Posts tagged "Fraud"

Identity Theft Statistics: Online Shopping & Cyber-Intrusion

image-4096
According to a new survey, most online consumers are not taking the proper precautions when shopping online, putting them at a far higher risk of cyber-fraud. 75% of participants thought that a firewall alone could protect them while online. 62% of those polled thought that anti-virus software was enough protection to stop spy-ware. Are you part of these statistics?

While firewalls and anti-virus software are two important aspects of protecting yourself online, there is much more you need to do to keep yourself safe.

Here are additional statistics from the survey:

  • While online, 45% of consumers are most concerned about identity theft,  41% about privacy,  and 45% about computer viruses.
  • While 28% of consumers thought that their identities were secure on mobile devices, most are more aware that their mobile devices are also vulnerable to malicious cyber-crime.

Posted in Cyber Data Security, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , ,

Sileo Deflates ePickPocketing Hype on Fox & Friends

John appeared on Fox & Friends this morning to set the facts straight about the real and perceived risks posed by Electronic PickPocketing.

It is true that Identity Thieves are able to steal your credit card information without even touching your wallet. The technology exists, is readily available and can be assembled for under $1,000. But that doesn’t necessarily make it an efficient means of stealing credit card numbers.

RFID, or radio-frequency identity technology was introduced to make paying for items faster and easier.  All major credit cards that have this technology have a symbol (pictured below). It means that your card can communicate via electromagnetic waves to exchange data (your credit card number) between a terminal and a chip installed inside of your card (or passport). Thus, by getting within a few inches of your credit card, a thief is able to obtain your credit card number, expiration date and maybe your name.

Posted in Cyber Data Security, Identity Theft Prevention, Sileo In the News by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , , , ,

Electronic Pickpocketing Hype Banks on Your Fear!

Electronic Pickpocketing is Possible, but Over-Hyped.

There is a new wave of hi-tech identity theft that allows thieves to steal your credit card information using inexpensive technology to intercept credit card (and sometimes even passport) information without even touching your wallet. Watch the video to the left or read our Electronic Pickpocket post to learn the basics.

And make sure you pay attention to the fact that the person they are interviewing for the news piece in the video MAKES MONEY FROM YOUR FEAR OF ELECTRONIC PICKPOCKETING! The gentleman they interview runs a company that makes shields for your credit cards and passports to stop electronic pickpocketing. I’m not saying that the products don’t work or aren’t somewhat valid; I’m saying that you have to take this gentleman’s perspective into consideration before buying the hype. He benefits from your fear, so do a little more research before you go gettin’ all paranoid.

Posted in Cyber Data Security, Identity Theft Prevention, Sileo In the News by Identity Theft Speaker .
Tags: , , , , , , , , , , , , ,

Information Security Speaker: 5 Information Espionage Hotspots Threatening Businesses

You and your business are worth a lot of money, whether your bank accounts show it or not. The goldmine lies in your data, and everyone wants it. Competitors want to hire the employee you just fired for the thumb drive full of confidential files they smuggled out. Data thieves salivate over your Facebook profile, which provides as a “how to” guide for exploiting your trust. Cyber criminals are digitally sniffing the wireless connection you use at Starbucks to make bank transfers and send “confidential” emails.

Every business is under assault by forces that want access to your valuable data: identity records, customer databases, employee files, intellectual property, and ultimately, your net worth. Research is screaming at us—more than 80% of businesses surveyed have already experienced at least one breach (average recovery cost: $6.75 million) and have no idea of how to stop a repeat performance. These are clear, profit-driven reasons to care about who controls your data.

Posted in Burning Questions (Video), Fraud Detection & Prevention, Identity Theft Prevention, Video Tips by Identity Theft Speaker .
Tags: , , , , , , , , , , , , , , ,

53 Charged in New Jersey Identity Theft Crime Ring

image-3244
According to  as September 16th news release, the U.S. Department of Justice charged 53 individuals in connection with a widespread identity theft and fraud ring in New Jersey.

“The sheer scope of the fraud – and the organization that allegedly committed it – is remarkable,” U.S. Attorney Paul Fishman, was quoted in a news release. “This type of crime puts all of us at risk, not just because of the cost to our financial institutions, but also because of the threat posed by fake identification documents.”

