolve and become even more consumer friendly. Subsequently, criminals will also evolve, working day and night to find and exploit vulnerabilities within our networks. These hackers will not sleep until they gain access to all of our information, which they can utilize to steal our identities or gain access to our financial accounts.

Statistics show that one in four American adults has been notified by a business or organization that his or herinformation has been compromised due to a data breach. This means that you could be taking all the necessary precautions to keep your information safe, but by simply doing what every other person in the world does—sharing your Social Security number or credit card information with a trusted organization—you put yourself and your security at risk. So, how do you protect yourself?

  • Lock down your PC with antivirus, antispyware, antiphishing and a firewall.
  • Always keep your devices’ OS and critical security patches updated.
  • Consider getting a credit freeze and/or identity theft protection.
  • Shred—don’t just throw away—personal information.
  • Lock down your wireless network with WPA2 encryption.
  • Protect data on wireless devices, particularly when using a public WiFi network, with a free VPN such as Hotspot Shield.

By following these guidelines, you will keep your identity safer. You know who you are; don’t let anyone else think he can be you.

Robert Siciliano is an Identity Theft Expert to Hotspot Shield VPN. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him discussing internet and wireless security on Good Morning America. Disclosures.

How BYOD is Driving Innovation

One fourth of all global information workers use their own devices at home and at work for work purposes. A recent survey report, commissioned by Unisys and conducted by Forrester Consulting, involved 2,600 IT workers and 590 business and their IT executives.

CIO Insight points out that these are the “mobile elite,” a class of professionals who overwhelmingly opt to use their own tools because they claim these devices and applications make them far more productive than products supported and distributed by their companies’ IT departments.

Mobile-elite professionals appear to maintain a decided edge when it comes to client service and innovation. And they are also likely to take the initiative when it comes to sparking organizational change and introducing new technologies.

A recent Deloitte study highlights many common business and technology innovations being explored:

  • Improving time to market, customer satisfaction levels and sales
  • Improving infrastructure and data security, and reducing risk of incident or loss
  • Potentially reducing costs associated with hardware, monthly service fees, provisioning and ongoing support

A recent IDG report disseminated by DronaMobile enumerates the benefits of permitting employees to use their own tools.

Employees allowed to choose their own devices are happier and more satisfied in their work. With the added flexibility of choosing the applications and cloud services to use, employees get the leeway to be innovative. As smartphones and tablets blur the line between personal and work hours, employees pursue ideas at their own pace, time and location. Without the pressure of conforming to office hours and working on office equipment alone, workers are observed to be more productive, efficient, creative and appreciative of this privilege.

Robert Siciliano is a personal security expert contributor to Just Ask Gemalto and author of 99 Things You Wish You Knew Before Your Mobile was Hacked! . Disclosures