Family Identity Theft is Ugly

Identity theft isn’t just the stuff of exciting movie and TV dramas; this happens in real life—and often. In fact, that Target breach that made headlines, Neiman Marcus, those 1. 2 Billion records the Russian cyber gang hacked: all identity theft.

http://www.dreamstime.com/stock-photos-identity-theft-red-words-binary-code-computer-monitor-image39907813In 2012, according to one research firm, 12.6 million people in the U.S. alone were victims of ID fraud. This translates to this crime occurring every three seconds. If that isn’t bad enough, it’s estimated that one-third of ID theft is committed against the thieves’ own family members.

Sometimes a person learns this when requesting a copy of their credit report. Expecting to see a high score, they instead see pages and pages of fraudulent credit card activity—and a very damaged credit. The thief can even be the victim’s own mother. Or spouse. Or daughter, son, sister, brother.

As appalling as this is, it’s not the least bit unusual. It’s easy, for instance, for a parent to access their child’s name and Social Security number, then open up a phony account—even if the victim is literally a child. Most companies don’t check the ages, so that’s why this crime can go undetected for years.

The victim may not even learn of the crime until adulthood when they apply for their first credit card or student loan. Learning that the thief is a family member, particularly a parent, delivers a particularly hard blow, for obvious reasons. At least there’s no emotional impact when the thief is a stranger or even someone outside the family whom you know.

It can take quite some time to restore damaged credit. The Federal Trade Commission has an online guide that will help victims recover from the crime of identity theft.

Children can’t protect themselves, so adults need to do it for them. That often requires an investment of time and money.

Credit freezes or fraud alerts aren’t available to children until their identity is stolen.

Applying for a fraud alert every quarter to 6 months and being denied means no credit has been established.

Identity theft protection in many cases will help prevent child identity theft. However not all services offer this option. The good news is that child identity theft protection is generally less than $50.00 a year per child when the parent invests in a family plan.

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing  identity theft prevention. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247. Disclosures.

10 Huge Home Security Mistakes

There are some mistakes you don’t get to avoid the second time around because you’re dead because of them. This applies to home security errors.

3B#1. Unlocked doors. It takes two seconds to lock a door. This should be a habit, whether you’ve just arrived home at midnight or are stepping back into your house at 2:00 in the afternoon after watering the flowers.

A burglar will commonly ring a bell, then jiggle the doorknob if there’s no answer. If the door opens, he’ll waltz right in and ransack…whether you answer the door or not. This same principle applies to keeping windows locked, even on a 90 degree day, when you’re not home. When you’re home, try to keep only second-story windows open if you don’t have A/C.

#2. Disabled alarm. Don’t assume that home intrusions occur only when the occupants are gone. An intruder high on crack doesn’t care if you’re home or not. Keep the alarm on even when you’re home, and disable it when you must momentarily step outside, but turn it back on when you return.

#3. Being cheap. Don’t use cheap locks. You’ll get what you pay for. Spend the money, the difference between a $20 lock and a $60 lock is dramatic.

#4. Ladder in yard. Wow, what a great way to make a burglar’s (or rapist’s) job easier. When you’re done, put the ladder away. Don’t say, “I’ll do it later.”

#5. Hidden keys. Come on, even the world’s dumbest criminals know to look under a plastic-looking rock and the welcome mat, check the flower pot, under the dog bowl, etc. Invest in a keyless lock.

#6. Valuables on display. Be careful where you decide to put valuable items as far as how well they can be seen through your window. If choices are limited, keep your shades down, at least when it begins getting dark.

#7. Unlocked garage. Don’t just keep the garage closed; keep it locked.

#8. Dark spaces. A dark house and dark yard tell burglars you’re not home. Another clue you’re gone—and not coming back in an hour— use timed interior and exterior lighting. Put a TV on and a radio to give your home a lived in look.

#9 Unattended growth and deliveries. An accumulation of newspapers and mail lets everyone know you aren’t home. Put your deliveries on vacation hold and stop your mail. Have your lawn mowed and even have someone park their car in and out of your driveway.

#10. Trash treasure. No, not finding something valuable in your trash, but your trash advertising you have valuables in the house: an empty flat-screen TV box and Xbox box with the rest of your trash. Burglars will know you have some cool stuff.

And one more!!!!!

#11. Social media. Don’t post what you’re doing while you’re on vacation. Save it all for after you get home. Remember, burglars read your posts, too.

