Language Selection

English French German Italian Portuguese Spanish

Don't Let Data Theft Happen to You

Filed under
Security

ABOUT two weeks ago, I was alarmed by a phone message from my bank alerting me to some "unusual activity" on my debit card. Unusual wasn't the word. Someone had gone on a shopping spree - $556.46 and $650.81 at one store, $264.99 and $300 in charges that were pending at another - and none of it was mine.

My debit card was still in my wallet. I hadn't used it in days. The bank said thieves might have created a counterfeit card. Someone - a store clerk, waiter, whoever - could have used a card reader to harvest the information imbedded in the magnetic strip to create a fake one. The bank assured me the debit account was closed and the thieves no longer had access to my cash - but who could be sure? How much of my personal information did these thieves get?

Between bouts of tears and frantic phone calls to my bank, I became obsessed with what I might have done to prevent this.

UNFORTUNATELY, although there are steps you can take to protect yourself - and you should - there are no guarantees. "You cannot protect yourself completely," said Edmund Mierzwinski, consumer program director at the U.S. Public Interest Research Group in Washington. "The best thing you can do is react swiftly if it does happen."

Besides the standard advice to shred personal documents, following are some tips I found useful:

Full Article

Ironic

Ironic, an article about Identity theft requires me to willing give up some of my identity to read the article. Sure I could make up a user profile, or use bugmenot, but instead, I choose not to support them in any way, shape, or form. I don't need (at least yet) to show photo ID to purchase their overrated rag, why do I need the equivalent to read their stuff on-line?

re: yeah baby - here's the rest of it

¶Avoid letting your cards out of your sight. Do not let store clerks take your card away on the pretext that there's a "problem."

¶Restrict the access to your personal data by signing up for the National Do Not Call Registry (www.donotcall.gov); remove your name and address from the phone book and reverse directories - and, most important, from the marketing lists of the credit bureaus to reduce credit card solicitations. The site www.optoutprescreen.com can help.

¶Consider freezing your credit report, an option available in a growing number of states. Freezing prevents anyone from opening up a new credit file in your name (a password lets you gain access to it), and it doesn't otherwise affect your credit rating.

¶Protect your home computer with a firewall, especially if you have a high-speed connection.

¶Rein in your Social Security number. Remove it from your checks, insurance cards and driver's license. Ask your bank not to use it as your identification number. Refuse to give your Social Security number to merchants, and be careful even with medical providers. The only time you are required by law to give your number, Mr. Mierzwinski said, is when a company needs it for government purposes, like tax matters, Social Security and Medicare.

¶Curtail electronic access to your bank accounts. Pay bills through snail mail. Avoid linking your checking to savings. Use a credit card for purchases rather than a debit card. Although I was able to get all $1,772.26 reimbursed, I was lucky. While individual liability for fraudulent credit card purchases is only $50, it can be higher for debit cards: up to $500 or even all the money in your account in some cases.

These and other preventive steps may help, but people really can't safeguard their money and their data on their own. Robert Douglas, the chief executive of PrivacyToday.com, a privacy advocate, believes that this is not an issue of consumer responsibility but of corporate negligence. "These companies are trying to tell people it's their fault, but the largest breaches have been within the financial services industry itself," Mr. Douglas said.

Mr. Douglas and Mr. Mierzwinski say that shredding documents is fine, but calling your state and local representatives is better. "Companies have refused to give consumers control over their financial DNA and they've refused to take responsibility for their actions," Mr. Mierzwinski said. "What will stop identity theft are stronger notification laws and stronger penalties, which we don't have now."

----
You talk the talk, but do you waddle the waddle?

yeah baby...

My thoughts exactly...from the ny times to a myriad of others...I simply refuse and write them to 'splain why. and we wonder why we end up on so many mailing lists and get so much spam. Oh, we won't sell your information. yeah right.

helios

re: ironic

I'm sorry guys, I forgot that it was sign up for site. Sad I usta try to post the whole thing and just give it a "source" link, but I got to where I forget which ones is which now. Sorry. I used to hate that too!!! But I signed up with a few of them since starting this site.

----
You talk the talk, but do you waddle the waddle?

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Security: Uber, Replacing x86 Firmware, 'IoT' and Chromebook

  • Key Dem calls for FTC to investigate Uber data breach

    A key Democrat is calling on the Federal Trade Commission (FTC) to investigate a massive Uber breach that released data on 57 million people, as well as the company's delay in reporting the cyber incident.

  • Multiple states launch probes into massive Uber breach
  • Replacing x86 firmware with Linux and Go

    The problem, Minnich said, is that Linux has lost its control of the hardware. Back in the 1990s, when many of us started working with Linux, it controlled everything in the x86 platform. But today there are at least two and a half kernels between Linux and the hardware. Those kernels are proprietary and, not surprisingly, exploit friendly. They run at a higher privilege level than Linux and can manipulate both the hardware and the operating system in various ways. Worse yet, exploits can be written into the flash of the system so that they persist and are difficult or impossible to remove—shredding the motherboard is likely the only way out.

