Sponsor Robert Siciliano as he runs the Boston Marathon for Miles for Miracles, Children's Hospital Boston
ROBERT SICILIANO is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds.

FREE EBOOK

Check here if you're human

Sponsors

Check Fraud

10 ways to beef up Digital Security

…edia accounts to the private settings you desire. Do you really want a potential employer to see you hurling at your late-night party? Make sure images that you post are not geo-tagged with your home address. #10. Web tools. Check out the various toolbars that you can add to your browser to beef up security. Be selective and check ratings. Robert Siciliano, personal security and identity theft expert and speaker is the author of 99 Things You…

The Switch to the Chip Card – One Year Later

…This transformation has not been without a few headaches for merchants and consumers but believe me…things are improving, and they will continue to improve as businesses complete their shift to the chip. How much? Mastercard fraud data indicates that there was a 54 percent decrease associated with counterfeit fraud when comparing data from April 2016 to April 2015. We Have a Strong Start, But There is Still Work to be Done When considering…

Shred your Boarding Pass

…Don’t get me started. Let’s just only say that this is incredulously absurd. Like, who cares about your bleepity bleep boarding pass, right? OK, you got bumped up to First class. SAVE IT. Well wait a minute. Fraudsters care. Fraudsters also care about the boarding pass that’s left intact in a rubbish can or lying on a seat somewhere. Few travelers know that the bar code on the boarding pass MAY contain that individual’s home address, e-mail…

How to Remove Fraudulent Lines of Credit

…s are to put a freeze on the account while things are being checked into. Get your free credit reports from TransUnion, Equifax and Experian to see how this new account appears. If you’re still in a quandary over this, put a fraud alert and security freeze on all three reports. Taking Matters Further If it’s fraud, file an ID theft complaint with the Federal Trade Commission. You’ll get an identity theft affidavit online; immediately print it…

Busted!: Large Identity Fraud Rings Fall Apart

…cently, twenty people from Pennsylvania and New Jersey were charged as part of a highly sophisticated identity theft ring. The group used several stolen ID’s to open new bank accounts and then negotiate counterfeit and fraudulent checks. These new arrests were based on information obtained through an ongoing investigation, which began after a previous arrest of a member of the ring, Miokar B. Wehye. This arrest occurred after a nearly…

Online Shopping and Counterfeit Goods – The Facts Don’t Lie

…rfeiters have been getting very smart about pricing lately and not discounting their wares as heavily as before, but deep discounts – especially on unknown e-commerce sites – are a tip-off that consumers should do a lot more checking before buying. Check the “About” and the “FAQs” pages: Though some sites look professional at first glance, but are not always so careful about these pages. Check for spelling and grammatical errors. Check for…

How to kick People off your Wi-Fi

…pdate the password on every one of your devices. What if there’s no intruder but your connection is still slow? Evaluate your Internet speed: Do a search for “internet speed test” and see what you are supposed to be getting. Check your “throughput”. Throughput is the measurement of data speeds within your home network. You can check your throughput with numerous online tools. This will show if your Wi-Fi speed is slower than the Internet speed….

Credit Card vs. Debit Card Fraud

…never see your money again. How does the thief get one’s card information in the first place? The thief places a “skimmer” in the swiping device of an ATM or other location such as a gas pump or even the swiping device at a checkout counter. The skimmer snatches card data when the card is swiped. The thief returns at some point and retrieves the skimmer, then makes a fake card. Thieves may capture PINs with hidden cameras focused on the ATMs…

Dust off your digital devices inside and out

…our employees on proactive security and inform them about tricks that cyber thieves use. For more information visit: http://www.dhs.gov/national-cyber-security-awareness-month. If you’re looking for a secure backup solution, check out Carbonite. Sign up before the end of October and receive two free bonus months when you enter code “CYBERAWARE” at checkout. #1 Best Selling Author Robert Siciliano CSP, CEO of IDTheftSecurity.com is a United…

How to stop Browser Tracking

…ivacy click Content Settings. Under Cookies check “Block third-party cookies and site data.” Hit Done. Internet Explorer In the top right corner, click on the gear. Select Internet Options. At the Privacy tab click Advanced. Check “Override automatic cookie handling.” Set the Third-party Cookies to Block. Hit Okay. Firefox Click the lined icon in the upper right corner. Click Options or Preferences for PC or Mac, respectively. At Privacy, under…

44 Tips to protecting your home from danger

…curity system that includes motion detecting lights at all entry points. Make sure no shrubs conceal windows. Plant thorny bushes by windows. Stash what valuables you can in a sock inside your child’s bureau (burglars rarely check children’s rooms). For other valuables, store in a fireproof safe. Use Charlie bars or stoppers on the tracks of your windows. Cover your windows with penetration-proof film. Use deadbolts. Keep your shades down and…

Check out Google’s Password Alert

Cyber crooks have phony websites that masquerade as the legitimate site you want to log onto. They’ve spun their web and are just waiting for you to fly into it. Google now has Password Alert, which will tell you if you’ve landed into such a non-Google web. For the Chrome browser, this extension will prompt the user to change their password. When you change a password (regardless of reason) or sign up for a new account and it’s time to come up…

How to Avoid Bad Apps

…ncreasingly widespread. So what can you do? Stay current – Know that mobile malware is growing and is transmitted via malicious apps. Do your homework – Research apps, read reviews, and check app ratings before you download. Check your sources – Only download apps from well-known, reputable app stores. Watch the permissions – Check what info each app is accessing on your mobile devices and make sure you are comfortable with that. Protect your…

Is It Fraud or are You just Crazy?