Robert Siciliano is a personal security expert to SecurityOptions.com discussing home security and identity theft on TBS Movie and a Makeover. Disclosures.

Sandra Bullock stalked and burglarized

Gee, even the rich and famous can be burglarized. Recently a man apparently broke into the West Los Angeles home of Sandra Bullock; he’d also been stalking her. He pleaded not guilty to the charges which include weapons possession—one of the weapons was a machine gun—all found in his home.

1SDAll in all, bail was set for $2 million, and it has yet to be determined if there’s enough evidence for him to go to trial.

HE got onto Bullock’s property in the wee hours of the morning by climbing a fence. Bullock locked herself in a room once she became aware that someone was on the premises. A call to 9-1-1 was made from inside the house, and he was arrested at the scene.

Whether you’re a wealthy movie star or an average Joe or Jane with an average income, there are security measures you should take. After all, you don’t have to be famous to be the target of an intruder.

  • A surveillance system should be set up inside your house, complete with an ear-piercing alarm.
  • A home security system will also contact the police should you not be there or be rendered incapacitated by the intruder.
  • A would-be intruder will think twice before trying to penetrate your home upon sighting the security company’s decals and signs on your property.
  • Have a surveillance system protect the entire perimeter of your property.
  • Imagine you’re away from home and your smartphone alerts you that there’s an intruder on your property. This technology exists. Security cameras, upon detecting motion, can send an alert to your mobile device. The cameras can also set off a siren or lighting that would send an intruder running.
  • Not only can your smartphone receive an alert, but there are apps that allow you to view your home through your mobile.
  • If you have the money, or are resourceful, build a “panic room” aka “safe room”. Google it.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.

Best Way to Destroy a Computer Virus

Computer viruses are here to stay, which means users need to know the best way to eradicate them the moment they attack. Like disease viruses, computer viruses evolve and get “smarter.” The many different kinds of computer viruses (such as worms, Trojans, spyware) are called malware: malicious software.

4HIn general, security software comes with instructions for getting rid of or containing malware.

For Windows users, Microsoft provides tools that get rid of malware. Between your operating system and antivirus software, you will have the basic tools for fighting off most viruses.

Tips for Protecting Your Computer

  • Every day, run a quick scan of all of your devices. But in addition, run a weekly deep scan. Either type of scan can be manually set up or set on an automatic timer (which is actually a lot better since you wont have to remember to do it).
  • Your e-mail program should be set to alert you before you download any graphics or executable files. If you can, set your e-mail to display only text, and to alert you before loading any graphics or links.
  • If you don’t recognize an e-mail sender, and the message includes a link, never click on the link. If the link has you curious, then visit the associated website via outside the e-mail, or, manually type the link’s web address into your browser. In fact, don’t even click on links in e-mails that are supposedly from a familiar sender. Fraudsters can make it look as though the sender is someone you know. Never mind how they do this; it happens.

You can outwit cybercriminals. You just have to be a little smarter than they are and never think, “It can’t happen to MY computer.” There’s nothing special about your computer that makes it intrinsically immune to cyber threats. You must be proactive and take measures to prevent malware attacks.

Robert Siciliano is an identity theft expert to TheBestCompanys.com discussing  identity theft prevention. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247. Disclosures.

Puppy Scams lure in Pet Lovers

Wow, a dog that normally sells for at least a thousand bucks is being given away for free, and it’s young and healthy. Hmmm. The ad is on Facebook, too. Double hmmm.

7WIn Lorain, Ohio, Jessica was that person who saw the Facebook ad—for a free English bulldog puppy. Free! But she had to pay shipping costs. Then she had to pay for shots and medical bills. Jessica ended up paying $6,500 for a free puppy. Amazingly, only e-mail was used for correspondence with the alleged puppy’s owner.

Would Jessica have had to spend this kind of money in a legitimate transaction for an English bulldog puppy? Maybe to some extent. Except in this case, she never got the puppy. And she never got her money back. She ended up in the doghouse.

How to Prevent These Scams

  • Don’t pay for a puppy you’ve never held in your hands. Easier said than done, but there’s no breed out there that’s so rare that you can’t visit up close and personal. This way you can meet the owner, know that the puppy actually exists, and have a firmer grasp on the seller.
  • Don’t be fooled by glorious photos of animals on websites. It’s so easy to lift photos from legitimate sources and put them up on a phony site that a third grader could do it.
  • Be very careful about whom you send money to. Don’t wire it or use prepaid cards.
  • An ad with misspellings and grammatical errors is suspect, but even a crook can have good writing skills. But if an ad is cluttered with poor English, this is a bright red flag since many pet scams come from overseas.
  • Watch out for sob stories such as needing to find a home for “Roxie” because her owner is being deployed to a war zone.
  • Make sure the puppy has “papers.” This means that the breeder can provide documentation that the puppy’s parents have been registered with the appropriate kennel club. This means that the dog is a legitimately pure-bred. And once you receive it, you should register it with the appropriate kennel club.

