Sponsor Robert Siciliano as he runs the Boston Marathon for Miles for Miracles, Children's Hospital Boston
ROBERT SICILIANO is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds.

FREE EBOOK

Check here if you're human

Sponsors

Credit Card Security

The Switch to the Chip Card – One Year Later

…as a way to fight card fraud and to protect both consumers and merchants. Back in the day, we had one choice when we wanted to purchase something, and that was cold, hard cash. However, a few decades ago, people began using credit cards for everyday purchases instead of for only big ticket items, such as refrigerators. Though this was certainly convenient, it also opened the door for the bad guys to not only access your credit card information,…

Carders cashing out on Magstrip Cards

Two thousand credit card payment terminals stand to become infected with malware called Trinity point of sales. Ten million credit cards were stolen by hackers, called Fin6, who may end up scoring $400 million. The cards were stolen from retail and hospitality businesses. If each card sells for $21 on secret carder shops, you can see how the hackers will rake in hundreds of millions of dollars. As you may know, the U.S. is gradually switching…

Business Credit Scores 101

…redit (business loan or line of credit), says a report at NAV.com and from Gerri Detweiler’s new book, Finance Your Own Business. What determines credit score of a business? Size of business Payment history Outstanding debts Credit history length Credit utilization ratio Industry risk Public records (which the credit agencies are always inspecting) The credit score of your business may be different among the different credit reporting bureaus….

How to freeze your Child’s Credit

…usually very clean. This means fertile opportunities for new credit lines. Kids usually don’t check their credit reports and thus the fraud can go undetected for years. Parents should consider putting a freeze on their kids’ credit. Simply getting the credit monitored will not prevent thieves from opening accounts using the child’s SSN. A freeze does literally that: blocks a fraudster from doing anything. Experian Will not create a file for a…

How long does Information stay on Credit Reports?

…will remain on your credit report, it takes seven years from the Date of the Last Activity (DLA) before the item is deleted from your records (and seven to 10 years for bankruptcies). This is a very common question posed to credit reporting agencies. Credit reporting agencies get your information (bad or good) from lenders and collection agencies. The reporting agencies simply compile the information that comes to them. Consumer Statements The…

My EMV for a Week Challenge is DONE!

…etting coffee and shopping. Gemalto, one of the world’s leaders in digital security, wanted a real-world take on the EMV card experience, which includes the security benefits EMV cards presents. You know EMV; it’s the “chip” credit card that, by now, you should have. Here’s what I learned: A significant portion of the retailers I frequented didn’t have the chip terminals in place. The ones that did afforded more security and a seamless…

How to Remove Fraudulent Lines of Credit

…cause it can be viewed only once through the FTC’s system. Next, bring the ID affidavit form to the police, plus other documents relevant to your case, and file a report. Don’t assume your problem is too trivial. What if the credit card issuer is not helpful? Send a certified letter requesting they freeze or even close the account. Include with that letter a copy (not the originals) of the FTC affidavit and police report. The letter should…

Indiana Is a Big Target for Identity Theft

…using stolen information, such as a Social Security number, from accessing and racking up credit in your name. Once the freeze begins, you can lift it at any time, such as when you need a new loan or want to apply for a new credit card. Also, just because your credit report is frozen, it does not mean that you cannot use your present credit. Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft…

20 Security Tips For Overseas Travelers With Credit Cards

Thinking of bringing a credit card with you on your travels? You can end up in a jam: You just treated your extended family to fine dining in France. Time to pay; your credit card is declined. If you try to make a purchase overseas, your credit card company might think it’s fraudulent, since it would appear anomalous, relative to your usual, U.S. purchases. So before you leave for your trip: Back up credit card data. It’s always important…

Credit Card vs. Debit Card Fraud

One difference between a credit card and a debit card is that if there’s an unauthorized charge on your credit card, you just get a little sting. It’s a hassle to straighten out. But no money is taken from you. But if someone gets ahold of your debit card information, the second they use it, depending on the nature of the transaction, your bank account will be drained. And in some cases, you can kiss that money goodbye; you got scorched. More…

8 Tips to protect your Money – and your Identity – from Theft

…t them should any become stolen. There are three major credit report bureaus: TransUnion, Experian and Equifax. At least once a year review your credit reports with them, as they can reveal if, for instance, someone opened a credit card account in your name. If you ever lose your cell phone, anyone can obtain sensitive data you have stored in it—unless it’s password protected. And please, use a strong, long password, since the thief might be…

ATM Skimming rising, again

…ther non-ATM devices that scan your debit card. Look around for areas a camera might be hidden. Even if all seems clear, cover your hand when you enter the PIN. Try to get away from using a debit card at all. At least with a credit card, you can dispute fraudulent charges before you lose any money (up to 60 days), but with a credit card, you have only a few days to do this. Frequently check your bank and credit card statements. Robert Siciliano…

Frequently Asked Questions About Identity Theft

…ve security software like McAfee LiveSafe that protects all your PCs, Macs, tablets and smartphones. What are things I can do to protect my identity offline? Shred. Use a cross-cut shredding machine, or scissors to shred old credit card statements, offers, receipts, etc., to prevent dumpster divers from obtaining your information and creating accounts in your name. Have a locked mailbox. This will keep thieves from stealing your mail, especially…

Stolen Social Security number? Don’t Worry!

