Posts Tagged ‘cyber scams’

Do you know the 4 pieces of data not found in a background check thus helping employers prevent identity theft?

Are There Employee Criminal Background Check Laws?

Yes! They vary by state, but the Federal Fair Credit Reporting Act (FCRA) set national standards for performing an employee criminal background check. The law only applies to an employee criminal background check conducted by a consumer reporting agency, which is a firm that administers the employee criminal background check on your behalf. If you decide to perform an employee criminal background check in-house, make sure you follow your state’s background check laws carefully. Remember: Employees have rights, too!

According to the FCRA, some information cannot be reported in an employee criminal background check:

  • Accounts in collection longer than seven years
  • Paid tax liens beyond seven years
  • Bankruptcies after ten years
  • Arrest records, civil suits, and civil judgments after seven years

 

Linda Vincent, Founder of The Identity Advocate, is dedicated to helping consumers and businesses keep their identities safe. This article first appeared in the newsletter provided by The Identity Advocate.

Let’s connect! Twitter| Facebook | Linkedin

Preventing Healthcare Fraud Schemes as HealthCare Reform Begins

The National HealthCare Anti-Fraud Association has made some great recommendations for making yourself aware of potential hazards with the onset of  health care reform. You must realize legitimate insurance companies must be licensed to sell insurance of any kind with the state Department of Insurance in each state where they sell insurance. Insurance brokers must be licensed as well. Before you consider buying insurance, you should determine if the company or individual selling the insurance policy is properly licensed.  Every state has  a Department of Insurance where you can check out the company and the independent brokers.

These are some simple steps to follow to help you avoid being the victim of a health insurance scam:

DON’T

  • Don’t buy insurance online or over the phone, based on mailers, fliers or ads without investigating first and clearly understanding what you are buying.
  • Don’t respond to high pressure or fear tactics from aggressive salespeople.
  • Don’t provide your Social Security number, bank account numbers or credit card numbers before confirming that you are dealing with a legitimate company, and don’t give out personal information over the phone.
  • Don’t sign blank insurance claims forms.
  • Don’t give blanket authorization to a medical provider to bill for services rendered.

DO

  • Do take the time to research any company before purchasing a health insurance policy from it-a few minutes invested in searching the Internet is worth your time.
  • Do check with your state’s Insurance Department to make sure the company is licensed to do business.
  • Do compare insurance coverage.
  • Do document your dealings with any company from which you are considering purchasing insurance.
  • Do get a list of doctors and other providers that participate with the insurance plan you are considering.
  • Do ask LOTS of questions.
  • Do report suspected fraud to your state insurance department.

Below are some resources to help you learn more about the Health Care Reform law, what it means to you and how to protect yourself from being the victim of fraudulent health insurance scams.

  • The U.S. Department of Health & Human Services manages a robust website intended to inform consumers about the new law: HealthReform.GOV
  • The Obama Administration has created a website which aims to explain the new health reform law: Health Reform: What It Means To You
  • To determine if a health insurer is licensed to do business in your state, check with your state’s department of insurance (DOI). Plus, most DOI websites provide information and resources on how to report suspected fraud.

For other information and further education connect with Linda at 310-831-4400 or Linda@theidentityadvocate.com

3 Steps to Protect Your Identity From Online Internet Criminal Activity

 Hackers hack because they can. They hack to steal YOUR identity. They don’t care  they don’t know you. Whether it is through your email, a spoofed (fake) email requests, even  links to connect from LinkedIn, hackers can add malware or key-logger programs to your computer to scrounge around for you to provide – and what you may consider – protected information.

In the case of a key logger program, hackers  can access your passwords, account numbers, bank information and  even your employer information. Once hackers gain access to this information, they use it to re-invent themselves as you, get a new drivers license, start new credit cards or even buy property. Identity thieves abound and the most frustrating thing is only one in 700 identity thieves are ever arrested. Being careful when on-line is critical. Here are three actions you can take today to ensure your critical information stays private:

1. Install a firewall on your computer and digital devices such as AVG, Avast or Lookout

2. Install an anti-malware program and check and run it monthly

3. Download  password generator program software from sites like Keepass, Lastpass, or Roboform

 

Identity theft is on the rise. The IC3 (Internet Crime Complaint Center- partnership between the FBI, the National White Collar Crime Center and the Bureau of Justice) received and processed 289,874 complaints, averaging more than 24,000 complaints per month of identity theft. This is 8.3 percent over the previous full  year.  For more information read the IC3 crime report.