…ny claims of fraud or victimization are real, and many are deliberately made up for financial gain (e.g., faking back pain after a fender bender) or are the result of mental illness. Sometimes, it’s obvious when the claim is fraudulent or the result of being “crazy.” In fact, the tip-offs that it’s mental illness at play are more obvious than when it’s fraud, since the con artist can be quite skilled. A general rule of thumb is to look at the…

Identity Fraud Victim every two Seconds

…count—made up 28 percent of ID fraud losses in 2013. But the greatest risk factor for becoming a victim of identity fraud is the data breach. In that year, 30 percent of people who were notified of a data breach became an ID fraud victim. Identity fraud is associated with credit cards, but this type of crime can also involve hijacking someone’s PayPal account, or account on Amazon and eBay. How to Protect Yourself Javelin Strategy &…

Time to check your Facebook Privacy settings

Did you know that, once again, Facebook has changed its privacy policies? At the top of the FB page is a lock icon. Click it for more privacy settings. What do visitors see? To view how visitors see your Facebook page, go to “Timeline and Tagging,” then hit “Review what other people see on your timeline/View As.” Posts by friends. Click “Timeline and Tagging” to prevent a visitor’s unwanted post from showing. Then click “Enabled,” as this will…

25 Home Security Tips

…ough windows. Have a smoke alarm and check it periodically; run fire drills for the entire family. When gone, leave a light on; better yet, use a timed lighting system. Also put the TV on. Have a carbon monoxide detector and check it periodically. Make sure your security alarm system properly works. Consider having a “secret” room, also known as a “panic” room built. Keep your phone by the bed. Mobile phone is best. Install motion detectors…

Frequently Asked Questions About Identity Theft

…all your bank and credit card companies. Notify them of fraudulent activity. They may be able to reimburse you for any money lost or close any unauthorized accounts. Check with credit reference agencies. Ask them to set up a fraud alert. Also, check to see if anyone has tried to get credit using your name. Keep records. Keep track of all conversations and paperwork, the more detailed the better. Organize your data into one centralized place….

Why Hotels Check your ID

…sts to show a photo ID, especially in a seedy part of town. If the room is trashed, the owner knows whom to go after. But the large name-brand hotel is a bit different. Requiring a photo ID when someone uses a credit card or check is understandable. But some hotels also require it if the guest has cold cash. The true answer would have to come from the lawmakers, even though we can think of some hypothetical scenarios in which a person could…

Can Hackers Use FraudFox VM to Defeat Your Fraud Prevention?

…bilities have even migrated into easy-to-use settings in the major web browsers to make testing easier for web developers.Device reputation solutions have evolved along with such tools and continue to provide great uplift in fraud catch in spite of them. From the reported attributes that FraudFox can change, it would be unable to evade native recognition tools (those embedded in native desktop apps) and it would stumble over transactional…

Credit Card Fraud isn’t the same as Identity Theft

…ame, address and Social Security number. He maxes out his new card and doesn’t pay the bill. One day you get a call from a collection agency, along with knowledge that your credit has been ruined. This is called “new account fraud” Account takeover can be discovered via unauthorized charges on your statements, or the thief’s spending habits may alert the company (via its anomaly detection software) to something suspicious, such as a lot of…

Fear of Fraud trumps Terrorism

…u to dispute unauthorized charges on your card statement and get other things straightened out. And until you pay the whopping bill, your account isn’t robbed.But if someone hacks into your debit card, they can wipe out your checking account in a flash. The good news is that often, cyberthieves test the waters of the stolen data by making initially small purchases…kind of like a would-be mugger feeling out a potential victim by initially asking…

Background Checks aren’t as easy as you’d think

…to refuse employment to someone. But this doesn’t mean that the investigator can’t investigate, including going straight to the affiliated court and then turning this information over to the individual wanting the background check. Sex offender checks usually turn up empty, but they should always be done. The investigator should also search for arrest reports, but there’s no guarantee that the unveiled information can be legally presented to the…

It’s Beginning to Look a Lot Like the Holiday Shopping Season

…ase. Check that the site is secure. Find out if a company’s website is secure by looking for a security seal, like the McAfee SECURE™ trustmark, which indicates that the site will protect you from identity theft, credit card fraud, spam and other malicious threats. Make sure the site uses encryption—or scrambling—when transmitting information over the Internet by looking for a lock symbol on the page and checking to make sure that the web…

What is Criminal Identity Theft?

