FBI helps navigate malware scare

Our goal at HV Shred is to help the community increase all avenues of security—including safe web browsing.  Here is the latest on a what the FBI is calling a malware scare:

Domain Name System (DNS) is an Internet service that converts user-friendly domain names, such as www.fbi.gov into numerical addresses that allow computers to talk to each other.  Without DNS and the DNS servers operated by Internet service providers, computer users would not be able to browse web sites, send e-mail, or connect to any Internet services.

Criminals have infected millions of computers around the world with malware called DNSChanger which allows them to control DNS servers.  As a result, the cyber thieves have forced unsuspecting users to fraudulent websites, interfered with their web browsing, and made their computers vulnerable to other kinds of malicious software.

To check if your computer is affected, go to http://www.dns-ok.us/ 

The page will tell you if it thinks your computer is looking up servers correctly. 

That’s not the end-all though. 

A few other steps that should be followed for computer safety regardless of threats.

1. Make sure your Windows Security Updates are up to date (if you have not installed windows updates in a while, it is recommended you do so.  If you’re not comfortable looking at the messages that come up on your computer, go to this web site: http://www.update.microsoft.com and check for updates.

2. Make sure all your plug-in programs are up to date.  This includes Flash, Java, Acrobat, etc.  If you have updates pending, you typically will see an icon on the start bar on the right side that will detail that you have updates from one of these programs.  You can also go on the web to check if you have the latest updates at www.adobe.com and www.java.com

3. As always, keep an eye out for suspicious pop-ups, ads, and other messages that appear out of place.  If you’re not sure about a window pop up, make sure you use the x at the top right of the window to close it.  That will keep programs from running anything malicious. 

Even if you were to be infected, after all of that, the problem is quickly solved by running a scan program that finds and removes it, but if your virus software is up to date, run a manual scan to ensure it’s clean. 

HV Shred is here to help—visit www.hvshred.com

Securely destroy your hard drives ON-SITE

Data destruction includes confidential paperwork as well as hard drives and electronic equipment.  Read on to learn about the best options:
WHY PHYSICALLY DESTROY OBSOLETE HARD DRIVES?
  • Many of the programs available for sanitizing a hard drive do not completely wipe the data from the drive.
  • The software used may leave traces of data or just delete the directories leaving whole blocks of information behind.
  • If the platter is left in tack that data could be accessed.
  • There is also the threat of someone using reconstruction software on your old hard drive–software that will recover and restore any data left behind on a computers hard drive.

 WHY ON-SITE?

Destroying hard drives at your location enables you to witness the actual process. The serial number of the hard drive is recorded and a certificate of destruction is provided for your records.

 Using our mobile crushing device, we physically destroy the hard drive. The equipment we use renders the hard drive useless by bending the platter, crushing the read / write head and damaging the circuit board. After physical destruction we insure your destroyed hard drive is disposed of in an environmentally safe and ethical manner.

 THE SECURE PROCESS IN MORE DETAIL:

  • During the crushing operation, the hard drive motor and spindle were broken away from the frame and smashed (along with the platters) into the top cover, warping the platters in many different directions, but giving it an overall shape that looks like the letter C.
  • During crushing, the hard drives tend to fold over into a C shape or a tulip shape. Along the strongest fold lines the platter is deformed so sharply that the surface and magnetic coating develop thousands of fractures.
  • Aside from various scrapes, dents, dimples and gouges, platters are made unreadable by:
    • Large deformations of the platter that are impossible to straighten out.
    • Thousands of microscopic bumps and valleys in the surface of the platter caused by stretching or compressing the metal.
    • Thousands of fractures in the magnetic media.
  • In short, even if the platter could magically be made perfectly flat again (which it can’t) the surface integrity has been completely obliterated and the data destroyed.

 

For more information visit https://www.hvshred.com/why-shred/hard-drive-destruction/

Living Green Symposium-Smart Water Management

As the Chair for the Dutchess Chamber’s Living Green Committee, it is my pleasure to encourage one and all to help us celebrate Earth Day 2012 with our 2nd annual Living Green Symposium to be hosted at the Beacon Institute for Rivers and Estuaries Center for Environmental Innovation and Education (CEIE) on the grounds of the Hudson Highlands State Park. The event is free and open to the public, but seats are limited.

