Smartphone Safety Tips

This week’s blog is again about educating our community about safe practices in the world of continuing advanced technology. The Internet Crime Complaint Center (IC3) has been made aware of various malware attacking Android operating systems for mobile devices. Some of the latest known versions of this type of malware are Loozfon and FinFisher. Loozfon is an information-stealing piece of malware. Criminals use different variants to lure the victims. One version is a work-at-home opportunity that promises a profitable payday just for sending out email. A link within these advertisements leads to a website that is designed to push Loozfon on the user’s device. The malicious application steals contact details from the user’s address book and the infected device’s phone number.

FinFisher is a spyware capable of taking over the components of a mobile device. When installed the mobile device can be remotely controlled and monitored no matter where the Target is located. FinFisher can be easily transmitted to a Smartphone when the user visits a specific web link or opens a text message masquerading as a system update.

These are just two examples of malware used by criminals to lure users into compromising their devices.

Safety tips to protect your mobile device:

 • When purchasing a Smartphone, know the features of the device, including the default settings. Turn off features of the device not needed to minimize the attack surface of the device.

• Depending on the type of phone, the operating system may have encryption available. This can be used to protect the user’s personal data in the case of loss or theft.

 • With the growth of the application market for mobile devices, users should look at the reviews of the developer/company who published the application.

• Review and understand the permissions you are giving when you download applications.

• Passcode protect your mobile device. This is the first layer of physical security to protect the contents of the device. In conjunction with the passcode, enable the screen lock feature after a few minutes of inactivity.

• Obtain malware protection for your mobile device. Look for applications that specialize in antivirus or file integrity that helps protect your device from rogue applications and malware.

• Be aware of applications that enable Geo-location. The application will track the user’s location anywhere. This application can be used for marketing, but can be used by malicious actors raising concerns of assisting a possible stalker and/or burglaries.

• Do not allow your device to connect to unknown wireless networks. These networks could be rogue access points that capture information passed between your device and a legitimate server.

• If you decide to sell your device or trade it in, make sure you wipe the device (reset it to factory default) to avoid leaving personal data on the device.

•Smartphones require updates to run applications and firmware. If users neglect this it increases the risk of having their device hacked or compromised.

• Avoid clicking on or otherwise downloading software or links from unknown sources.

• Use the same precautions on your mobile phone as you would on your computer when using the Internet.

If you have been a victim of an internet scam or have received an e-mail that you believe was an attempted scam, please file a complaint at www.IC3.gov.

For more information on ID Theft Protection visit www.hvshred.com

 

FTC Cracks Down on Tech Support Scams

In a recent press release, the FTC (the government agency charged with consumer protection) announced a major international crack down on tech support scams in which telemarketers masquerade as major computer companies, con consumers into believing that their computers are riddled with viruses, spyware and other malware, and then charge hundreds of dollars to remotely access and “fix” the consumers’ computers. 

According to the press release, at the request of the FTC, a U.S. District Court Judge has ordered a halt to six alleged tech support scams pending further hearings, and has frozen their assets.

The FTC charged that the operations – mostly based in India – target English-speaking consumers in the United States, Canada, Australia, Ireland, New Zealand, and the U.K.  According to the FTC, five of the six used telemarketing boiler rooms to call consumers.  The sixth lured consumers by placing ads with Google which appeared when consumers searched for their computer company’s tech support telephone number. 

According to the FTC, after getting the consumers on the phone, the telemarketers allegedly claimed they were affiliated with legitimate companies, including Dell, Microsoft, McAfee, and Norton, and told consumers they had detected malware that posed an imminent threat to their computers.  To demonstrate the need for immediate help, the scammers directed consumers to a utility area of their computer and falsely claimed that it demonstrated that the computer was infected.  The scammers then offered to rid the computer of malware for fees ranging from $49 to $450.  When consumers agreed to pay the fee for fixing the “problems,” the telemarketers directed them to a website to enter a code or download a software program that allowed the scammers remote access to the consumers’ computers.  Once the telemarketers took control of the consumers’ computers, they “removed” the non-existent malware and downloaded otherwise free programs.

Before sharing any personal information with a company, make sure you have confidence the company is on the up and up.

For more id theft protection tips, visit www.hvshred.com

Electronics Recycling Event Friday, October 26th

As the Chairperson for the Dutchess Chamber’s Green Committee I am excited to share the details about our latest electronics recycling event Friday, October 26th running from 10am-4pm.