…ner in Mini Skirt.” When using various online accounts, see if they offer two-factor authentication; then use it. Use different passwords for all of your accounts, and make them long and unique, not “123Kitty.” Use antivirus and anti-malware and keep them updated; also use a firewall. Shred all personal documents before putting them in the rubbish. Never give out your SSN except for job applications, loan applications, credit card applications…

10 Skeevy Scams to watch

…f 2014 Caller ID spoofing. Has your phone ever rung and you saw your phone number and name in the caller ID screen? How can your own phone be calling you? It’s a scam. Ignore it. If you pick up you’ll hear an offer for lower credit card rates. You’ll be told to press 1 to opt out—but you should not even be on that long to hear this option; you should have hung up the second you heard the credit card offer. Anyways, pressing 1 indicates your…

How to build up or rebuild your Credit

…happens. No matter how responsible you are with your money, you won’t get a loan if there’s no evidence of this. The evidence comes from having credit. You need to show lenders you can be trusted. Every time you apply for a credit card, this puts a dent in your credit score. In other words, it can negatively affect your scores especially if there are lots of credit checks in a short period of time. So apply with a lot of discretion; do you…

Fixing a Credit Report after being hacked

…to a free credit report if you request it within 60 days of being notified. Experian, Equifax and TransUnion are required to provide you, free of charge, your credit report every year. It’s free to question anything on your credit report. Credit reporting agencies are required to investigate your disputes, if valid, within 30 days. Credit Reporting Agency Send the reporting company a document explaining your issues. Include copies of documents…

Data Breach Aftermath

…your identity is actually stolen, you may need documents to show creditors proof of your ID theft, you should file a report with the police and FTC. Keep vigilant documentation of all of your relevant correspondence. If your credit card was compromised, you also must contact every company or service that was on autopay with the old card. This includes quarterly autopays (e.g., pesticide company) and yearly autopays, like your website’s domain…

What is ATM Skimming?

…ras are usually concealed in the lighting fixture above the keypad, in a brochure near the machine, or attached directly to the ATM. To protect yourself from being skimmed, and generally staying safe when using your debit or credit cards, follow these tips: Scrutinize the ATM. This means every ATM, even ones from your bank. You also want to check any of the card sliders like ones at gas stations, etc, especially if you’re using your debit card….

Credit Card Fraud isn’t the same as Identity Theft

…etting the house back in order after the holiday activities, is that of scrutinizing your credit card statements. Why? To make sure that all the purchases on there were made by you and only you. The holiday season means more credit card use = more identity theft. In this case, it’s “account takeover.” The crook gets your credit (or debit) card information in one of several ways: digging through trash to get credit card information; tampering…

Fear of Fraud trumps Terrorism

Okay, what’s more likely? Getting bombed … or some punk racking up charges on your credit card? The yearly Crime Poll says that two-thirds of the respondents were edgy about data breaches involving their credit cards, as well as their computer and smartphones getting hacked—far more so than being robbed or taken hostage. It’s easier to thwart a mugger or burglar than it is to thwart cybercrime. Just because you never click links inside e-mail…

Card Company’s boosting Payment Security with Mobile

…nt scanning. Some smartphones already have this biometric feature. But what about credit cards and biometrics? Visa is currently experimenting with biometrics, but nothing yet has been deployed to the public. Nevertheless, a credit card company trying to develop something with biometrics will likely need to get involved in the smartphone arena. There will always be the consumers who want to stick to the old-fashioned method of using cash, just…

Chip and PIN, will It save Us?

Many Americans, says a recent survey by Gallup, worry about a data breach connected to the use of their credit cards. Interestingly, many people use a credit card for everything under the sun: even just a soda and bag of chips from the convenience mart. The more you use a credit card, the more likely it will be compromised by cyber thieves. The magnetic stripe technology for credit cards makes them so “hackable.” One way to help prevent credit

7 Things You Can Do To Protect Your Identity

…a chore. But it doesn’t have to be that way. Here are 7 “duh” steps you can take to protect your identity this holiday season and all year round. Inspect credit card statements. Make a habit of regularly looking through your credit card statements for strange looking activity. If you notice just one unauthorized charge, assume that someone out there will strike again, and again and again—unless you take immediate action and contact your credit

Chip and PIN vs. Chip and Signature Cards

…st reset the PIN at a branch. Just like a debit card. Easy. Makes it really difficult for criminals to use a person’s credit or debit card in a fraudulent way. A most obvious example is that if a thief steals or finds a lost credit card…and tries to make a purchase…he’ll come to a dead end when it’s time to enter the PIN. Drawbacks of Chip ‘n PIN Will cost an arm and a leg to implement on a universal scale, and unfortunately, funds are already…

