We are currently looking for an Official SelfGrowth.com Guide to "Identity Theft". If you have expertise in Identity Theft and your own website and/or product for this topic, please review this form for complete details. The Official Guide Position is part of our Premium Placement Package
It’s called Chameleon—a computer virus—but maybe it should be called FrankenVirus. You wouldn’t believe what it can do: literally move through the air, as in airborne—like a biological pathogen.
And like some Franken-creation, it came from a laboratory, ... Views: 1008
Beware of the B.E.C. scam, says a report at fbi.gov. The hackers target businesses and are good at getting what they want.
The hackers first learn the name of a company’s CEO or other key figure such as the company’s lawyer or a vendor. They then figure out a way to make an ... Views: 851
Imagine getting a call from someone identifying themselves as a federal court official or U.S. Marshal, informing you that your arrest is imminent unless you pay a cost—all because you failed to respond to a jury summons (which you don’t remember getting). I’d like to think ... Views: 828
There is a new Social Security scam in the news, and you should definitely know about it. The Acting Inspector General of Social Security, released a statement that warns people of this new scheme. Basically, scammers are impersonating Social Security Administration employees.
The scam ... Views: 694
Just because a job recruiter says he’s from (fill in blank—any huge corporation) doesn’t mean the job can’t be a scam. Anyone could say they’re from Microsoft or Google. Impersonating a representative from a big-name company is one way to fool gullible job ... Views: 1290
Let’s look at the top 10 scams (random order).
Charity
A fraudster claims to represent a charitable organization.
Such scams can operate ring-style, such as one out in Colorado some years ago in which women wearing crisp white dresses that resembled the dresses nurses used to wear, ... Views: 1127
IRS
The e-mail (or phone call) says you owe money; if you don’t pay it immediately, you’ll be put in jail or fined.The scammer may know the last four digits of the victim’s Social Security number.
Caller ID will be spoofed to look like the call is from the IRS.
The ... Views: 858
If you’re going to drone on and on about how you got hacked by a cyber thief, maybe it’s because you played with your new drone—you know, those rad little flying devices that hover via remote control over your street? Yes, they are hackable.
If you don’t have a drone, ... Views: 918
Talk about getting taken to the cleaners: Imagine you spot a great summer rental property advertised online. Looks wonderful. The deal sounds too good to be true, but the owner tells you (via e-mail or even phone) that the fee is correct. You apply for the rent and send in the required upfront ... Views: 892
Darkode anyone? Not anymore. This underground bad hackers’ forum was recently demolished by the FBI, says a report on www.justice.gov. The dozen hackers associated with Darkode are facing criminal charges.
Though there are about 800 of such forums, Darkode was among the worst (or shall ... Views: 954
If you are thinking of jumping onto the Bitcoin bandwagon, or any type of cryptocurrency, you have to make sure that you are watching out for scams. There are a ton of them out there, including the following:
Fake Bitcoin Exchanges
You have to use a Bitcoin exchange if you want to buy or ... Views: 791
Gee, if your home is connected to lots of different devices, doesn’t it make sense that your cybersecurity integrates all your connected devices? Meet the Bitdefender BOX, a network bulletproofing hardware cybersecurity tool for the home that embraces smart home protection focusing on the ... Views: 1080
In July, more than 15,000 security pros, hackers, hobbyists, and researchers met in Las Vegas for the Black Hat Conference 2017 at Mandalay Bay in Las Vegas. This was the 20th year that the security conference was held, and both black and white hat hackers joined together to discuss ... Views: 945
The term, or in this case the word “blackhat” in tech generally refers to a criminal hacker. The opposite of black is white and a “whitehat” is a security professional. These terms originate from the “spaghetti western” movies when the bad guy cowboy wore a ... Views: 855
The Boy Scouts of American is no stranger to controversy, and now new information is shedding light on how many leaders were actually involved in a sex abuse scandal.
According to official records of the Boy Scouts, more than 12,000 children were sexually assaulted while in the scout program. ... Views: 659
So you think it’s really a far-out left-field idea: a burglar studying Facebook and other social media to select homes to rob. Well think again.