The release goes on to describe the crime ring.

Sang-Hyun Park, a resident of Palisades Park, N.J., was the leader of a criminal organization headquartered in Bergen County, N.J. Park and his co-conspirators (the “Park Criminal Enterprise”) obtained, brokered, and sold identity documents to customers that were used to commit credit card fraud, bank fraud, tax fraud, and other crimes. The 43 defendants charged in connection with the enterprise played various roles as Park’s staff, identity brokers, credit build-up team, and collusive merchants, as well as customers seeking fraudulent services. Members of the Park Criminal Enterprise obtained social security cards, most beginning with the prefix “586,” from various brokers.

Posted in Cyber Data Security, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , ,

Identity Theft Scam Stole Millions – Pennies at a Time

image-2497
The FTC just busted a long-running internet scam where offshore thieves set up virtual companies and stole millions of dollars from US consumers  one small charge at a time.

“It was a very patient scam,” said Steve Wernikoff, a staff attorney with the FTC who is prosecuting the case. According to him, the scammers found loopholes in the credit card processing system that allowed them to set up fake U.S. companies that then ran more than a million phony credit card transactions through legitimate credit card processing companies.

The fraudsters were able to fly under the radar for so long because they only charged consumers between $ .25 and $9 and set up over 100 fake companies to pull off these transactions. In this specific case they charged over 1.35 million credit cards a total of $9.5 million dollars – those nickles and dimes really add up! Shockingly, 94% of these charges went undetected by the credit card holder because they didn’t notice an unusual charge on their credit card statements and fraud detection agencies rarely detect anything under $10.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , , , ,

Medical Identity Theft Increasing

image-2014
Medical records are one-stop shopping for identity thieves. There is no need to slowly gather bits and pieces of someone’s personal information – it’s all packaged together: Social Security number, name, address, phone number, even payment accounts. Crooks have received everything from medication to a liver transplant using a stolen identity. And that’s only the tip of the iceberg! More than just medical treatment is at stake. Once a thief’s medical information is entered into your records, it’s extremely difficult to get rid of that information. It’s conceivable, for example, that at a later date, you’ll need a Type A blood transfusion but be given the thief’s Type B with dire consequences.

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , ,

Social Engineering Expert Quoted in CSO Article

Quoted from the original CSO Online story:

Social engineering stories: The sequel

Two more social engineering scenarios demonstrate how hackers still use basic techniques to gain unauthorized access, and what you can do to stop them

By Joan Goodchild, Senior Editor
May 27, 2010 —

John Sileo, an identity theft expert who trains on repelling social engineering, knows from first-hand experience what it’s like to be a victim. Sileo has had his identity stolen—twice. And both instances resulted in catastrophic consequences.

The first crime took place when Sileo’s information was obtained from someone who had gained access to it out of the trash (yes, dumpster diving still works). She bought a house using his financial information and eventually declared bankruptcy.

“That was mild,” said Sileo, who then got hit again when his business partner used his information to embezzle money from clients. Sileo spent several years, and was bankrupt, fighting criminal charges.

Posted in Fraud Detection & Prevention, Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , , , , ,

Otago Daily Times Article: Identity Fraud Real Risk

I was recently featured in an article by the Otago Daily Times in Dunedin, New Zealand during my stay there. I discuss the importance of protecting you Identity, not only at home, but also when you travel. With over 9 million Identity Theft victims in 2008 alone, you can never be too careful!

One of the first things American public speaker John Sileo did on his return to Dunedin this month was buy a paper shredder.

Not that he is paranoid, he says, but this self-proclaimed expert on identity fraud does not take chances with personal information.

Click Here to read the entire article.

John Sileo became America’s leading Identity Theft Speaker & Expert after he lost his business and more than $300,000 to identity theft and data breach. His clients include the Department of Defense, Pfizer and the FDIC. To learn more about having him speak at your next meeting or conference, contact him by email or on 800.258.8076

Posted in Identity Theft Prevention by Identity Theft Speaker .
Tags: , , , , ,