…s pulled over by law enforcement and presents your license as their own they could be questioned for further information Get a background check on yourself. If you feel like someone may be impersonating you, get a background check done. This can be done via online services or by a private investigator. Check State and National criminal databases. Search your name in criminal databases like the FBI’s National Crime Information Center (NCIC)…

12 Tips to Find a Missing Person

…something left cooking, running water, etc. Contact the person’s family, friends and other contacts. Were there any fights? Talk to coworkers and bosses. Find out if there were any financial problems or signs of depression. Check with hospitals, medical examiners and coroners. Ask for the individual by name. Also ask if there’s any unidentified patients who fit the description of the missing person. Check social media; there may be a cyber…

Beware These College-Related Scams

…get taken by one of these scams: To protect yourself, develop the habit of not giving personal information to strangers and double check the authenticity of the organization. Before sending in any online application, double check the accreditation for any college or university. In the United States, you can do that on the Department of Education site. Verify that a scholarship is valid, by checking with an organization like FinAid.org. Avoid…

The Sweet Sixteen Rule

…age and build a respectable credit score. No parent wants that for their child! So when your child turns the big 16, start a new tradition and check to see if your child has a credit report. If your child does have a report, check to make sure there are not any mistakes on it and also check in why he or she would have a credit report (since most wouldn’t). You’ll not only save your child tons of headaches later on, but you’ll have a head start…

Credit Card Fraud booming

…he retailers who participated can see the detailed results. Plus, the report has an anonymous portion to help with quality and availability of the most critical data. These tweaks will assist retailers with their war against fraud. Online fraud is higher on everyone’s radar due to so many high profile hacks. In fact, the study indicates that spending on online fraud prevention has gone up by 50 percent. Though this is good news, it hardly…

Prepaid Cards risk of Fraud

Somewhere out there is a dictionary that when you look up the term wire money, the definition says scam! Even though legitimate money-transfer businesses exist like Western Union, a request to wire money for that new car or vacation package is most probably a rip-off. And the crooks behind these rackets are figuring out ways to overcome the increased awareness of consumers to the money-wiring scams. They’ve come up with yet another way to steal…

Graduates beware of Identity Theft

…ying apps from third party sellers, etc. Avoid debit cards; use only a credit card because thieves prefer to steal identities through debit cards. Memorize your SSN so you can keep your SSN card in a safe place at all times. Check your credit card statements every month for suspicious charges. Never give out your SSN, even if the clerk at the retail store insists they need it so that they can give you an intro 15 percent off with the store’s…

Heartbleed: Free Tool To Check if That Site is Safe

…http://tif.mcafee.com/heartbleedtest McAfee’s Heartbleed Checker tool works by entering any website name to find out if the website is currently vulnerable to Heartbleed. Steps to protect yourself: Go to McAfee’s Heartbleed Checker tool http://tif.mcafee.com/heartbleedtest and enter any website URL to check if it’s vulnerable. If the site is deemed safe your next step would be to change your password for that site. Remember, changing your…

Credit Card Fraud Security Bleak

The U.S. is no Superpower when it comes to card payments: the card hacking headquarters of the world. Don’t count on credit card fraud going away too soon. After all, Americans practically sleep, eat and breathe credit card use. And it’s those doggone magnetic strips on the cards that keep getting consumers, retailers, banks and the card companies in a fix. The strips make it so easy for hackers—and they know it. It’s high time that the U.S….

ID Theft, Medicare Fraud Prevention in People Over 45

…offers. Call the FTC OPTOUT at 1-888-567-8688 to stop these offerings. Memorize your SSN so you don’t have to bring it in public. Thin out your wallet. Cancel unused cards. Never have any personal information printed on your checks except your PO box address. Have only your first and middle initial with your last name printed on checks. Have your bank issue an ATM-only card rather than an ATM debit card. Don’t wait till you’re a victim of crime…

Student Financial Aid Fraud is a big Problem

…in number of enrollees Frequent communication from similar individuals or locations Every applicant should be identity-proofed, which is easier said than done. Verification is one element of identity proofing. To combat this fraud, Finaid.org notes: Families must sign a waiver allowing the financial aid office to obtain tax returns straight from the IRS. Some people have submitted fraudulent tax return copies during verification. Getting them…

3 Essential Post-Burglary Tasks

…ld you do if you come home to find it’s been ransacked? Don’t panic; be organized and strategic. There are three main actions you should take, in the following order: Report and check Clean up Plan ahead Report the crime and check the home Your goal here is safety first and then catching the bad guys. The following tips will point you in these directions. If you’re sure your house was robbed before you make entry, do not enter until the police…

Older Technologies Facilitate Credit Card Fraud

…strip on the back of credit and debit cards is a godsend to criminals. The easy-to-copy band stores account information using a technology the same as that of cassette tapes. U.S. credit card technology has not kept up with fraudsters. One challenge facing the industry is that it is very expensive for companies to upgrade their credit card security. When a card is swiped, the strip allows communication between the retailer’s bank and the…

Protecting Yourself from Debit Card Fraud

…rd or account information to someone who phones you. Never leave your checkbook around where someone can get at it. The St. Louis Post-Dispatch article reports the case of a man whose girlfriend’s heroin-addict son found his checkbook and wrote checks totaling $40,000 before he realized he’d been robbed. Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft prevention. For Roberts FREE ebook text-…

Merchants: Do you know where you Card Data is?