There is a suggested donation of $5 per carload for the public and $20 for businesses to benefit the Chamber Foundation.  Businesses must pre-register with Whitney at the Chamber 454-1700 ext 100 or email Whitney@dcrcoc.org

With your help, our previous events collected nearly 50 tons of recyclables and raised over $3000 for the Foundation.   The event is hosted by the Hudson Valley Market Place just off Salt Point Turnpike in Poughkeepsie.  Thanks also to our generous sponsors at Royal Carting and Covanta Energy

Please also help us spread the word as broadly as possible.

 More details are on our website www.hvshred.com

 To a greener today! 

Judith Papo

Help Avoiding Added Damage from a Car Accident

We keep our eyes open for opportunities to help our community gain awareness of all the situations their identity may be compromised. In this week’s blog, we thank the National Association of Insurance Commissioners (NAIC) for bringing another such situation into focus. In an automobile accident, the first concern is safety and the second is your vehicle. Likely, the last thing on your mind is protecting your identity. A recent survey by the National Association of Insurance Commissioners (NAIC) suggests that, after an accident, many Americans do not really know what information they should share with the other driver. State laws vary, but in most cases you need only provide your name and vehicle insurance information, which should include the name and phone number of your insurance provider. Sharing personal information such as your address and phone number may put your privacy and identity at risk. However, if another driver is unable to provide vehicle ownership and/or insurance information it is appropriate to ask for their phone number, address and driver’s license number.

According to the July 2012 survey:
• Thirty-eight percent of consumers believed they should share their driver’s license number with the other driver.
• So what’s the risk? Many retailers accept driver’s license information to verify your identity over the phone. In fact, your license number is the most common way to confirm your identity after Social Security number and date of birth.
• Twenty-five percent of consumers surveyed said they would share their home address.
• Actually, your home address gives identity thieves the physical location of your mail or garbage, the first place criminals often look for personal financial information. And, now a stranger knows where you live, possibly putting your personal safety at risk.
• Twenty-nine percent of survey respondents believed they are required to share personal phone numbers. In fact, sharing your phone number is rarely necessary.

Identity theft is one of the fastest-growing crimes in the United States. The Federal Trade Commission estimates nearly nine million consumers have their identities stolen each year, disrupting finances and damaging credit histories and reputation. Knowing what to share helps keep property and identities safe.

For more identity theft resources, please visit www.hvshred.com

Fraud Aimed at the Unemployed

Always a wealth of useful information, the latest issue of Consumer Reports highlighted the latest in fraud scams. Especially with the rise in unemployment, fraudsters have found a vulnerable population in job seekers. Last May, job hunters using computers at a public library in Columbus, Ohio, to search the want ads were approached by a “recruiter” looking to fill positions at a new store nearby. The sneak used the library to conduct job interviews, and candidates filled out applications with their name, date of birth, Social Security number, and more.

When the applicants later went to the store for training, they learned that the recruiter wasn’t associated with it at all. Rather, face-to-face job interviews are a new and brazen way to extract information for ID theft.
Job scams rank seventh on the BBB’s top 10 scams list, and such come-ons also involve work-at-home schemes including stuffing envelopes, assembling merchandise, medical billing and claims processing, and reshipping what the victim may not know are stolen goods.

ID theft was the biggest category on the FTC’s 2011 complaint list. Thieves use a wide variety of tactics to get you to give up key information that lets them steal from your existing bank and credit accounts or use your Social Security number to open phony financial accounts and commit other crimes in your name.

Protect yourself: Never give your personal information to anyone who telephones, e-mails, texts, or otherwise initiates contact with you. Monitor your financial accounts weekly or even daily, place a security freeze on your credit reports at all three credit bureaus, and file an ID-theft report with the local police if you get swindled.
If someone approaches you with a job, contact the prospective employer to verify that the recruiter and the job opening are legitimate. There should be no need for checking-account and other financial information on your application.

For more on identity theft protection, visit www.hvshred.com

Protecting Seniors from ID Theft

Thanks to a recent post on Fraud Avengers.com, we would like to share information to help our community look after what appears to be among our most vulnerable population: our senior citizens. According to the FBI Internet Crime Complaint Center, seniors are targets for countless forms of fraud, ranging from simple home repair scams, to more complex investment and insurance fraud. Perpetrators include family, friends, neighbors, caregivers, financial advisors and strangers.