A survey, conducted by home security expert Friedland, found:
78 percent of burglars use social media to select targets.
74 percent touted ... Views: 960
Are you a small business? Do you know your business’s credit score? The range is zero to 100 for most credit reporting agencies, with at least 75 being desirable if you want to be approved for financing and trade credit (business loan or line of credit), says a report at nav.com and from ... Views: 841
Global losses from business email compromise scams, a highly sophisticated form of phishing, grew by 136% between December 2016 and May 2018 and now exceed $12 billion, according to a public service announcement released by the FBI.
What Is a Business Email Compromise Scam?
A business ... Views: 955
Wow, a lawyer in Memphis got scammed by his secretary—she embezzled over $362,000 from him, says an article on wreg.com. Attorney Jerry Schatz hired Teresa Sumpter, 48, in July of 2013.
Little did he know that his assistant would end up stealing checks from his trust account, forging ... Views: 825
There is one thing that all business owners must have, and it is a security system. Theft and damage to property is a problem for companies. No business owner wants their property or money to be stolen, or worse, their clients or employees to be harmed by a crime.
How do you protect your ... Views: 796
Companies have been struggling for years to keep cyber-attacks at bay. Cyberthieves are working faster than ever before to send out their malicious attacks, and it’s become increasingly difficult for companies to keep up.
CNN reports that almost one million malware strains are ... Views: 845
A group of people who are actively collaborating to commit identity fraud is known as an identity fraud ring. These rings are generally made up of two or more career criminals, often including family members or close friends. These rings work by members either stealing a victim’s identity ... Views: 951
There is no such thing as a home that is fully burglar-proof, but there is also no such thing as burglars who have the skills of Ethan Hunt from Mission Impossible. With the right security in place, you can get your home almost burglar-proof.
When most people think of security, they only ... Views: 1144
You know what a “buttdial” is. This is when a person has a seat somewhere, and the ensuring pressure of their butt against the seat accidentally presses upon the keypad of the phone that’s in their pocket. Or they don’t lock their phone and their fingers indiscriminately ... Views: 881
In the event of an attack, new smartphone applications can be used to send an alarm to a pre-chosen person. And the potential victims location can then be tracked.
But is this faster and more secure than a woman whipping out pepper spray and blasting a drunken buffoon who has her cornered in ... Views: 921
Most people have heard of storing information in “the cloud,” but do you know what this means, and if it is even safe?
A cloud is basically a network of servers that offer different functions. Some of these servers allow you to store data while others provide various services. The ... Views: 846
You’ve probably read many times that two-factor authentication is a superb extra layer of protection against a thief hacking into your accounts, because gaining access requires entering a One Time Passcode (OTP)—sent via text or voice—into a login field. In other words, no ... Views: 819
Whoever thought that one day, paying with green paper would be viewed as primitive as a horse and buggy? We seem to be getting closer to that time, especially since the security of making payments via smartphone is always being improved.
One way is with fingerprint scanning. Some smartphones ... Views: 975
Two thousand credit card payment terminals stand to become infected with malware called Trinity point of sales.
Ten million credit cards were stolen by hackers, called Fin6, who may end up scoring $400 million. The cards were stolen from retail and hospitality businesses. If each card sells ... Views: 784
A sharp nine-year-old girl has a biting message to a 51-year-old man, according to an article on myfoxboston.com:
“You deserve to stay in jail because you break into peoples houses. Stop breaking into peoples houses and do something with your life.”
This advice was directed to ... Views: 971
Lesson learned: If you run a fast-food restaurant or any company for that matter, you’d better treat your employees right. After all, they have a legal right to tweet all they want about you.
A Chipotle Mexican Grill in Havertown, PA, had a ban in place: Employees are prohibited from ... Views: 857
A teenager in Alaska, Denali Brehmer, killed her best friend after a man she met on the internet offered her $9 million to commit the murder. Brehmer, who is 18-years old, killed her 19-year old friend, Cynthia Hoffman, by shooting her in the back of the head at the urging of Darin Schilmiller, ... Views: 749
Catfishing is when someone creates a phony online account—and not necessarily to scam someone for financial gain. An article on vice.com tells all about a person who’s been catfishing for eight years.