…full effect. In the meantime, retailers should promptly start creating data flow diagrams. Oregon-based iovation Inc. has created an exclusive network of global brands across the retail industry and others, with thousands of fraud professionals reporting more than 10,000 fraud and abuse attempts each day. iovation’s shared database contains more than 1.6 billion unique devices including PCs, laptops, iPhones, iPads, Android,…

8 Tips to prevent post Holiday Credit Card Fraud

…in regards to new account fraud then you need to step it up. If you suspect fraud, contact Equifax, Experian and TransUnion to issue a fraud alert on your credit reports. Pull your credit reports from these three bureaus to check for any suspicious accounts in your name. Check your credit reports again in six months. Pull your credit reports for inspection (it’s free) every 12 months as a smart measure. Get a credit freeze Invest in identity…

Identifying Devices can stop Mortgage Fraud

…;s essential that lenders stay apprised of the latest industry developments and regulations so they can develop customized strategies that benefit their clients and business.” A giant step in putting a plug in mortgage fraud is to identify the devices responsible for committing fraud. With a combination of advanced device identification, real-time risk evaluation and shared device reputation, iovation provides protection from fraud to…

Card Not Present Transaction Fraud can be stopped

…same effect for CNP fraud, adds Zoldi. There’s light at the end of this tunnel, however. Attempts at card fraud have risen, but the average loss per compromised account dropped by 10 percent. The ratio has been the same for fraud to non-fraud spending. The volume of card fraud that has increased correlates to the volume of increase in shopping with credit cards in the first place, writes Zoldi. How can you spot CNP fraud? Visa offers the…

100 Person Identity Theft Ring busted

…0 cash back from a $6,800 check she tried to deposit. At another bank, the imposter tried again with a fake driver’s license in the victim’s name that had a photo of the imposter. The imposter eventually confessed to cashing fraudulent checks and using fake checks and driver’s licenses with names of actual people. Her fraudulent purchases exceeded $154,500. Basic Methods Other participants purchased high-end products with fake checks printed…

Know the 10 Warning Signs of Identity Theft

…ther he or she is financially responsible. If the applicant’s identity has been stolen, assuming the thief hasn’t been surreptitiously paying the bills, the employer rejects the applicant based on a credit history tainted by fraud. You are denied admission to school. Schools may also deny admission after checking a prospective student’s credit history, or the student may be unable to secure a college loan because an identity thief has opened…

15 Tips to Prevent Identity Theft

…e sure they aren’t double-swiping your credit card and skimming your information off the magnetic strip. Beware of ATM skimmers. Poke around the card slot and make sure there isn’t an extra façade that can be pulled off. 10. Check fraud happens when criminals get hold of your check routing and account numbers at the bottom of the check. Again, watch your bank statements. 11. Put your mail in a blue post office-issued mailbox or at the post…

Cops Say: ‘Check Your Locks’

…closed and locked. Don’t allow daily deliveries of mail, newspapers or flyers to build up while you are away. Arrange with the post office to hold your mail, or arrange for a friend or neighbor to take it in regularly. Check your locks on doors and windows and replace them with secure devices as necessary. Push-button locks on doorknobs are easy for burglars to open. Install deadbolt locks on all your outside doors like the Schlage…

What is Mobile Banking? Is it Safe?

…ls and check account balances via your mobile device. MBanking also offers enhanced security with SMS transaction notifications and the ability to turn card accounts on or off; the development of new technologies like mobile check deposit (where you simply take a picture of the check using your smartphone’s built-in camera) is contributing to the increasing popularity of mobile banking. Eventually, mobile phones may even replace automated teller…

EMV Will Help Retailers Prevent Credit Card Fraud

…also said that it is preparing for a world where consumers will pay in stores, online, and via mobile devices. Another method of credit card fraud prevention is device reputation technology. It works to prevent all types of fraud and abuse on the Internet, including account takeovers, which occurs when your existing bank or credit card accounts are infiltrated and money is siphoned out. Iovation the leader in device reputation helps prevent new…

How to Use Foursquare to Get Free WiFi

…ersonalized. With every check-in, we get even better at recommending places for you to try.” Cool! But how does it work? Foursquare is a location-based social networking website for mobile devices such as smartphones. Users “check in” at venues using a mobile website, text messaging or a device-specific application by selecting from a list of venues the application locates nearby. Location is based on GPS hardware in the mobile device or network…

Florida Retirees Frequent Identity Theft Targets

…17;s latest figures. Georgia ranked second, with 194 reports per 100,000, and California ranked No. 3 at 123 per 100,000—a third the rate of victims in Florida.” Two types of identity theft often affect retirees: new account fraud and account takeover. New account fraud refers to financial identity theft in which the victim’s personal identifying information, often a Social Security number and good credit standing, is used to create new…