  • Connected sex-toy allows for code-injection attacks on a robot you wrap around your genitals

    However, the links included base-64 encoded versions of the entire blowjob file, making it vulnerable to code-injection attacks. As Lewis notes, "I will leave you to ponder the consequences of having an XSS vulnerability on a page with no framebusting and preauthed connection to a robot wrapped around or inside someones genitals..."

  • Chromebook exploit earns researcher second $100k bounty
    For Google’s bug bounty accountants, lightning just struck twice. In September 2016, an anonymous hacker called Gzob Qq earned $100,000 (£75,000) for reporting a critical “persistent compromise” exploit of Google’s Chrome OS, used by Chromebooks. Twelve months on and the same researcher was wired an identical pay out for reporting – yes! – a second critical persistent compromise of Google’s Chrome OS. By this point you might think Google was regretting its 2014 boast that it could confidently double its maximum payout for Chrome OS hacks to $100,000 because “since we introduced the $50,000 reward, we haven’t had a successful submission.” More likely, it wasn’t regretting it at all because isn’t being told about nasty vulnerabilities the whole point of bug bounties?
  • Why microservices are a security issue
    And why is that? Well, for those of us with a systems security bent, the world is an interesting place at the moment. We're seeing a growth in distributed systems, as bandwidth is cheap and latency low. Add to this the ease of deploying to the cloud, and more architects are beginning to realise that they can break up applications, not just into multiple layers, but also into multiple components within the layer. Load balancers, of course, help with this when the various components in a layer are performing the same job, but the ability to expose different services as small components has led to a growth in the design, implementation, and deployment of microservices.

Lumina 1.4 Desktop Environment Debuts with New Theme Engine and ZFS Integrations

Lumina 1.4.0 is a major release that introduces several new core components, such as the Lumina Theme Engine to provide enhanced theming capabilities for the desktop environment and apps written in the Qt 5 application framework. The Lumina Theme Engine comes with a configuration utility and makes the previous desktop theme system obsolete, though it's possible to migrate your current settings to the new engine. "The backend of this engine is a standardized theme plugin for the Qt5 toolkit, so that all Qt5 applications will now present a unified appearance (if the application does not enforce a specific appearance/theme of it’s own)," said the developer in today's announcement. "Users of the Lumina desktop will automatically have this plugin enabled: no special action is required." Read more

today's leftovers

  • qBittorrent 4.0 Is a Massive Update of the Open-Source BitTorrent Client
    qBittorrent, the open-source and cross-platform BitTorrent client written in Qt for GNU/Linux, macOS, and Windows systems, has been updated to version 4.0, a major release adding numerous new features and improvements. qBittorrent 4.0 is the first release of the application to drop OS/2 support, as well as support for the old Qt 4 framework as Qt 5.5.1 or later is now required to run it on all supported platforms. It also brings a new logo and a new SVG-based icon theme can be easily scaled. Lots of other cosmetic changes are present in this release, and the WebGUI received multiple enhancements.
  • FFmpeg Continues Working Its "NVDEC" NVIDIA Video Decoding Into Shape
    Earlier this month the FFmpeg project landed its initial NVDEC NVIDIA video decoding support after already supporting NVENC for video encoding. These new NVIDIA APIs for encode/decode are part of the company's Video Codec SDK with CUDA and is the successor to the long-used VDPAU video decoding on NVIDIA Linux boxes. That NVDEC support has continued getting into shape.
  • Kobo firmware 4.6.10075 mega update (KSM, nickel patch, ssh, fonts)
    A new firmware for the Kobo ebook reader came out and I adjusted the mega update pack to use it. According to the comments in the firmware thread it is working faster than previous releases. The most incredible change though is the update from wpa_supplicant 0.7.1 (around 2010) to 2.7-devel (current). Wow.
  • 3.5-inch Apollo Lake SBC has dual mini-PCIe slots and triple displays
    Avalue’s Linux-friendly, 3.5-inch “ECM-APL2” SBC features Apollo Lake SoCs, 2x GbE, 4x USB 3.0, 2x mini-PCIe, triple displays, and optional -40 to 85°C. Avalue’s 3.5-inch, Apollo Lake based ECM-APL single-board computer was announced a year ago, shortly after Intel unveiled its Apollo Lake generation. Now it has followed up with an ECM-APL2 3.5-incher with a slightly different, and reduced, feature set.
  • 7 Best Android Office Apps To Meet Your Productivity Needs
    Office application is an essential suite that allows you to create powerful spreadsheets, documents, presentations, etc., on a smartphone. Moreover, Android office apps come with cloud integration so that you can directly access the reports from the cloud, edit them, or save them online. To meet the productivity need of Android users, the Play Store offers an extensive collection of Android office apps. But, we have saved you the hassle of going through each one of them and provided you a list of the best office apps for Android. The apps that we have picked are all free, although some do have Pro version or extra features available for in-app purchases. You can also refer to this list if you’re looking for Microsoft Office alternatives for your PC.

Servers and Red Hat