The Credit Card Fraud Mob Boss

…from an ATM in 2003. A cop noticed the activity and didn’t quite buy the disguise. The police officer nabbed the thin, disheveled Gonzalez, and it turned out he possessed a computer at his New Jersey home loaded with stolen card data. He was also a moderator for Shadowcrew.com, a site for cybercriminals on how to hone their skills. Gonzalez wasn’t arrested, but instead, the 22-year-old, who was unfortunately a drug addict at the time, was so…

21 ways to Prepare your Credit Cards for Overseas Travel

…data plan. Make sure the company has a working cell phone number and e-mail address. Enable the feature, in your account settings, that yields an alert (e-mail or text) every time you pay with the card. Install your bank or credit card companies mobile app to alert you of any approval issues or potential fraud Don’t let a service person, like at a restaurant, leave your table with your card to swipe it. Go with them if needed. This may not…

8 Tips to Credit Card Security

…u can still take the reins and yield some protection for your credit cards. Make online payments with single-use or prepaid cards. What a great idea! If you have multiple recurring payments for ongoing services, use only one credit card for those. For shopping, use a one-time or prepaid card. Though the single-use credit card number is linked to your real card number, it will prevent the real number from becoming exposed should the site get…

Credit Card Fraud booming

…d is higher on everyone’s radar due to so many high profile hacks. In fact, the study indicates that spending on online fraud prevention has gone up by 50 percent. Though this is good news, it hardly crushes the reality that credit card fraud continues to demonize retailers, requiring detection, prevention and management. Protect your data: Maintaining updated operating systems, including critical security patches Installing and running…

Prepaid Cards risk of Fraud

…ing for your money). Of course you wouldn’t give it to him. But this is what people essentially do when wiring money or sending in the prepaid cards. Here’s how it works: The thief makes a request to load your cash onto your card (to pay for whatever), and then send over the card number and PIN. This way, the crook can put your money onto their own cards. They then can go to an ATM and take out cash or spend your money at a store. Meanwhile you…

Everything you need to know about a Credit Freeze

…me. It’s a false sense of security. Where to Freeze: Equifax https://www.freeze.equifax.com/Freeze/jsp/SFF_PersonalIDInfo.jsp Experian https://www.experian.com/freeze/center.html Transunion http://www.transunion.com/personal-credit/credit-disputes/credit-freezes.page Just do it. NOW. Robert Siciliano is an identity theft expert to BestIDTheftCompanys.com discussing identity theft prevention. For Roberts FREE ebook text- SECURE Your@emailaddress…

Graduates beware of Identity Theft

…ee of charge. Young adults should never have an “It can’t happen to ME” approach to one of life’s raw realities: the proliferation of identity theft. College students should always shred all of their bank related statements, credit card statements and all other documents that contain very personal information. College students should avoid posting their birthdates, phone numbers and addresses on social media. Additional Tips Ask your parents to…

Stolen Business Debit Cards at Greater Risk

…t that’s only after the business owner can prove theft. Banks are reluctant to believe businesses claiming victimship. A business may spend months, even years, using lawyers, trying to convince a bank of the crime. Tips from creditcardguide.com for preventing business debit card fraud and getting faster reimbursement: For purchases, use your business credit card. If theft occurs, the card company will immediately remove the fraudulent…

Protect your Cards from Multiple Kinds of Skimmers

…mer cards’ unencrypted information. Point of sale swapping. The skimming device is placed at the terminal where you make a purchase. Even busy places like McDonald’s have been targeted. These smart criminals can copy skimmed credit card data on gift cards, blank cards, hotel cardkeys or white cards, the latter being quite useful at self-checkouts. Protection comes in the form of: Anti-Skim Security built into the ATM from the factory or as an…

10 simple Ways Identity Thieves steal your Credit Card

There are 10 basic ways a crook can easily rob your identity by getting at your credit card or open a new credit card in your name, but there are also ways you can prevent this from occurring. Simple Thievery Leave a window open and a thief can slide through, then steal your stuff. He can even slide an arm through your car’s open window while you’re filling the tank at a gas station. To prevent this, keep house windows closed as much as…

13 ways Protect your Credit Cards from Fraud

Here are a number of ways you can protect your credit cards from fraud. 1. Keep a sharp eye on your credit card accounts. Read through the purchases for every monthly statement to see if any unfamiliar or odd items show up. Don’t just skip past small purchases; a charge for $9.95 could still be fraudulent. A crook knows you’re less likely to pay attention to small numbers. Consider checking your statements online weekly or even better, download…

Credit Card Fraud Security Bleak

The U.S. is no Superpower when it comes to card payments: the card hacking headquarters of the world. Don’t count on credit card fraud going away too soon. After all, Americans practically sleep, eat and breathe credit card use. And it’s those doggone magnetic strips on the cards that keep getting consumers, retailers, banks and the card companies in a fix. The strips make it so easy for hackers—and they know it. It’s high time that the U.S….