Want to learn more about on-line safety, protecting your identity and  recovery if it is stolen connect  with The Identity Advocate : http://www.theidentityadvocate.com/identity-theft-protection.php

 

Related Blog Posts:

http://www.theidentityadvocate.com/blog/identity-theft/mobile-identity-theft-threats-and-prevention-tips

http://www.theidentityadvocate.com/blog/identity-theft/fbi-new-e-scams-warnings

http://www.theidentityadvocate.com/blog/identity-theft/cyber-criminals-using-photo-sharing-programs-to-compromise-computers-fbi-press-release

 

International Internet Scam Hotspots

Check out how and wherefores of an International Scams online ~ International Internet Scam Hotspots
From: Background Check Guide

FBI New E-Scams & Warnings

Citadel Malware Delivers Reveton Ransomware in Attempts to Extort Money

05/30/12—The IC3 has been made aware of a new Citadel malware platform used to deliver ransomware, named Reveton. The ransomware lures the victim to a drive-by download website, at which time the ransomware is installed on the user’s computer. Once installed, the computer freezes and a screen is displayed warning the user they have violated United States federal law. The message further declares the user’s IP address was identified by the Computer Crime & Intellectual Property Section as visiting child pornography and other illegal content.

To unlock the computer, the user is instructed to pay a $100 fine to the U.S. Department of Justice using prepaid money card services. The geographic location of the user’s IP address determines what payment services are offered. In addition to the ransomware, the Citadel malware continues to operate on the compromised computer and can be used to commit online banking and credit card fraud.

This is an attempt to extort money with the additional possibility of the victim’s computer being used to participate in online bank fraud. If you have received this or something similar, do not follow payment instructions.

It is suggested that you:

Contact your banking institutions.
File a complaint at www.IC3.gov.

FBI Warning for Travlers-Laptops-and Hotel Connections

Malware is being Installed on Travelers’ Laptops Through Software Updates on Hotel Internet Connections

Recent analysis from the FBI and other government agencies demonstrates that malicious actors are targeting travelers abroad through pop-up windows while they are establishing an Internet connection in their hotel rooms.

Recently, there have been instances of travelers’ laptops being infected with malicious software while using hotel Internet connections. In these instances, the traveler was attempting to set up the hotel room Internet connection and was presented with a pop-up window notifying the user to update a widely used software product. If the user clicked to accept and install the update, malicious software was installed on the laptop. The pop-up window appeared to be offering a routine update to a legitimate software product for which updates are frequently available.

The FBI recommends that all government, private industry, and academic personnel who travel abroad take extra caution before updating software products through their hotel Internet connection. Checking the author or digital certificate of any prompted update to see if it corresponds to the software vendor may reveal an attempted attack. The FBI also recommends that travelers perform software updates on laptops immediately before traveling, and that they download software updates directly from the software vendor’s website if updates are necessary while abroad.

Anyone who believes they have been a target of this type of attack should immediately contact their local FBI office and promptly report it to the IC3’s website at www.IC3.gov. The IC3’s complaint database links complaints together to refer them to the appropriate law enforcement agency for case consideration. The complaint information is also used to identify emerging trends and patterns.

FBI Press Release – sale and distribution of stolen credit card numbers

Federal Courts Order Seizure of 36 Website Domains Involved in Selling Stolen Credit Card Numbers
U.S. Department of Justice April 26, 2012

Office of Public Affairs (202) 514-2007/ (202) 514-1888

WASHINGTON—Seizure orders have been executed against 36 domain names of websites engaged in the illegal sale and distribution of stolen credit card numbers, Assistant Attorney General Lanny A. Breuer of the Justice Department’s Criminal Division, U.S. Attorney Neil H. MacBride of the Eastern District of Virginia, and Acting Executive Assistant Director Kevin Perkins of the FBI’s Criminal, Cyber, Response, and Services Branch, announced today.

The seizures are the result of Operation Wreaking hAVoC, an FBI and Justice Department operation targeting the sale of stolen credit card numbers via the Internet. The operation was coordinated with international law enforcement, including the United Kingdom’s Serious Organised Crime Agency (SOCA).

The 36 seized domains are in the custody of the federal government. Visitors to the sites will now find a seizure banner that notifies them that the domain name has been seized by federal authorities.

