![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
A Personal Experience with Identity Theft
Some months ago, before there was much publicity regarding phishing and identity theft, I became a victim. My first inkling that I'd been scammed came from a telephone call from my bank asking if I had been to Italy or Roumania. Of course I had not. I was informed by the bank that a number of charges for hotel bills and cash withdrawals had been made from my account.Thieves had made a counterfeit Debit Card with which to rifle my account. I had in the vicinity of $1900.00 in the account so I had to have the bank transfer enough from my savings to cover these charges, so as not to have my other checks "bounce". We closed the old account and opened a new one. At first I could not imagine how it happened, then I remembered. I've been an eBayer for several years and I use Paypal frequently. Some weeks previously I had received e-mail from eBay stating that there were some attempts to fraudulently access my account and they wanted to verify my account information. They said the matter was urgent and if I didn't respond promptly my account would be suspended. I thought this was a bit odd, so I clicked on several links to see if it was a legitimate message and the links worked so I complied with the request. The result was that my checking account was cleaned out. Since then I have found out ways to verify whether these messages are bogus or not. If you visit my web site http://www.caveatemptorus.com you will find detailed information in this regard. Checking a few links is not sufficient to verify the validity of a document. Here in a nutshell is the best way to avoid this type scam: DO NOT ANSWER ANY E-MAIL asking for personal financial data.EBay, Paypal, banks and other institutions never use e-mail for such purposes. If you are concerned about your accounts initiate the contact yourself, then you'll know you're dealing with the right party. NEVER GIVE YOUR PIN NUMBER to anyone for any reason. The only purpose it has is to relieve you of your money. Merchants don't need it when you make purchases. DO NOT USE DEBIT CARDS or your checking account for online or phone transactions, in spite of Paypal's inducements. Use a consumer protected Credit Card. You have much better protection. I recovered my money from the bank as this was a case of fraud, but it took several months. Since then I have received any number of similar messages, purportedly from eBay and Paypal. You can forward them to www.spoof@ebay.com for verification. All the ones I sent were bogus. By: George W. Cannata You have permission to publish this aticle in its entirety without changes and it must contain all links and credits to the author.
MORE RESOURCES: Large Language Models Pose Growing Security Risks The Wall Street Journal Europe Vows to Step Up Baltic Sea Security After a New Cable Break The New York Times UK minister met Chinese turbine company amid security concerns POLITICO Europe Protector app provides on-demand armed security ABC7 Los Angeles Electric infrastructure security measure updated Unicameral Update HackerOne Debuts New Way to Quantify Security Value Channel Insider The Jones Act : A disastrous legacy for the U.S. economy and security Pacific Legal Foundation (PLF) Elon Musk’s Private Security Are Now Special Deputies The Daily Beast Remarks at a UN Security Council Briefing on the Democratic Republic of the Congo United States Mission to the United Nations Jen Easterly, Director of the Cybersecurity and Infrastructure Security Agency (CISA), Steps Down HSToday EU Moves to Enhance Undersea Cable Security as Sweden Looks at New Incident - The Maritime Executive EU Moves to Enhance Undersea Cable Security as Sweden Looks at New Incident The Maritime Executive Russia Recommends Increased Port Security Citing Threat from NATO The Maritime Executive US Marshals Service deputizes Musk’s private security detail: Reports Straight Arrow News ThreatLocker® launches new solutions, further advances Zero Trust security resilience and adoption Yahoo Finance DOE layoffs weaken security, economic growth: “Forget American energy dominance” Federal News Network Regional peace depends on Iran's security Tehran Times Whistleblower lawyer Mark Zaid on the Trump administration's move to revoke security clearances The Record from Recorded Future News Webinar: Learn How to Identify High-Risk Identity Gaps and Slash Security Debt in 2025 The Hacker News UN Security Council to Call on Rwanda to Pull Troops From Congo U.S. News & World Report Pennsylvania Treasury Bans Chinese AI Platform Over Security Concerns Franklin County Free Press Citrix Releases Security Fix for NetScaler Console Privilege Escalation Vulnerability The Hacker News Rep. Woolford on border security Michigan House Republicans Texada achieves top security certifications American Rental Association The Diplomatic Security Service is being targeted for firings. Why that matters: Analysis - ABC News Ukrainians are looking past NATO to a European security architecture Al Jazeera English How to secure Notes on iOS and macOS Help Net Security Menlo Security Acquires Votiro to Deliver Easy, AI-driven Data Security to Enterprises Business Wire Exabits partners with Phala Network to offer robust AI security with TEE-enabled infrastructure GlobeNewswire AI app DeepSeek banned on Pennsylvania treasury-issued devices over privacy, security concerns CBS News Apple pulls iCloud end-to-end encryption feature for UK users after government demanded backdoor TechCrunch OpenText unveils AI-powered threat detection and response capabilities Help Net Security EU seeks to strengthen underwater cable security in Baltic and Mediterranean Kathimerini English Edition Apple drops key ADP security feature in UK Mobile World Live ‘Golden ticket to job security’: Trade union partnerships hold promise for high school students Youth Today Second Take: ‘The Winter Soldier’ tackles American democracy and security The Stanford Daily DOGE access to Social Security, IRS data could create privacy and security risks, experts say The Record from Recorded Future News Tusk proposes 3-point plan to strengthen Ukraine, European security. Kyiv Independent ISC West 2025 Preview: Inside the Security Industry’s Premier Event Security Sales & Integration Unarmed, undertrained, at risk: Advocates for Hawaii’s private security guards want change Hawaii News Now Venture capital firm Insight Partners faces security breach Security Magazine ID-Pal, Facephi join influential payments, security groups Biometric Update Google Ad-Tech Users Can Target National Security ‘Decision Makers’ and People With Chronic Diseases WIRED Retired doctor and courthouse security deputy seeking Belvidere Township 'CEO' job Northern Public Radio (WNIJ) |
