"You've just won a fabulous vacation or prize package! Now, if you'll kindly give me your credit card information and social security number for verification purposes, you will receive this awesome gift!"
Now why would they need my credit card or social security number to send me a freebie? Can you say, "identity theft?"
Although there are legitimate reasons for people to need that information, such as a purchase or job application, thieves need it to steal your life and money from you!
Crime officials are reporting that this kind of theft is becoming quite common. Don't be a victim! Follow a few common-sense suggestions to avoid finding out someone else has taken over your life-along with your bank account!
-Do not allow anyone to borrow your credit cards! Your best friend may be trustworthy, but her boyfriend may not be!
-Don't provide personal information such as date of birth, credit card numbers, your pin number, mom's maiden name, or social security number over the telephone unless you initiate the call. Don't leave mail lying around for strangers to pry into. How well do you really know your teen's friends?
-Destroy all bills, pre-approved credit card applications, credit card receipts, and other financial information when you no longer need such items.
-Don't keep private information like pin numbers and such in your purse or wallet. It's just too risky. We humans are much too forgetful. Be honest, how many times have YOU had to return to a restaurant or friend's home to retrieve your purse? Is there anything in there that could harm you if it was stolen or lost? Time to check.
-Check your credit reports regularly. To order your report, call the three major credit bureaus at these toll-free numbers: Equifax at (800) 685-1111, Experian at (888) 397-3742, or Trans Union at (800) 888-4213. By law, the most you can be charged for a copy of your report is $8.50. To be safe, consider getting a copy from each of the three companies. If after reviewing your report you spot signs of a possible fraud, report it immediately!
-Keep your passwords and pins confidential and secure. Avoid passwords and pin numbers that will be easy for a thief to figure out. For example, don't use your name, street address or birth date. Also, change your passwords every once in awhile, just to be safe.
The FTC works for the consumer to prevent fraudulent, deceptive and unfair business practices in the marketplace and to provide information to help consumers spot, stop and avoid them. To file a complaint or to get free information on consumer issues, visit www.ftc.gov or call toll-free, 1-877-FTC-HELP (1-877-382-4357); TTY: 1-866-653-4261. The FTC enters Internet, telemarketing, identity theft and other fraud-related complaints into Consumer Sentinel, a secure, online database available to hundreds of civil and criminal law enforcement agencies in the U.S. and abroad. Report suspected Internet-based fraud to the Federal Trade Commission or the IFCC (www.ifccfbi.gov/Default.asp), a new joint project of the FBI and the National White Collar Crime.
Kristi Sayles, author of too many publications to list here, invites everyone to subscribe to her Internet Treasures Newsletter. Freebies, advice, information, humor and other treasures from the Internet are included. It's free! http://smartauthor.com/treasures.html
So called phishers try to catch the information about the... Read More
The Threat10 years ago you could probably have run no... Read More
Viruses are, however, not the only malicious software programs out... Read More
If you use emails actively in your communication, you must... Read More
A new variation of the Nigerian Scam theme ... Read More
If spyware were a person and he set himself up... Read More
Spelt phishing, but pronounced as above, this despicable act is... Read More
Spyware protection software is the easiest way of removing spyware... Read More
A couple of days ago, I was searching for a... Read More
There is nothing more important that password security in world... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
If you are wondering how to fight spyware for safe... Read More
Nobody wants to pay to remove spyware. At the very... Read More
The Loss Prevention Manager should be receptive to the needs... Read More
The Internet is a vast International Network of people and... Read More
At this point, if you've got the whole "turning the... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
Much has been said on the theory of password protection... Read More
First off I should explain what phishing is. Phishing is... Read More
Huge number of spyware software applications are available in the... Read More
Spyware, viruses and worms... oh my!If you are connected to... Read More
What is Phishing? In a typical Phishing attack, a criminal... Read More
Internet scams and frauds are on the rise! The quantity... Read More
You may not realize it, but as you are surfing... Read More
There you are busily typing away on your PC or... Read More
Millions of people make purchases online, but many people are... Read More
The trash folder in my main inbox hit 4000 today.... Read More
You are at your computer, checking out software on EBay.... Read More
Never before with Instant Messaging (IM) has a more vital... Read More
Ok, ok, I know you've seen them. All those pop... Read More
Only the top spyware removers are successful at detecting and... Read More
What is Phishing? Phishing is a relatively newly coined term... Read More
Today,on most internet user's computers, we have the ability to... Read More
A couple of days ago, I was searching for a... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
I am in the midst of Oscar Wilde's The Picture... Read More
You've seen it in the news - 40 million credit... Read More
The money being spent online is steadily growing. With billions... Read More
1)Spyware is on your system. Like it or not, statistically... Read More
Imagine my surprise when I received a phone call from... Read More
Have you seen the web site, www.freestuff.com? Or have you... Read More
You are at your computer, checking out software on EBay.... Read More
Ok, ok, I know you've seen them. All those pop... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
First the basic definition of Spyware: It is a type... Read More
Do you sometimes notice your computer running slower. Is your... Read More
Having a good Spyware eliminator on your computer is vital... Read More
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
In 1997, I decided after 15 years as a practicing... Read More
Before you enter your name, address or any other data... Read More
With the Internet entering our lives in such an explosive... Read More
A firewall is a system or gateway that prevents unauthorized... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
Monday morning, 6am; the electric rooster is telling you it's... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
After Two Security Assessments I Must Be Secure, Right? ... Read More
Spyware is software or hardware installed on a computer without... Read More
Industrial Espionage. These methodologies are being used on a daily... Read More
Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
There is no doubt that "how-to articles" have become a... Read More
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
Internet Security |