Our keynote speaker is NYS Comptroller Thomas DiNapoli and we will be focusing on Smart Water Management with two panels; The first panel includes Barbara Kendall from Kendall Stormwater Services, Emily Vail a Watershed Outreach Specialist from NYS Department of Environmental Conservation, Perry Hartswick a distinguished engineer and Chief Architect at IBM, Jeff Econom the director of Municipal Engineering from The Chazen Companies. The second panel includes real life case studies from local businesses making good on going green and saving green: Garret Dyal from Adams Fairacre Farms, Skip Roberts from Omega Institute, and Margery Groten from Scenic Hudson and Vinny Lander from QuEST. Michael Weddell, CPA will also be among the panelists to highlight tax incentives related to green practices.

The event runs 8am-noon Tuesday, April 24th and again, it’s free to the public but will fill up. To register visit www.dcrcoc.org. More details Event brochure
 http://campaign.r20.constantcontact.com/render?llr=ugg89ydab&v=001cNWX07JYSkTQ9OgtIZSUCIdoX6KPFYPYITER2tLF7cqUaqJhWuv89grlg19HvevnnLiodQZZB1PqRyrLbKszoAjEAj8TSdn5jqYtbsUVkOVBkWpUogT5hW9gmY18PghI–Ucl6-RppaPAtoOKHrx-0FIhVTWp_2MXuk6oxQVDfaKA8gULrC6m97yOveAFJzdTTX8FRSQr-T5oU3POhKF6kQ8fTFREwmsDWhrvPHkAHIDXkBFhTXpRv5Lh0idMhh9U6Tm0x5cULBqSHH34GrAQUGeCv00YotuThd3vLGQfK4%3D

Safe ATM Choices are Key

In a recent USAA article, Stacy Cowley, tech editor for CNNMoney shared her nightmare of being a 6 time survivor of identity theft. The central message she imparted was the importance of using big, reputable, well-fortified cash machines.

Seems like the culprit for the majority of her ID Theft experiences were sketchy ATMs, usually those conveniently located in corner delis. As she learned, thieves also like to use these non-bank ATMs; they rig them to capture your card number and PIN. As she says, “use these off-label machines enought times and you’re likely to get hit.”

Stacy’s advice: “Don’t panic!” While ID Theft is scary, in general, banks will immediately freeze your account and reissue a new credit or debit card with a new number. You also get a chance to dispute any transactions.

If your card is stolen, your maximum liability, in most cases, is capped at $50 as long as you report it timely. It’s still frustrating to be cut off from your financial lifelines.

Stacy also recommends keeping a few dollars in cash just in case–it took about a week for her to get reimbursed when her cash was wiped out.

Biggest take away–use bank ATM’s–they’re the least likely to be compromised. Thieves still go mostly for the easy hit–make it hard for them and you’ll have the best chance of staying out of range.

For more id theft prevention tips visit www.hvshred.com

Be wary: ID Theft is On the Rise Again

Unfortunately, ID theft appears to be on the rise again. According to Javelin, a leading research firm, in 2011, identity fraud increased by 13 percent. More than 11.6 million adults became victims of identity fraud in the United States, while the dollar amount stolen held steady. Their latest findings in a nutshell:

• Identity fraud incidents increased, amount stolen remained steady—The number of identity fraud incidents increased by 13 percent over the past year, but the dollar amount stolen remained steady. Additionally, consumer out-of-pocket costs have decreased by 44 percent since 2004, likely due to the improved prevention and detection tools that have come available as well as fraud alerts leading to reduced detection time.
• Social behaviors put consumers at risk—For the first time, Javelin examined social media and mobile phone behaviors and identified certain social and mobile behaviors that had higher incidence rates of fraud than all consumers. Despite warnings that social networks are a great resource for fraudsters, consumers are still sharing a significant amount of personal information frequently used to authenticate a consumer’s identity. Surprisingly those with public profiles (those visible to everyone) were more likely to expose this personal information. Specifically, 68 percent of people with public social media profiles shared their birthday information (with 45 percent sharing month, date and year); 63 percent shared their high school name; 18 percent shared their phone number; and 12 percent shared their pet’s name—¬all are prime examples of personal information a company would use to verify your identity.
• Smartphone owners experience greater incidence of fraud—The survey found seven percent of smartphone owners were victims of identity fraud. This is a 1/3rd higher incidence rate compared to the general public. Part of this increase may be attributable to consumer behavior: 32 percent of smartphone owners do not update to a new operating system when it becomes available; 62 percent do not use a password on their home screen—enabling anyone to access their information if the phone is lost; and 32 percent save login information on their device
• Data Breaches increasing and more damaging — One likely contributing factor to the fraud increase was the 67 percent increase in the number of Americans impacted by data breaches compared to 2010. Javelin Strategy & Research found victims of data breaches are 9.5 times more likely to be a victim of identity fraud than consumers who did not receive such a data breach letter.