Like Mom Said, “Don’t Open the Door for Strangers”

…that according to BGE, “Impostors also might appear at a home or business wearing official-looking clothing and showing fake credentials. BGE workers usually only require entry into a home for a gas or electric emergency, to check equipment, read meters or start or stop service. All BGE employees and contractors carry company identification badges showing their name, photograph and identification number.” People can easily pose as city…

10 Tips to Secure Online Banking

…ware of SMiShing, which is like phishing but in the form of malicious text messages instead. Download your bank’s mobile application so you can be sure you are visiting the real bank every time and not a copycat site. Do not check the box offering to remember your login information. Check your online bank statements frequently. 10. Use strong passwords with numbers and uppercase/lowercase letters and characters. Robert Siciliano, is a personal…

Self-checking Your Online Identity

…by nature. However, egosurfing really should be called “reputation surfing” because it’s extremely important to check your online reputation for any errors, inaccuracies, slander or unwanted exposure. Think about background checks. Background checks are a necessary tool in today’s sometimes violent and certainly litigious society. It’s common sense to require employment background checks for school volunteers, coaches, teachers, janitorial…

Identity Theft on the Rise…Again

…and Research and another by the FTC, the incidence of identity fraud increased in 2012 for the second consecutive year, affecting 5.26 percent of U.S. adults. This increase was driven by dramatic jumps in the two most severe fraud types, new account fraud (NAF) and account takeover fraud (ATF). Key findings from the FTC’s report: Over one million complaints were fraud-related. Consumers reported paying over $1.4 billion in those fraud

Europol: Credit Card Fraud Spells Low Risk and High Profits

…ring real-time risk assessments. The technology exposes any history of fraud associated with a particular device or group of devices, and investigates relationships between devices and accounts that have been associated with fraud to expose fraudsters working in cahoots to steal from online businesses. Robert is a personal security and identity theft expert contributor to iovation. He is the author of 99 Things You Wish You Knew Before Your…

Avoid Unwanted Credit Card Charges

…es, and because 9 out of 10 people don’t even check their billing statements or only skim them lookingfor large purchases, those grey charges end up eclipsing fraud—as much as 95 percent grey charges to only 5 percent actual fraud! While fraud certainly is and will always be a hot-button topic that has consumers scrambling to protect their credit cards (which, in reality, can’t completely be protected; all you can do is pay attention to your…

Just One of Many Internet Scams

…rties to be moved alongside the item. Please do act accordingly as agreed after deducting your money for the item, make the rest fund available to the movers via money gram Money Transfer at any of their outlet around you or check on moneygram.com and check for their outlets around and get back to me with the transfer details below (as it appears on the receipt) so i can contact the movers for the pick-up at your location ….Deduct the money gram…

10,000+ Identity Theft Rings In The U.S.

…the Carolinas, Delaware, Georgia, Mississippi and Texas. The three-digit ZIP codes with the most fraud rings observed are areas around Washington DC; Tampa, Fla.; Greenville, Miss.; Macon, Ga.; Detroit; and Montgomery, Ala. Fraud in the Countryside—While many fraud rings occur in cities, a surprisingly high number were also found in rural areas of the country. Consumers’ best protection against identity theft begins with a credit freeze or…

Credit Card Fraud Really Isn’t Identity Theft

…curs when a thief gains access to your credit or debit card number through criminal hacking, dumpster diving, ATM skimming, or perhaps you simply hand it over when paying at a store or restaurant. Another form of credit card fraud is called new account fraud. This occurs when someone gains access to your name, address and, in the US, your Social Security number. With this data, a thief can open a new account and have the card sent to a different…

10 Tips to Safe Online Shopping

…y. This security seal indicates that the site will help protect you from identity theft, credit card fraud, spam, and other malicious threats.. Pay with a credit card—Credit cards on the whole offer better protection against fraud than debit cards. You won’t be liable for fraudulent purchases and the thieves won’t be able to drain your bank account if they get your account #. Most banks now offer virtual or one time use credit cards numbers. You…

1 in 4 Report Being a Victim of Card Fraud

…unning the risk of losing customers due to fraud, either directly, or through a decreased use of their cards. Consumers report they fear identity theft most and would like to be notified immediately by banks of any potential fraud. They would like to be kept informed of the progress of any fraud disputes. While fearing identity theft consumers are also demonstrating continued risky behaviors such as writing down personal identification numbers…

Internet Fraud: Online Dating Scams Cost Millions

…h is encouraging online dating websites to help protect users from these kinds of internet scams by warning them of the risks and verifying dating profiles. Meanwhile, Mashable reports a 150% increase in global online dating fraud in 2011 If you use an online dating service, be on guard for internet fraud and follow these internet safety tips: Stick to legitimate, well-known online dating sites, and get referrals from friends who have…