She started in middle school by creating “Joey” on MySpace. She then ... Views: 876
When someone online presents as a different person than their true self, this is called catphishing, and it occurs on online dating sites.
Google the name of the object of your interest. Obviously, “Kelly Smith” and “John Miller” won’t get you far, but ... Views: 1043
Each year, researchers in security take the time to rate some of the worst passwords found on the Internet. While popular pop culture events have caused waves with the list of the worst passwords of 2015 – think “solo,” “starwars,” and “princess” – ... Views: 863
We’re told to change our passwords often to minimize getting hacked. Now we’re told this is a bad thing.
But not for any inherent techy reason. It’s because frequent password changing makes many people lower their guard when it comes to creating new passwords.
They get lax ... Views: 1098
Bad guys hacked bad guys. Hmmm, whose side should we take?
Ashleymadison.com got hacked. This site helps and suggests married people cheat. The hack threatens millions of users, potentially revealing their credit card information, addresses, real names, pictures and content of their chat ... Views: 908
Cyber crooks have phony websites that masquerade as the legitimate site you want to log onto. They’ve spun their web and are just waiting for you to fly into it. Google now has Password Alert, which will tell you if you’ve landed into such a non-Google web.
For the Chrome browser, ... Views: 959
When is the last time you checked your credit report? If it has been more than a year, you can get a free one. The issue is, however, is how to really understand it. Here’s some information about obtaining and reading your credit report.
Obtaining Your Free Credit Report
Based on US ... Views: 586
You’ve seen TV commercials and print ads about identity theft, and the “victim” is always an adult. That’s not realistic. The actor-portrayal should be that of a child. Yes, a kid.
Children are 51 times more likely than adults to have their identity stolen, says ... Views: 857
If you’re a pedophile, you’d be wise not to keep any prescription containers in view of a webcam with your lewd pictures. The information on such a bottle is what helped pedophile Stephen Keating get 110 years in the slammer says a CNN article.
But the amazing thing is that the ... Views: 810
On December 21, 2011 the Wall Street Journal reported that U.S. Chamber of Commerce was hacked. Many of the major media outlets are all re-publishing the report. But, if you look at the fine print you will discover that the attack occurred back in November 2009 and was discovered in May 2010. ... Views: 1806
Many Americans, says a recent survey by Gallup, worry about a data breach connected to the use of their credit cards. Interestingly, many people use a credit card for everything under the sun: even just a soda and bag of chips from the convenience mart. The more you use a credit card, the more ... Views: 1036
Choosing a home security system may be dizzying, what with all the possibilities, but the good news is that there’s a system for every budget and personality.
Gone are the days in which the only security systems available were the ones with all the clunky wires that had to be put ... Views: 971
Credit card fraud has many shapes and forms. The purpose of doing credit card fraud also varies. Some frauds are done in order to perform a huge transaction and some are done to purchase expensive goods for free. Any financial institution is exposed to a large number of attacks that are ... Views: 505
The good old days were when today’s college kids’ parents lugged their typewriters into their dorm room, and they communicated to people via the phone on their room’s wall. Their biggest worry was someone stealing their popcorn maker. Nowadays, college kids need to beware of ... Views: 1260
Gone are the days of the fat wallet bursting at the seems, since smartphones can now contain most anything that a wallet does—except the driver‘s license. But don‘t write that possibility off just yet.
Forbes.com reports on a story from the Des Moines Register that the Iowa ... Views: 889
When you subscribe to an online service, be careful of how much information you give out about yourself.
Most businesses in their terms and conditions, say they “respect your privacy.” But what if these companies go under or are sold? An article from the online New York Times ... Views: 927
What if you knew there existed a possibility that some company, without your knowledge, grabbed a photo of your child and put it on their product and then put their product online for sale?
Koppie Koppie sells coffee mugs with photos of kids on them—and YOUR child could be one. Though ... Views: 1007
Handwriting analysts really have their work cut out from them now, thanks to the development of new software that can forge—better than a human can—a person’s handwriting. So if you are worried about identity theft, add one more element to the kettle: a crook getting ahold of ... Views: 825