We share this information to encourage all to be wary of vulnerable areas. For more information and resources, visit www.hvshred.com

ID Theft Still Top Complaint at FTC

The Federal Trade Commission recently released its list of the top consumer complaints received by the agency in 2011. For the 12th year in a row, identity theft complaints topped the list. Of more than 1.8 million complaints filed in 2011, 279,156 or 15 percent, were identity theft complaints. Nearly 25 percent of the identity theft complaints related to tax- or wage-related fraud.

The report breaks out complaint data on a state-by-state basis and also contains data about the 50 metropolitan areas reporting the highest per capita incidence of fraud and other complaints. In addition, the 50 metropolitan areas reporting the highest incidence of identity theft are noted.

The next nine complaint categories are Debt Collection; prizes, sweepstakes, and lotteries; shop at home and catalogue sales; bank and lenders; internet services; auto related complaints; imposter scams; telephone and mobile services; and advance-fee loans and credit protection/repair.

The FTC enters complaints into Consumer Sentinel, a secure, online database available to more than 2,000 civil and criminal law enforcement agencies in the United States and abroad. Enforcers search the database to research cases, track targets, and identify victims.

“The FTC’s Consumer Sentinel Network is an incredibly powerful tool for law enforcers who are working to protect consumers and go after the bad guys,” said David Vladeck, Director of the agency’s Bureau of Consumer Protection. “It’s used by agencies across the country and around the world to enhance their enforcement efforts.”

Other federal and state law enforcement agencies contribute complaints to the Consumer Sentinel Network, including the U. S. Postal Inspection Service, the Department of Justice’s Internet Crime Complaint Center, and the Offices of the Idaho, Michigan, Mississippi, North Carolina, Ohio, Oregon, Tennessee, and Washington Attorneys General. Private-sector organizations that contribute complaints include all U.S. and Canadian members of the Better Business Bureau, Western Union and Moneygram, and the Lawyers Committee for Civil Rights Under Law.

According to Richard Cordray, Director of the newly created Consumer Financial Protection Bureau, “The Consumer Sentinel Network is a treasure trove of information for law enforcers.”

The Federal Trade Commission works for consumers to prevent fraudulent, deceptive, and unfair business practices and to provide information to help spot, stop, and avoid them. To file a complaint in English or Spanish, visit the FTC’s online Complaint Assistant or call 1-877-FTC-HELP (1-877-382-4357). The FTC enters complaints into Consumer Sentinel, a secure, online database available to more than 2,000 civil and criminal law enforcement agencies in the U.S. and abroad.

Announcing the Shred Event Schedule for 2012

Thanks again to all our partners for Shred Events in 2011

Over the course of the 2011 events in conjunction with the Hudson Valley Federal Credit Union (HVFCU), Walden Federal Savings (Now Hometown Bank of the Hudson Valley), Wallkill Valley Federal Savings, Mid Hudson Valley Federal Credit Union we are thrilled to have helped community members recycle over 30 tons of paper, saving over 500 trees and 90 cubic yards of landfill.

Announcing the schedule for 2012:

Friday, April 13,  HVFCU Hyde Park Branch 9:00 am – 12:00 pm

Tuesday, April 24, Adriance Memorial Library Poughkeepsie 9:00 am-11:00 am

Tuesday, April 24, HVFCU Pleasant Valley Branch  2:00 pm -5:00 pm

Thursday, May 10, HVFCU Civic Center Branch  8:30 am – 11:30 pm

Friday, May 25, HVFCU New Windsor Branch 9:00 am – 12:00 pm

Friday, June 8, HVFCU Beacon Branch 9:00 am – 12:00 pm

Saturday, June 9, Hometown Bank of the Hudson Valley Monroe Branch 9am-12:00 pm

Tuesday, June 26, HVFCU Carmel Branch 2:00 pm -5:00 pm

Friday, July 13, HVFCU Middletown Branch 9:00 am – 12:00 pm

Monday, July 16, HVFCU Highland Branch 2:00 pm -5:00 pm

Friday, August 3, HVFCU Newburgh Branch 9:00 am – 12:00 pm

Tuesday, August 14, HVFCU Hollowbrook Branch 9:00 am – 12:00 pm

Tuesday, September 11, HVFCU Fishkill Branch 2:00 pm -5:00 pm

Thursday, October 4, HVFCU Montgomery Branch 2:00 pm -5:00 pm

Saturday, October 6, Hometown Bank of the Hudson Valley Walden Branch 9:00 am- 12:00 pm

Tuesday, October 16, HVFCU Brewster Branch 9:00 am – 12:00 pm

Friday, October 19, HVFCU Poughkeepsie HQ 9:00 am- 12:00 pm

Tuesday, October 23, HVFCU Kingston 9:00 am- 12:00 pm

Your financial institutions and towns are the most likely to sponsor the shred events, so please suggest they contact us for more information about scheduling an event.  Contact Judith @ judith@hvshred.com (845) 705-7279

Identity Theft is Still Largely Low Tech

Many people still feel protected from identity theft as long as they stay off the internet. This week’s post is a reminder that much of identity theft is still low tech. It’s dumpster diving and, in this case, capitalizing on low security in a health provider’s facility.