ID Thief Gets 5 Years for Stealing Identities of More Than 50 People

…telligence on the device being used to apply for online credit. This technology, called device reputation by iovation Inc., not only alerts businesses when velocity thresholds have been met, it also exposes whether financial fraud, identity theft and other frauds have attempted by the device or associated computers. Credit issuers can set up and customize their own unique business rules, and iovation analyze each application and then return a…

Dutch Hacker Extradited From Romania, Charged With Credit Card Fraud

…tutions, which lose $40 billion a year to credit card fraud, and from retailers. These business fraud targets must employ multiple layers of protection to thwart cybercriminals. One layer that businesses put upfront in their fraud detection process is based on device intelligence—what that device is doing right now on the site, and what fraud or abuse that device has caused with other businesses, even in other geographies. The leader in device…

European Cybercrime Not Slowing Down

…eal-time device reputation technology detects computers and other Internet-enabled devices that have been involved with financial fraud and other abuses and lets businesses know when those devices are interacting with their websites. iovation’s network of associations among 950 million devices provides businesses with the ability to know when devices are related to one another, so they can quickly and efficiently shut down sophisticated fraud

How to Handle a Credit Card Breach While Abroad

…fears of fraud no matter where in the world you travel. Under this policy, the cardholder may be responsible for up to $50 in charges, but most banks extend the coverage to include charges under $50. You can effectively stop fraud in its tracks by checking your statements online every day. If you only check every week or month, you will have to dispute that many more charges if and when your account is eventually compromised. If you fail to…

How to Spot a Mortgage Scam

…Crimes Enforcement Network’s March 2012 Mortgage Loan Fraud Update, found that depository institutions submitted 19,934 Suspicious Activity Reports in the third quarter of 2011 pertaining specifically to mortgage loan fraud, a 20 percent increase over the previous year. Law enforcement activities surrounding mortgage fraud across the U.S. have resulted in the arrest of thousands, according to reports. Some of the most devastating…

15 Screening Tips for Hiring Honest Employees

…ct employee theft unless prosecuted and convicted. Juvenile convictions do not show on a criminal records check. #10 Drug Testing: Drug and alcohol testing is an absolute must. #11 Reference checks: Follow up and extensively check. #12 Driving record checks: Look for red-flags, signs of recklessness, carelessness and aggressiveness. #13 Employee Credit Check: Bad credit means irresponsible. #14 Physical exams: Unhealthy body means unhealthy mind…

Hiring Employees: How to Perform a Criminal Background Check

…ve the fingerprint submission and relevant data, collect the associated fee(s), electronically forward the fingerprint submission with the necessary information to the FBI CJIS Division for a national criminal history record check, and receive the electronic record check result for dissemination to the individual. Contact each Channeler for processing times. Robert Siciliano personal and small business security specialist toADT Small Business…

Fraud Perpetrated on Cybercriminal’s Clock

…om 11:00 am—right before lunch—through dinner at 5:00 pm, and right before many of us head off to bed around 9:00 pm (at least if you’re like me, 43 years old with small kids). iovation is the company that released these top fraud times, using data gleaned from the billions of transactions protected by their online fraud prevention service, ReputationManager 360, in 2011. The complex device identification technology allows businesses to gain…

Mobile and Phishing – Why It’s More Dangerous

…review of a linked word or graphic. Another factor is the “always on” nature of mobile devices. Most mobile users are more likely to immediately read their email messages and forget to apply their security practices, such as checking to see if an email is from someone they know and if any included links appear real. Because messages are checked continuously, you are more likely to encounter phishing attacks within the first few hours of launch,…

Banking – How to Balance Security and Convenience With Online and Mobile Banking

…pay bills, and check balances online or over your mobile carriers network from anywhere. Enhanced security with SMS transaction notifications and the ability to turn card accounts on or off, and new technologies like mobile check deposit, in which you simply take a cell phone picture of the check, are contributing to the increasing popularity of mobile banking. Eventually, mobile phones may even replace ATMs and credit cards. As convenient as…

How safe is my identity? What are the latest threats? How do I protect myself?

The 2012 Identity Fraud Report: Social Media and Mobile Forming the New Fraud Frontier, released by Javelin Strategy & Research reports that in 2011 identity fraud increased by 13 percent. More than 11.6 million adults became a victim of identity fraud in the United States, while the dollar amount stolen held steady. Identity theft occurs when someone takes your personally identifiable information (PII), and misuses it, abuses it, and…

What Are the Latest Identity Theft Statistics?