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing  identity theft prevention. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247. Disclosures.

How to tell if your Computer has a Virus

Your computer probably has a virus if you can answer “Yes” to any of the questions below:

Is your computer running quite slowly?

A virus often causes a computer to run slowly. But realize that this symptom can also mean that a computer needs more memory, or that the hard disk needs defragmenting. It can also mean spyware or adware is present.

Are programs automatically starting?8D

A virus may damage some programs. And in some cases programs might not start at all.

Are unexpected messages occurring?

A viral infection can make messages appear unexpectedly.

Does your Windows program suddenly shut down?

A virus can do this, too.

Is your hard disk or modem working overtime?

Ane-mail virus sends many duplicates of itself by e-mail. You can tell this might be happening if the activity light on your external modem or broadband is constantly lit. Another clue is that you can hear your computer’s hard disk constantly working.

These situations don’t always mean a virus, but they shouldn’t be ignored, especially if there are other problems occurring.

If you already have the latest version of a solid antivirus program, it should spot a virus that’s already in your computer and even a virus that’s about to be downloaded.

Antivirus software works best when it’s programmed to scan your computer at regularly timed intervals (this way you won’t have to remember to manually do it). The software should also automatically download updates to your computer for antivirus definitions.

A reputable antivirus software system should be able to detect a virus trying to get into your computer or one that’s already present. As viruses are always evolving, there may be an invader that your software does not yet recognize, but probably soon will, once an update occurs of a new virus definition.

When a reliable antivirus program spots a virus it will quarantine it. You’ll then be asked if you want to promptly delete it or set it aside. This is because there may be times when the antivirus software thinks that a legitimate program or file is a virus. You then get the opportunity to restore the program or file.

Robert Siciliano is an identity theft expert to TheBestCompanys.com discussing  identity theft prevention. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247. Disclosures.

Cybersecurity Insurance still Requires Cybersecurity

OpenSSL vulnerabilities are sticking around for a while. In fact, recently two new ones were announced: One allows criminals to run an arbitrary code on a vulnerable computer/device, and the other allows man-in-the-middle attacks. A more famous openSSL vulnerability that made headlines earlier this year is the Heartbleed bug.

3DMight cybersecurity insurance be a viable solution?

As reported in SC Magazine, Yes, says Hunton & Williams LLP. Cybersecurity insurance fixes the problems that these vulnerabilities cause—that technology alone can’t always mitigate.

Hunton & Williams LLP reports that GameOver Zeus malware infiltrated half a million to a million computers, resulting in gargantuan losses to businesses and consumers. The firm says that antivirus software just isn’t enough to prevent mass infection. The fact is, advances in malicious code have rendered antivirus software frightfully weak, continues the firm..While not everyone agrees on this point, Hunton & Williams recommends a proactive approach which includes assessment of risk transfer methods, e.g., insurance.

Laurie Mercer, from the security consulting company Contest Information Security, also believes in cybersecurity insurance. Mercer uses cars as an analogy. A car must stick to safety standards. The car gets serviced every so often. But the car also has various buttons and whatnots inside that can alert the driver of a problem.

Likewise, with cybersecurity, products can be certified with commercial product assurance accreditation. A website can get a regular security audit every so often. And like the interior buttons of a car, a website can have a response strategy to a cyber incident or some kind of detection for an attack. However, the car should still be insured.

At a recent SC Congress London, Sarah Stephens from Aon EMEA pointed out that cyber insurance is rising in popularity. But Andrew Rose, a security analyst with Forrester, noted that many threats can be resolved with adequate plans in place.

Robert Siciliano is an Identity Theft Expert to AllClearID. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him knock’em dead in this identity theft prevention video. Disclosures.

Mailroom Error, Big Data Breach

Data breaches need not be launched maliciously in order to be very troublesome, as was the case involving about 3,700 Medicare Advantage members. Freedom Blue and Security Blue members received risk assessment results that actually belonged to other individuals. The addresses, birthdates, member ID numbers and medical information of some members ended up in the hands of other members.