Data Breach Notification Bill goes to the House

…l. Enacting H.B. 224 would make New Mexico join 46 states who have data breach alert laws. Payment Card Breach Within two business days: Time allowed for card issuers facing a breach to notify all the merchants “to which the credit card number or debit card number was transmitted,” according to H.B. 224. H.B. 224 would also set a risk of harm threshold regarding when an alert is required for card breaches. If the magnetic strip data or other…

Credit Card Theft increasing for Banks and Retailers

2013 was the year of 740 million records involving data breaches. And that number may be erring quite on the conservative side, according to the Online Trust Alliance. The records come from a list on the Privacy Rights Clearinghouse Chronology Data Base. The list is that of publically disclosed breaches, including the alleged 110 million that struck the big retailer December 13. Many of the listed breaches are of a non-descript number. The more…

ID Theft, Medicare Fraud Prevention in People Over 45

…ata and documents should be locked up in a safe. Get a PO box for your mail—to receive and to take outgoing to. Shred personal documents you no longer need. Thieves like to rummage through trash for discarded direct mail and credit card offers. Call the FTC OPTOUT at 1-888-567-8688 to stop these offerings. Memorize your SSN so you don’t have to bring it in public. Thin out your wallet. Cancel unused cards. Never have any personal information…

Skimming Big Business targeting Big Business

…our card after giving it to an employee, though this isn’t always possible when the employee disappears into an employee-only area. Cover the PIN pad with your other hand when entering your PIN. Finally, routinely check your credit card and bank statements for any unauthorized charges. Robert Siciliano is an Identity Theft Expert to AllClearID. He is the author of 99 Things You Wish You Knew Before Your Identity Was Stolen See him knock’em dead…

10 Credit Score Truths and Myths

…and other smears remain for up to seven years following the first “infraction” date. 6. Cash-only payments will improve credit score. You can’t build good credit unless you use credit—and wisely. Get a couple small loans or credit cards and pay them off as you use them. 7. Improve your credit score by closing your credit card accounts. Closing a card lowers your amount of disposable income: the ability to pay off other debt. You don’t want to…

Older Technologies Facilitate Credit Card Fraud

…ves. That ancient technology of the magnetic strip on the back of credit and debit cards is a godsend to criminals. The easy-to-copy band stores account information using a technology the same as that of cassette tapes. U.S. credit card technology has not kept up with fraudsters. One challenge facing the industry is that it is very expensive for companies to upgrade their credit card security. When a card is swiped, the strip allows…

Protecting Yourself from Debit Card Fraud

…nd includes a link where to do this. These scam e-mails make gullible people think they’re from banks, retailers, even what seems like the IRS. The link to a phony website entices victims into typing in their bank account or credit card numbers: a done deal for the thieves. Review bank and credit card statements promptly. Reporting something suspicious within two days means minimal liability with bank accounts. Wait too long and you may never…

Debit Cards: Signature or PIN, what’s What?

…asons, direct debit cards are safer for online use than are deferred debit cards. Cannot be overdrafted unless you opt into overdrafting at the time of account creation. Deferred debit Think of a fusion between a traditional credit card and a direct debit card. Rather than on the spot of a purchase, money is withdrawn from your checking account within two or three days of the purchase. No PIN required; only the signature of the cardholder. Has…

Merchants: Do you know where you Card Data is?

…protocols of foreign entities. Data must be “overlaid with a diagram of servers on- and off-premise, and all mobile devices, including those owned by employees,” reports PaymentsSource. Merchants should know where all their cardholder data is; how their organization operates; and “how their customer’s cardholder data moves throughout their environment,” says Leach, so they can formulate decisions that will minimize risks and costs….

8 Tips to prevent post Holiday Credit Card Fraud

…erson it’s easy to lose track of purchases. The key is keep good records and be diligent about your security. Here are eight great tips that will go a super long way in preventing post holiday account takeover in the form of credit card fraud. #1. To ensure your best chances of escaping fraudulent activity involving your credit card (which can occur even if the card isn’t stolen), follow these tips: Go over every transaction online and account…

Card Not Present Transaction Fraud can be stopped

Credit card fraud, despite measures to stomp it out, still runs rampant in America. Forty-seven percent of credit card fraud consists of card-not-present (CNP) fraud. This includes payments via snail mail, phone and Internet. The U.S. is headed towards EMV (chip) card technology, notes Scott Zoldi in FICO’s Banking Analytics Blog. Though chip-based authentication technology may cause non-CNP fraud to decline, don’t count on this same effect for…

Know the 10 Warning Signs of Identity Theft

…eive bills from companies you’ve never done business with. When an identity thief poses as you, he may buy products that are invoiced—and you receive the bill. In other situations, the thief might bounce a check or max out a credit card that was opened in your name. You are denied a tax refund. When an identity thief files taxes under your name before you do, he or she gets your refund. File early and protect your data year ‘round. 10….