…e United States, while the dollar amount stolen held steady. Approximately 1.4 million more adults were victimized by identity fraud in 2011, compared to 2010. Countering this rise is the successful effort to combat identity fraud coupled with greater consumer awareness of the issue. While the number of fraud incidents increased, the total amount lost remained steady. One of the key factors potentially contributing to the increase in incidents…

Shipping Scams Go After Small Business

…ed-up from you by my shipper once you receive and cash the check,i am willing to wait for your bank to verify and clear the check before the shipper pickup the item therefore I’ll need this detail below to mail out the check. * The Full name on check * Mailing address (Deliverable Address) * Phone Number Proceed to delete the advert of this item if my mode of payment is accepted and get back to me asap with your details to mail out the…

Another Way to Investigate Insurance Fraud

…s techniques to identify patterns and they are more aware of the possibilities of fraud and exposure they have in the fleet side of the business, but we can’t be complacent.” According to Damian Ward, head of the fraud team at law firm Halliwells, a more sophisticated variety of fraud involving criminal gangs has been a problem within the industry for quite a while. Ward says fraudsters take advantage of the ease with which motor…

Organized Crime Drives Increasing Auto Insurance Costs

…, retail, gaming, and even dating sites can weed out risky accounts based on devices’ reputations using iovation’s device identification service. When PCs, Macs, tablets, or smartphones collude, a pattern can be detected and fraud can be prevented. By utilizing iovation’s fraud detection service, insurance companies can not only recognize high-risk devices responsible for creating fraudulent online policies, but also avoid paying for frequent…

How Device Reputation Can Help Prevent Fraud in the Insurance Industry

…from the onset and deploy effective solutions to analyze information beyond that supplied by users. By initiating the application process with a device reputation check provided by iovation Inc., insurance companies can stop fraud before it happens and avoid further checks and fees when a device is known to be associated with identity theft and other frauds. The insurance industry has an opportunity to work in tandem with merchants, banks, and…

Firm Documents Increase In Holiday Cyber Fraud

…Black Friday and Cyber Monday. These statistics are compounded by the dramatic and impressive consumer spending numbers for these dates. Consumers must understand that their credit card numbers are fueling the rise in cyber fraud. Throughout the holiday season and beyond, it is imperative that cardholders check their statements carefully, matching them up against receipts to confirm that each charge was authorized. Robert Siciliano, personal…

4 Tips to Prevent Auction Holiday Fraud

…a seller has ten transactions but all those purchases are less than a dollar in value, that seller is still suspect. Online classified and auction websites can do more to protect legitimate buyers and sellers by identifying fraudsters faster with advanced device identification. iovation Inc.’s fraud prevention service is called ReputationManager 360 and incorporates device identification, device reputation analysis, and geolocation, velocity,…

6 More Holiday Shopping Tips

…he products they believe they’ve purchased. 6. Check credit card statements often. I still have to search the Internet for the names of unfamiliar retailers that appear on my credit card statements with unauthorized charges. Check your statements online weekly, and refute unauthorized charges within 60 days. Most major online retailers are already using multiple sophisticated fraud prevention procedures to protect you. Oregon-based iovation Inc….

Feds Catch Carder

…rules run and all checks in a fraction of a second. This device identification service can stop the transaction right then and there. Carders are just one piece of the cybercrime puzzle. Having a defense-in-depth approach to fraud prevention is essential. And sharing fraud intelligence with other businesses can only help you catch more fraud, and meanwhile, take more business with confidence. Robert Siciliano, personal security and identity…

Javelin Study Shows Increased Credit Card Fraud Risk

…an Oregon-based security firm, offers an advanced device identification service that incorporates real-time risk assessments, the history of fraud on linked devices (such as chargebacks, identity theft and credit application fraud) and exposes fraudsters working together to steal from online businesses. “Complex device identification” involves the creation of a digital fingerprint based on several characteristics of the device including hardware…

The Evolution Of Online Fraud Prevention

…e. iovation, the global leader in device reputation, flagged 35 million online transactions as high-risk in the last year for its clients and will flag 50 million or more by the end of 2011. Protect yourself from credit card fraud by checking your statements regularly. Set up your own email alerts so that at a minimum, you are notified of any transactions over your specified amount occur on your account. Businesses set up triggers and alerts to…

It Takes Sharing and Organization to Fight Organized Crime

…haring fraud information to help each other out. These fraud targets are finding strength in numbers. Oregon-based iovation Inc. has created an exclusive network of global brands across numerous industries, with thousands of fraud professionals reporting more than 10,000 fraud and abuse attempts each day. iovation’s shared database contains more than 700 million unique devices including PCs, laptops, iPhones, iPads, Android,…

Check Out These Hurricane Prep Apps

Hurricane Irene whacked the east coast over two weeks ago and people are still pumping out. Roads are still messed up and life has changed for many. My property was in the path, although she went a little west of me so I was spared any damage. But if she did head a little east I was prepared. What helped me prepare was technology. For almost a week I had sms text messages coming into my iPhone via iMapWeather Radio. iMapWeather Radio 9.99: only…

The FFIEC Wants You to Know…

…orate device reputation management. This proven strategy not only has advanced methods to identify devices connecting to your bank, but also incorporates geolocation, velocity, anomalies, proxy busting, webs of associations, fraud histories, commercially applied evidence of fraud or abuse, and much more to protect your financial institution against cyber fraud. Robert Siciliano, personal security and identity theft expert contributor to…

North Korea Hacks Online Games to Fund Terrorism?