“The websites we are targeting today were commercial outlets for stolen credit card information,” said Assistant Attorney General Breuer. “By making this information available on the Internet, these websites facilitated fraud on credit card holders around the world. The actions announced today are the result of extraordinary coordination with our international law enforcement partners and reflect our commitment to use every tool at our disposal to shut down fraudulent, criminal enterprises.”

“Countless lives are thrown into financial turmoil because of these websites,” said U.S. Attorney MacBride. “With a few simple clicks, thousands of stolen credit card numbers can be bought or sold to fraudsters anywhere in the world. Today’s seizures are part of an ongoing campaign to disrupt this online market regardless of where it operates.”

“By seizing the websites the criminal underground uses to blatantly sell stolen personal information, Operation Wreaking hAVoC shows that we are committed to protecting individuals online and preventing criminals from using the Internet to line their pockets,” said FBI Acting Executive Assistant Director Perkins. “The FBI and our partners around the world are committed to disabling these criminal networks. No single law enforcement agency can fight cyber crime on its own, and the FBI is proud to be a part of such an outstanding effort by all of the participating agencies.”

The websites of the seized domain names are commonly referred to as Automated Vending Carts (AVCs). An AVC is a website that functions as an open-ended invitation to any visitor to purchase stolen credit card numbers. AVCs allow a user to buy stolen credit card data over the Internet, even using an online shopping cart, just like a traditional online retailer. Some AVC sites allow a buyer to select which type of credit card number to purchase, the account’s country of origin, and, in some cases, the state in which the account holder lives. AVCs allow sellers to traffic stolen credit card data without communicating directly with buyers.

During this operation, law enforcement officials made undercover purchases of credit card numbers, including credit card numbers issued by Bank of America, SunTrust, and Capital One. The banks confirmed that the sites were not authorized to sell the credit card numbers. Seizure orders were obtained from a federal magistrate judge in the Eastern District of Virginia.

This U.S. operation was led by FBI’s Washington Field Office; the Computer Crime and Intellectual Property and Asset Forfeiture and Money Laundering Sections of the Justice Department’s Criminal Division; and the U.S. Attorney’s Office for the Eastern District of Virginia. The FBI’s Pittsburgh Field Office and the U.S. Attorney’s Office for the Western District of Pennsylvania also assisted in the investigation.

The international operation was led by the United Kingdom’s SOCA. The Australian Federal Police (AFP); German Bundeskriminalamt (BKA); United Kingdom’s Dedicated Cheque and Plastic Crime Unit (DCPCU); Macedonian Ministry of Interior Cyber Crime Unit (MOI); Ukraine Ministry of Internal Affairs; Romanian Ministry of Interior; and the Dutch High-Tech Crimes Unit (KLPD) provided assistance. Activities conducted by these international law enforcement agencies included arrests of AVC operators and purchasers, additional domain seizures, and data seizures.

Cyber Fraud Protection Tips from the FBI

Here are some tips you can use to avoid becoming a victim of cyber fraud:

Do not respond to unsolicited (spam) e-mail.

Do not click on links contained within an unsolicited e-mail.

Be cautious of e-mail claiming to contain pictures in attached files, as the files may contain viruses. Only open attachments from known senders. Scan the attachments for viruses if possible.

Avoid filling out forms contained in e-mail messages that ask for personal information.

Always compare the link in the e-mail with the link to which you are directed and determine if they match and will lead you to a legitimate site.

Log directly onto the official website for the business identified in the e-mail, instead of “linking” to it from an unsolicited e-mail. If the e-mail appears to be from your bank, credit card issuer, or other company you deal with frequently, your statements or official correspondence from the business will provide the proper contact information.

Contact the actual business that supposedly sent the e-mail to verify if the e-mail is genuine.

If you are asked to act quickly, or there is an emergency, it may be a scam. Fraudsters create a sense of urgency to get you to act quickly.

Verify any requests for personal information from any business or financial institution by contacting them using the main contact information.

Remember if it looks too good to be true, it probably is.

To receive the latest information about cyber scams, sign up for e-mail alerts on this website. If you have received a scam e-mail, please notify the IC3 by filing a complaint at www.ic3.gov.

FBI posts ways to prevent being scammed over the Holiday Season

The thieves are always ready to take your money or your identity. Thinking gift card? Trying the auction websites? The FBI this year has posted the top ways to prevent the various types of scams from happening to you or your family or your business: http://www.fbi.gov/news/pressrel/press-releases/escams_112410
For more information on e-scams, including take over of financial accounts of small to medium size businesses visit the FBI’s E-Scams and Warnings web page: www.fbi.gov/scams-safety/e-scams