![]() |
![]() |
![]() |
RELATED ARTICLES
Be Aware of Phishing Scams! If you use emails actively in your communication, you must have received various messages claiming to be from Ebay, Paypal and a number of banks. A recent email as if from U. Money Mule Email Scam Hits U.S. Imagine this - you open up your email box and an international company is offering you a dream job - you can be an agent for them - a financial intermediary - receiving payments for them and transferring money to them, and, naturally, keeping a commission on each transaction.There's no investment, no money required. What Every Internet Marketer Should Know About Spyware If you run any type of Internet business, Adware and Spyware can be a very serious issue. These programs hide themselves on your computer and do all sorts of annoying and potentially dangerous things. Is Spyware Watching You? Imagine my surprise when I received a phone call from afriend who told me he'd been the victim of a "spyware"attack that left him shaking at his loss of privacy.I listened to his horror story with a sympathetic ear, butI felt secure since I carry anti-virus software and afirewall (both by Norton). 8 Surefire Ways to Spot an E-Mail Identity Theft Scam! The E-Mail Identity Theft Scam is running Rampant. These E-Mail Scam artists will go to great lengths to Get Your Bank Account information and Steal your Identity. 5 Simple Steps to Protect your Digital Downloads A couple of days ago, I was searching for a popular eBook online. Now I'm not going to tell you the name of this eBook for reasons you'll understand in the next few minutes. Lets Talk About Antivirus Software! Nowadays more and more people are using a computer. A lot of them use it at their work place, but an increasing number of computer users have also discovered the need to have a computer at home. Just Whos Computer is this Anyway? Well, this is an article I never thought I would have to write. Computer ownership was just not something I thought people would get confused over but, after overhearing a number of conversations last week from my co-workers, I realized that quite a few people just don't know how cut and dry this topic is. The Risk Of Electronic Fraud & Identity Theft Electronic Fraud and Identity Theft-----------------------------------Human beings are pretty sensible when presented with an imminent threat or risk. That is, if it's staring us directly in the face. Why Corporations Need to Worry About Phishing Phishing is a relatively new form of online fraud that focuses on fooling the victim into providing sensitive financial or personal information to a bogus website that bears a significant resemblance to a tried and true online brand. Typically, the victim provides information into a form on the imposter site, which then relays the information to the fraudster. Secrets On Security: A Gentle Introduction To Cryptography Let us take the example of scrambling an egg. First, crack the shell, pour the contents into a bowl and beat the contents vigorously until you achieved the needed result - well, a scrambled egg. Phishing, Fraudulent, and Malicious Websites Whether we like it or not, we are all living in the Information Age. We have nothing left but adapt to rapidly developing information technology, no matter who we are and what we do for living. Its War I Tell You! There are ways to insure security though. You can get the Windows Update CD from Microsoft and install that before you get online, You can also get most Antivirus Definitions downloaded and save them to disk, then install those before you go online, (of course you have to be using that Product in the first place), and you can get Anti-Spyware on a disk and do the same. Mail Forwarding - Why Would You Do It? First of all we need to get some terms stated. I have been in the business for just over two years and there is still some confusion over the topic. Reporting Internet Scams When it comes to reporting Internet scams most of us either don't have a clue who to contact or just ignore them in our email. But according to an FBI report in December 2004, nearly ten million people last year didn't ignore them and fell for the latest Internet scams. Protect Your Little Black Book The movie Little Black Book features a young woman, Stacy, who is frustrated when her boyfriend refuses to share information about his past relationships. When his PDA, a Palm Tungsten C, falls into her hands, she is faced with a conundrum. Securities NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a strong partnership to keep information safe and secure. It is important for people who spend time surfing the web to understand much of the information given out is easily accessible by individuals who desire to eavesdrop on the data. Computer-Virus Writers: A Few Bats In The Belfry? "Male. Obsessed with computers. Keeping Worms Out of Your Network... No auntie Sookie, not earth worms, computer virus worms that can get to you computer and slowly dig deep into your files and eat them away. Put that eggnog down and I'll tell you some more about these new worms. Is That Free Stuff Like An iPod Or Desktop Computer Really Free? Have you seen the web site, www.freestuff. ![]() |
home | site map |
© 2006 |