Credit Card Number $3.00 Each

WE DO NOT SELL DUMPS. DO NOT EMAIL OR CALL WE DO NOT SELL DUMPS Buying credit card numbers with high credit limits must be so much easier than going through the hassle of having good credit, applying for credit cards, getting approved, buying stuff, going to work all day/week/month/year/lifetime and making the money necessary to pay the bills. I would think that kind of lifestyle would allow someone to travel the world, eat great food, buy lots…

EMV Will Help Retailers Prevent Credit Card Fraud

EMV, which stands for Europay, MasterCard, and Visa, refers to the chip and PIN credit card technology commonly used in Europe and elsewhere around the world. Credit cards that incorporate an embedded microprocessor chip are far more secure than any other form of credit card currently available, including the standard magnetic striped cards that are all too easy to skim at ATMs and point of sale terminals. Major banks and retailers are now…

5 Ways to Protect Your Credit Card

Credit card fraud happens in a number of ways. Sometimes your bank or credit card company will notify you of fraud and other times they won’t. So it’s up to you protect yourself. Smart retailers on the other hand are already protecting consumers behind the scenes by implementing multiple layers of fraud protection. 1. Whenever you hand over your credit card to anyone — a waiter, gas station attendant, store clerk, etc. — keep a close eye on…

Secure Your Identity When Traveling

…en they’re preparing for, or going on, summer vacations. Stealing your mail. While you’re on vacation, your mailbox fills up with credit card offers and bank statements. The bad guy can steal this mail and use it to open new credit cards in your name, or to take over existing accounts. Get a mailbox that locks to prevent thieves from stealing your mail. Have a trusted friend retrieve your mail while you’re away. Opt out of prescreened credit

Who the Heck is This Credit Card Charge From?

If you travel as much as I do and use your credit card for every purchase from apples to zebras, you know it’s rare to recognize the name of a merchant listed on your credit card statement. For example, you may go to a restaurant by the name of Dave’s Bar and Grill and get a charge on your card a day later from Smith Enterprises—and you know you didn’t buy anything from a Mr. Smith. So the way this works is, the bar was set up by Dave Smith’s…

Identity Theft Rings Focus On Loans and Credit Cards

…tely 10 million people a year. In Wycoff NJ, 11 men and women were arrested on charges of stealing identities to open credit cards in an alleged scheme that is believed to have defrauded more than 70 victims. Patch reports: “Credit cards were opened in the victims’ names, and charges were made on their behalf by “authorized buyers.” The task force investigation found that most of the victims had recently refinanced or applied…

Resolve to Dissolve Credit Card Billing Errors

Like death and taxes, credit card disputes are inevitable. The good news is, whenever there is a credit card dispute that results from a billing error, the credit card company often takes the side of the cardholder until getting a counter argument from the merchant. The better news is that all this is laid out in the Fair Credit Billing Act that went into effect in 1975. The law applies to “open end” credit accounts, like credit cards, and…

The 4 Types of Credit Card Disputes

Love’m my credit cards. I get points, mileage and one place to view all my spending. Who doesn’t love that! But I hate having to go through the misery of disputing charges. In my own research, I’ve determined four types of credit card disputes to look out for. Unauthorized use: Basically, this is fraud—unauthorized use of your card when someone steals the card, skims the card, copies the number, hacks the number or double charges on purpose….

Europol: Credit Card Fraud Spells Low Risk and High Profits

…Europol, in its report on Internet-facilitated organized crime (iOCTA), concluded that organized crime groups (OCGs) clearly benefit from globalization, using foreign payment card data to purchase goods and services online. Credit card information and bank account credentials are the most advertised goods on the underground economy’s servers; according to Europol’s intelligence, around 60 percent of payment card fraud losses, totaling 900…

Avoid Unwanted Credit Card Charges

I think it’s safe to say that all credit card charges are unwanted, but today I’m talking about so-called “grey charges”—those out-of-the-blue credit card charges that sneak up on us and require our time, attention, persistence and aggravation to get rid of. A study by BillGuard shows the average dollar amount lost by grey charges is around $356.00per consumer annually. Studies show 1 in 4 people to be victims of grey charges, and because 9 out…

Credit Card Fraud Really Isn’t Identity Theft

…purchased. With most of us using our card a lot more during this time, there’s more chance of fraud or identity theft. When most of us think of identity theft and being a victim of identity theft, we are really referring to credit card fraud. This form of credit card fraud is called account takeover and it occurs when a thief gains access to your credit or debit card number through criminal hacking, dumpster diving, ATM skimming, or perhaps you…

Enacted Maryland Child Identity Lock Bill, is Useless

…exactly where we are today. Not much has changed. Unless all 3 bureaus offer a proactive credit freeze then the bill fails, and it fails further if ALL children can’t get one, not just Maryland kids. I contacted all 3 credit bureaus and only Experian offers a credit freeze for children and only if your child is a victim, no matter what state you live in. First go to Experians Credit Freeze Center then click “Add A Security…

1 in 4 Report Being a Victim of Card Fraud

…ess of any fraud disputes. While fearing identity theft consumers are also demonstrating continued risky behaviors such as writing down personal identification numbers (PIN), failing to destroy personal documents and sharing credit card data on electronic devices lacking security software. Consumers also shared their thoughts regarding what types of transactions they trust most and who they most trust in the event of fraud happening. Financial…

Breach Means More Retailer Card Fraud

…al investigation that involved the inspection and validation of every PIN pad in every store. The tampering, which affected fewer than 1% of PIN pads in Barnes & Noble stores, was a sophisticated criminal effort to steal credit card information, debit card information, and debit card PIN numbers from customers who swiped their cards through PIN pads when they made purchases. This situation involved only purchases in which a customer swiped a…

