Tag Archives: ID Theft

The Global Gangs that Can Break Banking Institutions

4 Crime Rings to Watch The Brothers’ Circle, a group based primarily in Russia with connections to the Middle East, Africa and Latin America that focuses on card fraud; The Camorra, based in Italy and focused on counterfeiting and narcotics … Continue reading

Posted in Business Identity Theft, Identity Theft Protection | Tagged , , , , , , , , , , , , , , | Leave a comment

FTC Releases Top Complaint Categories for 2011

Identity Theft Once Again Tops the List Statement Released by FTC 2/28/2012 The Federal Trade Commission today released its list of top consumer complaints received by the agency in 2011. For the 12th year in a row, identity theft complaints … Continue reading

Posted in Identity Theft Protection | Tagged , , , , , , , , , , , , , , , , , | Leave a comment

FTC Warns that Mobile Apps May Violate Fair Credit Reporting Act

Agency Sends Letter to Marketers of Six Apps for Background Screening The Federal Trade Commission warned marketers of six mobile applications that provide background screening apps that they may be violating the Fair Credit Reporting Act. The FTC warned the … Continue reading

Posted in Business Identity Theft, Business Law, Identity Theft Protection | Tagged , , , , , , , , , , , , , , , | 1 Comment

IRS: Dirty Dozen Tax Scams

The Internal Revenue Service has issued its annual “Dirty Dozen” tax scams list, reminding taxpayers to use caution during tax season to protect themselves against a wide range of schemes ranging from identity theft to return preparer fraud. The Dirty … Continue reading

Posted in Identity Theft Protection | Tagged , , , , , , , , , , , , , , , , | Leave a comment

Phishing Hooks those Too Quick to Click

The first time I took my grand-daughter fishing we did not catch any fish. We did not even get a nipple, but we did have fun. That night sitting watching the camp fire she asked, “Why didn’t we catch anything.” … Continue reading

Posted in Identity Theft Protection, Security Culture | Tagged , , , , , , , , , , , , , , , , , , , , | Leave a comment

Is Your Child a Victim of Identity Theft?

A SSN that has never been used is gold for thieves, since there is no connection between TransUnion, Experian, Equifax and Innovis to the Social Security Administration. The first time a SSN, Child’s name and birthday are connected together, at … Continue reading

Posted in Child Identity Theft, Identity Theft Protection | Tagged , , , , , , , , , , , , , , , , , , | 4 Comments

Are Your Employees on the Clock 24×7?

Employers have liability when employees commit crimes using company resources. The liability could also involve personal devices that are used for work. Does your employment policy cover employee owned devices? Employers need to be aware that misuse of company smartphones, … Continue reading

Posted in Business Identity Theft, Business Law, Identity Theft Protection | Tagged , , , , , , , , , , , , , , , , | 1 Comment

Do you use the same login & password for all accounts?

Ramnit Worm Threatens Online Accounts and Targets Facebook Seeking Log-in Credentials. “We suspect that the attackers behind Ramnit are using the stolen credentials to log in to victims’ Facebook accounts and to transmit malicious links to their friends, thereby magnifying … Continue reading

Posted in Business Identity Theft, Identity Theft Protection, Security Culture | Tagged , , , , , , , , , , , | Leave a comment

Military Members Need to use Active Duty Alert

Active Duty Alert FTC: “If you are a member of the military and away from your usual duty station, you may place an “active duty alert” on your credit report to help minimize the risk of identity theft while you … Continue reading

Posted in Identity Theft Protection, Military | Tagged , , , , , , , , , , , , , , , , | Leave a comment

3 Things an Identity Thief Needs to become You

To make you a victim of Identity Theft the thief only needs: Your Name Your Birthday Your Social Security Number Name Ok, it may be impossible to hide your name. It would be helpful if you only used a nick … Continue reading

Posted in Identity Theft Protection, Security Culture | Tagged , , , , , , , , , , , | 1 Comment