Opportunists see the “golden years” as primetime to rob all the savings and good credit seniors spent a lifetime accumulating. Make sure the seniors in your life are made of aware of the following top scams:
• Work from Home – Jobs listed in newspapers, online job sites, emails and social networking sites, promising jobs to seniors as “money transfer agents” abroad.
• Government Official Impersonation – Scams range from fraudsters purporting to be from the FBI, Social Security, Medicare or other federal agencies all demanding money.
• Loan Intimidation – Phone calls or emails threatening arrest or legal action for delinquent loans. These often target personal information used to commit identity theft.
• Romance – Taking advantage of lonely hearts, scammers will claim personal hardship and the need for financial help.
• Auto Auctions – Fraudsters advertise vehicles at “too good to be true” prices. This scam uses a “must sell quickly” tactic and demands full or partial payment through a third party.

If you or an older adult you know is being subjected to financial elder abuse, visit the National Center on Elder Abuse (NCEA) for a list of state reporting telephone numbers to get help. Contact your financial institution to report the fraud. File a police report, especially if personal and confidential details were provided, such as social security numbers, which could be used to commit identity theft. If you believe there is immediate physical danger, contact 911.

For more id theft resources, please visit www.hvshred.com

Red Flags Part Two

Continued from last week, this post provides part two of our two part series on red flags to help detect ID theft. Review the following to see if you may be a victim and not know it yet; if so, swift action will limit the damage:

Your mail is missing. If you don’t receive your bank statement, there could be a problem. The perpetrator may have changed your address with the financial institution. If other pieces of mail are missing, it may mean the perpetrator is collecting information about you to develop a profile. Similarly, if you don’t receive your email statement, someone may have conquered your online account and altered the settings to lock you out.
You receive unexpected mail. You might get a notice from the post office that your mail is being forwarded to another address, without having requested the address change. Or you receive a letter with respect to an account that you never opened. Other mailings that could be a sign of identity theft: You receive a credit card in the mail that you never applied for, or the IRS notifies you about unreported wage income that you didn’t earn.
You find errors in your Social Security statement. If you receive your statement and see that the earnings reported are greater than your actual earnings in a given year, someone might have stolen your Social Security number and be using it for wage reporting services, Stephens says.
You’re denied an application based on your credit. If you have good credit but are denied an application for, say, a new credit card or a loan, that may be an indication that your identity has been stolen.
You can’t access your email. You attempt to access your email but find that your username and password have been changed without your knowledge, or a similar scenario happens for another online account. That can be a sign that someone is covering their tracks for an identity-theft operation.

If you’re a victim of financial identity theft, the first thing to do is contact your bank or financial institution. You should then conduct a full audit of your personal finances and identify any questionable transactions. This information will be useful when it comes time to dispute the charges.

No matter what, the earlier you catch identity theft, the better—so stay vigilant.

For more ID theft resources, please visit www.hvshred.com

Red Flags Help Detect Identity Theft

Getting back to our education mode, today we reinforce the red flags to detect you may be a victim of identity theft. With so much information, we are breaking the post into a two part series. U.S. News spoke recently provided the following suggestions:

You find errors on your bank or credit-card statement. This is likely the first warning sign you encounter. When checking your paper or online statement, you might see an unexplained or inaccurate entry—a withdraw, a check, an electronic transaction, or a purchase that you don’t recognize.
You spot errors on your credit report. You request a copy of your credit report and notice inaccurate information. The most common indicators of identity theft are a credit inquiry you don’t recognize or a new account you didn’t open.
Your account is flagged. You might receive a phone call, letter, or email from your bank or brokerage notifying about an irregularity on your account. If it comes in the form of an email, make sure that it’s a legitimate email and not a phishing email (where a fraudster masquerades as a trusted entity to try to acquire your personal information).
Debt collectors are calling. A debt collector contacts you about accounts you know nothing about or problems with existing accounts that you’re unaware of.
There’s a warrant out for your arrest. Say you get stopped for a speeding ticket, and the police officer says there’s a warrant out for your arrest for a crime you’re totally unaware of. “Someone can most certainly use your identity and impersonate you to commit a crime,” says Susan Grant, director of consumer protection at the Consumer Federation of America.
You encounter problems with your medical insurance. You go in for a medical procedure and are informed that it won’t be covered by your insurance because it’s already happened. Or, more commonly, you receive bills for medical treatments that you never had, in which case someone used your identity and insurance to receive medical treatment.

If you’re a victim of financial identity theft, the first thing to do is contact your bank or financial institution. You should then conduct a full audit of your personal finances and identify any questionable transactions. This information will be useful when it comes time to dispute the charges.