Identity Theft Crime Ring Leader Gets 25 Years

…s a prolific identity thief. Between March 29, 2004, and April 15, 2007, Christopher Aragon led a crime ring which included his wife Clara Aragon and six co-defendants. Co-defendant Shitrit was a hacker who obtained victims’ credit card numbers used to encode forged credit cards. Christopher Aragon and his co-defendants used credit profiles and personal identifying information of victims to make fraudulent California driver’s licenses, credit

Credit Card Processors Targeted In Hacker Attacks

…WE DO NOT SELL DUMPS A European hacker broke into a U.S. company’s computer network and stole 1,400 credit card numbers, account holders’ names and addresses, and security codes. The hacker, nicknamed Poxxie, sold the stolen credit card data to other cyber criminals through his own website, CVV2s.in, for $3.50 per credit card. The malicious software or virus cyber criminals used in these hacker attacks are often known as “sniffer” software used…

What Security Benefits Does Contactless Technology Offer?

…illions of dollars as a result of these breaches. Contactless payment methods incorporating chip and PIN technology encrypt data to prevent it from being read in plain text. Lost cards: If your wallet is stolen or you lose a credit card, it is highly probable that a thief will take advantage of the opportunity to rack up charges on your magnetic stripe credit card. A contactless chip and PIN card, on the other hand, can’t be used by just anyone,…

What Differentiates EMV Cards?

…en you swipe your card through a card reader, the device accesses the data stored on the magnetic stripe. A quick YouTube search yields numerous vendors offering to sell skimming devices, which can be used to steal data from credit cards as they are swiped in an ATM. EMV, or chip and PIN cards, on the other hand, are far more secure. These so-called “smart cards” contain embedded microchips and are authenticated using personal identification…

How to Handle a Credit Card Breach While Abroad

…topped, so we said “Grazie!” and kept moving. Now imagine if you had to deal with credit card fraud in a foreign country, and couldn’t find any English-speakers to assist you. Fortunately, you only have to deal with your own credit card company, rather than any overseas officials. Victims of fraudulent credit card charges only wind up paying the unauthorized charges if they fail to detect and report the credit card fraud within 60 days. A 60-day…

How EMV Impacts International Travel

…he card is swiped through a “reader,” the data stored on the magnetic stripe is accessed. Card readers and magnetic stripe technology are inexpensive, readily available and vulnerable to fraud. The other, more secure type of credit card is called “EMV,” which stands for Europay, MasterCard, and Visa. According to the Smartcard Alliance, “EMV is an open-standard set of specifications for smart card payments and acceptance devices. EMV chip cards…

Watch Those Corporate Card Statements to Prevent Credit Card Scams

…. Especially if the charges are small. The Federal Trade Commission filed a lawsuit describing a criminal enterprise responsible for “micro charges,” fraudulent charges ranging from 20 cents to $10, to as many as one million credit cards since approximately 2006. Because the amounts were low, most of the fraud went unnoticed by cardholders. Money mules were used to divert the funds to Eastern European countries. (“Money mules” are typically…

Big Time Black Market For Your Credit Cards

…arket out there hacking, buying and selling your information to steal your identity. The most sought after data is your credit card numbers. “Carders” are the criminals who buy and sell “dumps,” which are large quantities of credit card and bank account details. Carders and other criminal hackers are also interested in so-called “fullz,” which include first and last names, email addresses and passwords, billing addresses, phone numbers, dates of…

Credit Card Skimmer Use Portable Point of Sales

…ng the necessary technologies and components to create a card skimming device designed to replace the real point of sale devices at restaurants or other retail establishments. In the United States, consumers often hand their credit cards over to waiters or waitresses, for example. A waiter disappears and comes back moments later with a receipt to be signed. Overseas, in Europe and other countries, portable point of sale (POS) devices allow the…

Underground Forums Selling Stolen Credit Cards

WE DO NOT SELL DUMPS. DO NOT EMAIL OR CALL WE DO NOT SELL DUMPS “Carders” are the people who buy, sell, and trade stolen credit card data online. This carding forum video provides an example of an online forum where stolen credit cards are bought and sold. Hackers rely on a variety of techniques to obtain credit card data. One such data theft technique is wardriving, in which criminals hack into wireless networks and install spyware. Another is…

Ghosting Identity Theft Scams

…Our system of credit requires a Social Security number as the first and foremost identifier. Lenders issue credit based entirely or almost entirely on the history associated with an applicant’s Social Security number. When a creditor issues credit based on these invented numbers and reports that information to the credit bureaus, the Social Security numbers become active identifiers that other creditors will recognize in the future. The thieves,…

Boosting Healthcare Security with Smart Cards

The Smart Card Alliance has put together a list of frequently asked questions about how smart cards work in a healthcare environment, and provided excellent answers. A smart card resembles a typical credit card, but is embedded with a small microprocessor chip, which makes it “smart.” That chip is a powerful minicomputer that can be programmed in different ways to boost security. Data and applications can be securely stored and accessed on the…