1DAnd how? An innocent mistake committed by a mailroom employee. Though there was no evidence of malicious use of this personal information, it just goes to show you how easily a person’s private information can end up in a stranger’s hands. Imagine receiving a stranger’s medical information in your mailbox. It would make you think twice about trusting the company with your personal information in the future.

Members were notified of this error after the insurer spent a month exploring how it happened. Though the unintended recipients received information about other members’ scores on mood tests, medications and results of frailty tests, at least the Social Security numbers weren’t revealed.

If a breach affects more than 500 people, law requires that the health industry alert the Health and Human Services Department, which will then launch an investigation. The affected consumers, and local news outlets, are also required to be notified.

Highmark Inc., the health insurance company whose members were affected by the mailroom breach, changed the member ID numbers of the affected members or those who might have been affected. Sixty-three members received forms pertaining to other people, and 233 never received a mailing, suggesting that their forms possibly went to other members.

As for the bumbling employee, that person was fired. The other employees are being retrained, and Highmark will implement a bar code system on all mailings, which is one proper way to track breach notification letter mailings to ensure the right pieces of mail end up in the right hands and avoid over-stuffing or mis-stuffing of envelopes..

Robert Siciliano is an Identity Theft Expert to AllClearID. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him knock’em dead in this identity theft prevention video. Disclosures.

 

Prepaid Cards risk of Fraud

Somewhere out there is a dictionary that when you look up the term wire money, the definition says scam! Even though legitimate money-transfer businesses exist like Western Union, a request to wire money for that new car or vacation package is most probably a rip-off.

2CAnd the crooks behind these rackets are figuring out ways to overcome the increased awareness of consumers to the money-wiring scams. They’ve come up with yet another way to steal your money. Thieves are requesting reloadable prepaid cards.

Would you hand a well-fed-looking masked man on the street your wallet? (Let’s pretend for a moment he’s not pointing a gun at you and is simply asking for your money). Of course you wouldn’t give it to him.

But this is what people essentially do when wiring money or sending in the prepaid cards.

Here’s how it works: The thief makes a request to load your cash onto your card (to pay for whatever), and then send over the card number and PIN. This way, the crook can put your money onto their own cards. They then can go to an ATM and take out cash or spend your money at a store. Meanwhile you never receive the item you thought you were purchasing, like that adorable pedigree puppy you saw online.

But the scams don’t stop at buying puppies, vacation packages, cars or other common items. They can also come in the form of a notice that you won a prize, and that you need to send in a prepaid card to pay a processing fee. Sometimes the scam comes in the form of a utility company payment or even government payment.

Bottom line: Don’t send anyone prepaid cards!

In that same dictionary after the term prepaid cards is scam!

Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing  identity theft prevention. For Roberts FREE ebook text- SECURE Your@emailaddress -to 411247. Disclosures.

Victim kills Burglar, Accomplice charged with Murder

A few bungling burglars will be paying lots of time for their crime: one in prison and one six feet under.

1GThe surviving robber has been charged with the death of his alleged accomplice, even though the accomplice was shot dead by the owner of the home that they were apparently intending to rob.

It all began in St. Louis’s Bevo Mill neighborhood when a 17-year-old girl was outside to retrieve something from her car. Two gunmen ordered her back into her house. It didn’t occur to them that inside might be two bears: a papa bear and mama bear, ready to grab their guns and fire.

The girl’s father fetched his gun and fired several rounds, hitting 31-year-old Terrell Johnson, killing him at the scene. The other man, Cortez McClinton, 33, got away with wounds to his chest and upper legs, but was taken to a hospital by his brother.

McClinton has been charged with second-degree murder for Johnson’s death. That’s because if a suspect dies while a felony is being committed, the accomplice can be charged with murder: felony murder, it’s called. Of course, McClinton has been charged also with first-degree burglary, plus kidnapping and armed criminal action.

The homeowner and his daughter were not harmed. The girl’s mother had also taken some shots at the gunmen, but missed. The parents are not being charged.

Much of this can be avoided by being proactive and investing in home security.

  • Hide valuables such as jewelry, preferably in a safe.
  • Lock all entries to your home even if you’re away for only a few minutes.
  • Leaving an outside light on constantly, tells burglars you may not be home. Use an automatic timer instead.
  • Get a home security system.

Robert Siciliano personal and home security specialist to BestHomeSecurityCompanys.com discussing burglar proofing your home on Fox Boston. Disclosures.