…ities within gaming sites for gaming publishers to either reject as completely fraudulent, or to send for manual review as high-risk activity was detected in real time. This has saved gaming publishers millions of dollars in fraud losses by not only stopping a fraudulent activity (such as a cyber criminal setting up a new account in the game, or a purchase from the in-game store using stolen credentials), but it connects cyber criminals working…

Consumer Fraud No Longer Shocking

…when you’ve seen one, you’ve seen them all. But the bad guys continue to find new ways to skin a cat. The Better Business Bureau and the Consumer Sentinel Network received 725,000 consumer complaints of fraud in 2010. The defrauded consumers who reported fraud last year lost $1.7 billion. Beware of the following scams. Auction Scams: This ruse involves fake profiles advertising goods and accepting payments, with no intention of ever shipping…

Canadian Charged in Ticket Scams – Auction Sites Need to Step Up Fraud Prevention Techniques

…blic, and before tens to hundreds of visitors act on the ad by engaging in conversation with a cyber criminal who wants to steal their money. Imagine the scale of bad accounts that could be shut down instantly. Sophisticated fraud rings could be identified within the business’s network and thousands of fraudulent accounts shut down, making Craigslist and other auction sites a much safer place for the public to look for desired products and…

Clients Alert Banks to Fraud

…which means you, the customer, must pay close attention to your accounts. Check your online statements frequently. I no longer receive paper statements and I don’t wait for my monthly online statement, either. Once a week, I check each individual account online. Check your investment accounts, credit cards, checking and savings account, and any other account that holds your money or grants you credit. Create a bookmarks folder with links to all…

Auction Fraud is the Third Most Common Internet Complaint

The Internet Crime Complaint Center fielded 303,809 reports of cybercrime in 2010. Of those cybercrime reports, auction fraud was the third most common complaint. Auction fraud refers to fraudulent transactions on online auctions. Either a product advertised for sale is misrepresented, or purchases are never delivered at all. The IC3’s annual report explains, “Historically, auction fraud has been the leading complaint reported by victims, with…

Craigslist Scammers Ship Checks Via FedEx

…a, Argentina, the Philippines, and Malaysia spend their days targeting consumers in the developed world. But real-time device reputation checks, such as those offered by iovation, can detect computers that have been used for auction fraud and expose all of the accounts associated with the suspicious device or group of devices. This provides Craigslist and other websites with the opportunity to instantly shut down sophisticated fraud rings and…

What Identity Theft Protection Looks Like

…got this alert within a day of the credit check. When I logged into my McAfee account, I was able to see the actual credit check on McAfee’s dashboard. Had the alert been triggered by anything other than a legitimate credit check, I would have called McAfee’s fraud resolution agents, who would have immediately begun a process of alerting any creditors to possible fraud. That’s comforting. To ensure peace of mind, subscribe to an identity theft…

Mobile Banking Becoming an E-Commerce Staple

…o carry cell phones, are also heavy debit card users who require frequent balance checks. Enhanced security with SMS transaction notifications and the ability to turn card accounts on or off, and new technologies like mobile check deposit, in which you simply take a cell phone picture of the check, are contributing to the increasing popularity of mobile banking. Eventually, mobile phones may even replace ATMs and credit cards. About 10% of U.S….

Remote Control Home Alarm Provides Additional Security

…nded to me by referral. By all accounts, they were hard workers and reputable. Because of my normal home security obsessed nature, I’d generally do some type of background check on the owner and get something of a background check from him on his employees. However, because of the time crunch of the project, and the fact I was away while my interior was being painted, that wasn’t an option here. Fortunately, I have the ADT Pulse™ home automation…

3 Year Old’s Identity Stolen To Buy Porn

…ven bother to dispute the charges. This scam can often be fixed by paying attention to your statements and refuting charges within a specified time frame. You have up to 60 days, at most, depending on the nature of the card. Check with your bank. McAfee Identity Protection includes proactive identity surveillance to monitor subscribers’ credit and personal information and access to live fraud resolution agents who can help subscribers work…

Hackerville: The Epicenter of Romanian Hackers

…has been used to commit fraud, regardless of the country of origin. Their device reputation management is the only solution that leverages the shared experience of global brands across numerous industries, with thousands of fraud professionals from major online brands reporting and sharing fraud and abuse attempts each day. Robert Siciliano, personal security and identity theft expert contributor to iovation, discusses another databreach on…

23% of Online Fraud is “Friendly”

…as no way of proving the legitimacy of this card-not-present transaction, and is forced to refund the customer’s money. According to a new study released by LexisNexis Risk Solutions, retailers lost more than $139 billion to fraud last year, with friendly fraud accounting for one fifth of those losses. The problem for you, the consumer, is that banks and merchants tend not to believe identity theft victims, because friendly fraud complicates the…

Check Your Password Security

Passwords are the bane of the security community. We are forced to rely on them, while knowing they’re only as secure as our operating systems, which can be compromised by spyware and malware. There are a number of common techniques used to crack passwords. Dictionary attacks: These rely on software that automatically plugs common words into password fields. Password cracking becomes almost effortless with a tool like John the Ripper or similar…

 

Xtreme School

Featured in

Anderson Cooper John Stossel Robert Siciliano Featured in