How to Prevent Gift Card Scams

…at almost 2/3rds of consumers prefer to receive gift cards. The math of all this equals opportunity for criminals. Scamming gift cards is surprisingly easy. It works like this: gift cards have identifying numbers just like a credit card those numbers may be displayed on the card or embedded in the magnetic strip. Thieves will go into a retailer that has gift card displays and take a picture of the card itself or skim the card to get the data off…

Holiday Headaches Coming for Consumers

Gearing up for the holidays, consumers are getting ready to pull a Wilma Flintstone and, “Charge it!” Many don’t realize that you cannot protect your credit card number. Every time you use a credit card, you increase the chances of that card number being used fraudulently. When handing your card to a clerk or cashier, pay close attention. The card should be swiped through a point of sale terminal or keyboard card reader once, maybe twice. If…

Feds Catch Carder

WE DO NOT SELL DUMPS. DO NOT EMAIL OR CALL US. WE DO NOT SELL DUMPS “Carders” are the people who test and sell credit card details (most likely phished) to other individuals who carry out the actual credit card fraud. Carders are the most visible of criminals who distribute and sell stolen data to whoever is willing to take it and burn it onto a white card or make purchases over the internet. “Dumps” is a term for the batches stolen credit

Bought a Car Recently? Watch Your Identity Information

…bs has pointed out on his blog, Krebs On Security, they are targeting auto dealerships in a big way. Why? Because auto dealerships’ records include lots of Social Security numbers, which identity thieves can use to apply for credit cards in their victims’ names. Krebs states, “Recent hacker break-ins at a half-dozen car dealerships nationwide are a reminder of just how easily one’s personal and financial information can be jeopardized by poor…

Javelin Study Shows Increased Credit Card Fraud Risk

…to do. Prevention is the hardest to do but it’s got the biggest payback.” The report also found that for a full year after your bank account information has been hacked, there is a strong chance that you will be a victim of credit card fraud. So even though you may be getting a little hardened to data breach warnings, you still need to watch your credit card statements closely. As long as you dispute unauthorized credit card charges within 60…

Online Gamers Risk Credit Card Fraud

…that look like they are coming from the company that has been breached. Never click on links within an email. Instead, go to your favorites menu or manually type the correct address in the address bar. Pay close attention to credit card accounts. I monitor my accounts weekly for all activity. Simply log in, look at each charge, and refute unauthorized charges immediately. A new free service called BillGuard scans your credit cards daily and…

Medical Temp Arrested For Identity Theft

…oo easy not to. In a doctor’s office in Stamford, Connecticut, police arrested a 42-year-old New York woman for using patients’ credit card numbers, which she accessed while working as a temporary hire. When patients paid by credit card, the temp would copy down the numbers and later make fraudulent charges. An identity thief begins by acquiring a target’s personal identifying information, such as name, credit card number, Social Security…

67% of Companies Fail Credit Card Security Compliance

…ants who accept credit cards are now subject to strict Payment Card Industry standards, rules, and regulations, which require a level of security that took about five years to finally implement.   PCI exists to increase credit card security and, among other goals, to stave off government intervention. While significant effort has been made to improve the security of credit card data processing, adequate attention has yet to be given to the…

Security Expert’s Credit Card Hacked

…obert X. Cringley, one of my favorite technology know-it-alls. Anyway, Cringley’s credit card was recently hacked. And if his card can be hacked, anyone’s can. Like many cardholders, Cringley received a notification from his credit card company’s fraud department, informing him that his card data was being used overseas, on an online dating website. A scammer used Cringley’s credit card number to create a fake profile, posing as a woman named…

Card Not Present Fraud Burdens eTailers

…a higher degree of risk than when a card is physically present at the point of sale. As a result, merchants pay higher fees for CNP transactions, and they pass those costs on to the customer. Identity thieves can use stolen credit card data to make CNP purchases, or they can copy the data to blank cards, which they can use at self-checkouts or when the thief knows the salesperson, who can “sweetheart” the transaction. Blank cards can also be…

The Ever Present Credit Card Scam

The Ever Present Credit Card Scam When people ask me, “How do I protect myself from credit card fraud?” I tell them, “Cancel the card, or never use it.” Because that’s the only way. Otherwise, all you can do is hope the merchant has a sophisticated system in place to mitigate the fraud. The FBI’s Internet Crime Complaint Center’s Annual Report determined that the total dollar loss from all cases of fraud in 2009 that were referred to law…

Online Credit Applications Ripe For Fraud

We currently rely on easily counterfeited identification, and we transmit credit card applications using the phone, fax, Internet, or snail mail, all of which are relatively anonymous methods. Fraudulent credit card applications are the most lucrative form of credit card fraud. Identity thieves love credit cards because they are the easiest accounts to open, and they allow thieves to quickly turn data into cash. Meanwhile, consumers don’t find…

Check Your Credit/Debit Card Statements NOW!