The message is we need to be vigilant of our paperwork at all times. We need to do things like keep and eye on the mail box, shred personally identifying information, and keep our fiduciaries on the ball as well. The latter is harder than the former since it involves a perhaps uncomfortable interaction with those we trust–still, we need to make sure our doctors, accountants, financial planners and everyone else we entrust with our personal information are also taking steps to protect us.

Here’s is the cautionary tale:
Chelsea Catherine Stewart of Birmingham, Alabama has been sentenced for 39 months for wrongfully obtaining individually identifiable health information. She also plead guilty to attempted bank fraud and aggravated identity theft.

This may seem like another story about a health care worker stealing patient information. But this one is a bit different. Chelsea was visiting a friend at Trinity Medical Center. When there was no one monitoring the patient files, she helped herself and copied the information of patients down.

This is what we call low tech hacking. It is the basic steps like locking files and shredding that must be taken to protect information.

For more information on how HV Shred can help please visit www.hvshred.com

Caller ID Spoofing-Be wary

At HV Shred, we use our blog to educate the community about the latest scams.  Caller ID Spoofing is far from being a “funny ha ha” spoof.  It could be a serious attack on your personal information.  How does it work?  A Caller ID Spoofer logs on to one of several websites that enable them to create an account by paying a small fee–the account allows them to enter a name and a number they want to pretend to be calling from–a bank–a credit union–some entity we are inclined to trust.

When we see the trusted name on our caller ID, we pick up the phone feeling as if we know with whom we are speaking–lulled into a false sense of confidence, we share personally identifying information. 

What to do?  Never give personal information over the phone on a call you don’t initiate.  If you are contacted by a financial institution or similar, hang up and call the number you know directly.  Better safe than sorry.

Be sure also to let you financial institution know if someone is spoofing them–they want to weed these hacks out even more than you–they are costing us all a lot of money and frustration.

For more on identity theft protection, please visit www.hvshred.com

Valentine’s Scams Threaten ID Theft

In this season of Valentine’s and budding romances, we just want to help make everyone aware of a scam found to be more and more prevalent by The Internet Crime Complaint Center (a private/public partnership established to deter/detect/and defend again identity theft.  The IC3 has warned the public to be wary of romance scams in which scammers target individuals who search for companionship or romance online. Scammers search chat rooms, dating sites, and social networking sites looking for victims. The principal group of victims is over 40 years old and divorced, widowed, elderly, or disabled, but all demographics are at risk.

Scammers use poetry, flowers, and other gifts to reel in victims, the entire time declaring their “undying love.” These criminals also use stories of severe life circumstances, tragedies, deaths in the family, injuries to themselves, or other hardships to keep their victims concerned and involved in their schemes. Scammers also ask victims to send money to help overcome a financial situation they claim to be experiencing. These are all lies intended to take money from unsuspecting victims.

Victims who have agreed to meet in person with an online love interest have been reported missing, or injured, or in one instance, deceased. IC3 complainants most often report the countries of Nigeria, Ghana, England, and Canada as the location of the scammers. If you are planning to meet someone in person that you have met online, the IC3 recommends using caution, especially if you plan to travel to a foreign country, and, at the very least:

  • Do not travel alone.
  • Read all travel advisories associated with the countries you will visit. Travel advisories are available at http://travel.state.gov/.
  • Contact the United States Embassy in the country you plan to visit.

Even though it seems to be contrary to the thought of starting a new romance, do not be afraid to check a new acquaintance’s story online. Remember, like most fraudulent schemes, scammers use whatever personal information you provide to quickly paint themselves as your perfect match. If your new friend’s story is repeated through numerous complaints and articles on the Internet, it is time to apply common sense over your feelings. To obtain more information on romance scams and other types of online schemes, visit www.LooksTooGoodToBeTrue.com. Anyone who believes they have been a victim of this type of scam should promptly report it to the IC3’s website at www.IC3.gov.

HV Shred, Inc is proud to be a resource, so please also check out www.hvshred.com for more information.