No matter what, the earlier you catch identity theft, the better—so stay vigilant.

For more ID Theft resources visit www.hvshred.com

Support the Hudson Valley Economy at the Dutchess County Fair

We typically use this weekly space to share the latest on identity theft resources. With the summer winding down and our favorite focus on supporting the community, this week we opt to use the space to encourage all within reasonable distance to attend the Dutchess County Fair.

According to Colleen Cruikshank’s article in the Poughkeepsie Journal, Aug. 21 is Opening Day for the 167th Annual Dutchess County Fair in Rhinebeck, NY. In her words, “The fair represents the classic summer experience for the young and young at heart, and we all look forward to creating new memories year after year. Indeed, following the catastrophic financial losses experienced last year due to tropical storm Irene, there is no doubt that participating vendors and our business community will do all that they can to maximize the opportunity for a fruitful week.

The Board of Directors of the Agricultural Society made the decision to honor tickets not used last year for all who missed the opportunity to attend. The goal is to make this year better than ever—so good it makes last year’s losses a distant memory.
As usual, there will be plenty of animals thanks to the 4-H groups who work tirelessly, all year long, to prepare for the fair. It will be another year to show their cows, sheep, goats, chickens, rabbits, horses, and so much more! The Salute to Agriculture Tent and the Horticulture Building have beautiful displays of local bounty. The milkshakes are divine. And, of course, the unique opportunity to visit the Birth Center to see the miracle of birth is not to be missed.

There will also be amazing artisans competing in the crafts, landscaping, photography, baking, and other art categories; also a good opportunity to find unique ideas and gifts.

The entertainment lineup includes Justin Moore, Chubby Checker, Lonestar, Starship (featuring Mickey Thomas), FMX Freestyle Motorcross Championship Series, and the ever-popular Championship Bull Riding … all will make for a great day/night out.
With good reason, the Dutchess County Fair is one of the most respected fairs in the country. We are so fortunate to enjoy it in our backyard. The success of the fairgrounds is vital to the economic success of our community, so it is up to us to help make this year the biggest Dutchess County Fair to date! Please visit www.dutchessfair.com for more information.

Look forward to seeing you there, and be sure to bring friends from our region and beyond.

Taking Stock of ID Theft Exposure

Borrowing again from the Identity Theft Resource Center, what follows is a valuable self-assessment of identity theft exposure. Take stock to see where you may be vulnerable and where you can improve. Inadequate security and poor business practices may open a company up to liability suits, fines and loss of clientele. While no one can totally prevent identity theft due to the human element of this crime, there are steps that a company can take to minimize the risk factors. Safe information handling practices are critical to keep identifying information out of the hands of thieves.

• Information acquisition — Is there a good reason for requesting the information that you gather? Is it really necessary? (A. Yes B. Don’t Know C. No)
• Information acquisition — Is the information acquired in a safe manner, so that it cannot be overhead or seen by others? (A. Yes B. Don’t Know C. No)
• Storage — Have computer security measures been placed around the systems storing personal data? Is there physical security for the data storage? Is the data considered highly classified and common access prevented? Do both physical security and network security prevent unauthorized access to the data? (A. Yes B. Don’t Know C. No)
• Access — Is personal identifying information available only to selected/qualified staff? Is database access audited and password controlled? (A. Yes B. Don’t Know C. No)
• Disposal —Do you know what goes into your dumpster? Are electronic and paper documents and databases containing personal information rendered unreadable prior to disposal? (A. Yes B. Don’t Know C. No)
• Distribution —Are personnel trained in the proper procedures regarding information disclosure? Do you prevent public display, use or exchange of personal information (especially Social Security numbers) in your workplace? Does this include employee or membership cards, timecards, work schedules, licenses or permits, and computer access codes? (A. Yes B. Don’t Know C. No)
• Personnel —Do you conduct regular background checks on ALL employees with access to identifying information? Does this include mailroom staff, cleaning crews, temp workers, and computer or hotline service techs. (A. Yes B. Don’t Know C. No)

If you have all “A’s” above, you are on the right track. If you have multiple “B’s” or “C’s”, you are probably vulnerable, and should take steps to understand how easy identity theft or data breaches might be, and how much it could cost your firm. Businesses that become victimized by thieves and opportunists can find themselves facing large liability civil suits as well loss of reputation.

For more resource on minimizing risk for identity theft please visit www.hvshred.com