…ays are over. Your used your credit card in so many places you forget where. Now is when the bad guy may pull up that “skimmed” card number they got from you when they were working as a temp at the mall. Every time you use a credit card, you increase the chances of that card number being used fraudulently. #1 Watch your card. Whenever you hand your credit or debit card to a salesperson or waiter, watch to see where your card is taken and what is…

Britain Scrapping National Identification Card

…ahrain, Belgium, Finland, Italy, the Netherlands, Germany, Oman, Portugal, Qatar, Saudi Arabia, Spain, Sweden and the UAE are some of the countries that have planned or already started to deploy electronic national ID (e-ID) cards. These cards are more secure because they can contain smart card chips. Some countries are implementing e-IDs that also include biometrics, and the ability to digitally sign documents. Citizens can use their e-IDs for…

Lost and Stolen Wallets Lead To Identity Theft

…do now, before your wallet is lost or stolen, to mitigate future damage, and other things that should be done once a wallet is missing. While you still have your wallet, thin it out as much as possible. If you have multiple credit cards, store cards, Social Security cards, insurance cards, and more, then, “Houston, we have a problem.” All these ancillary cards serve no purpose other than putting you at risk for new account fraud or account…

Black Friday Launches Holiday Fraud Horrors

…It has been said that only 10% of employees are honest, 10% of employees will always steal and 80% will steal based on circumstances. So always count your change. Credit Card Skimming: When a salesperson or waiter takes your credit card, they can run it through a card reader device that will copy the information stored on the magnetic strip. So when you hand over your card, watch closely to see where it is taken and what is done with it. It’s…

“Flash Attacks” Make Big Money for Debit and Credit Card Scammers

…ich might be powered by car batteries or plugged into the nearest outlet, is programmed to read and record card data. I found one advertised on Craigslist and picked it up at a nearby bar, for $750 from a guy named Bob. Once credit card numbers have been skimmed, hackers can copy the data on to blank cards, hotel keys, or “white cards,” which are effective at self-checkouts, or in situations where the thief knows the salesperson and is able to…

7 Tips To Better Credit Card Security

…ablished e-retailers are your safest bet. #5 Beware of phishing. Never purchase products or services by responding to an email. This generally results in your card number being phished. #6 Use secure sites. Before entering a credit card number, always look for “https” in the address bar. The “s” in “https” means the site has an additional layer of protection that encrypts the card number. #7 The most important tip of all is to watch your…

McAfee Reveals the Top Ten Most Dangerous Places to Leave Your Social Security Number

…Any organization that extends any form of credit is going to need your name, address, date of birth, and Social Security number in order to verify your identity and run a credit check. This means hospitals, insurers, banks, credit card companies, car dealerships and other retailers, and even video rental stores. Now more than ever, criminal hackers are hacking into databases that contain Social Security numbers and using the numbers to open new…

5 Sneaky Credit Card Scams

…an ATM that isn’t cooperating. Some nice guy injects himself into the scene to help you. During the process he watches you enter your pin. After another attempt the ATM eats your card. After you leave all upset, he pulls the card from the ATMs card slot using a loop of VHS tape he jammed inside the machine. #4 Risky Retailer. When searching for something on the web you come across a website with a great deal. In the process of ordering they…

Top 5 Credit/Debit Card Skimming Attacks

…ne is set up for one purpose; read/copy data. The machine might be powered by car batteries or plugged in the nearest outlet. I bought one off Craigslist for $750 from a guy named Bob at a bar. How you like them apples. When credit card information is skimmed, hackers can copy the data on blank cards, gift cards, hotel keys, or “white” cards. White cards are effective at self checkouts, or when the thief knows the clerk and is able to…

Debit Cards Fraud Means Difficult Recovery

There are 437,000,000 debit cards in circulation, and their use is on the rise. Criminal hackers are paying attention. Credit cards offer some measure of protection when it comes to “zero liability policies,” as long as the cardholder refutes the charges within 60 days. But when a debit card is compromised, the stolen money is can be hard to get back. I get unfortunate emails like this all the time: “I was a victim of debit card fraud. I live…

Child Identity Theft

…d a mortgage because of bad credit. He had no idea that his credit scores were low, so he pulled his credit reports. He discovered a tremendous amount of debt, and accounts he had never opened. One such account showed that a credit card had been opened in his name when he was 13 years old. Jason found out the hard way that he was a victim of child identity theft. When Jason was a child, his father was convicted of credit card fraud. You may be…

Do You Really Need Identity Theft Protection?

…ould be heeded, it’s not going to protect you when your bank or mortgage company or utility provider tosses your information in a dumpster that is subsequently raided by identity thieves. Opt out of junk mail and preapproved credit card offers. This is good advice and can be done at OptOutPrescreen.com. However, even if you opt out of new offers, others will still arrive. It’s inevitable. You also need to get a locking mailbox, but that still…

ATM Security Threats Increase

…NI (Automatic Number Identification) is a system utilized by telephone companies to identify the DN (Directory Number) of a caller. This might be accomplished via “Caller ID Spoofing”. They use publicly available data on the card holder such as name, card account number and last four digits of the social security number to “verify” them as the banks customer. #7 SMS Attacks; AKA Smishing or Phexting – phish texting. Customers receive a text from…

 

Xtreme School

Featured in

Anderson Cooper John Stossel Robert Siciliano Featured in