We are currently looking for an Official SelfGrowth.com Guide to "Identity Theft". If you have expertise in Identity Theft and your own website and/or product for this topic, please review this form for complete details. The Official Guide Position is part of our Premium Placement Package
Are you a shredder? I hope so. No identity thief on this planet is going to want to attempt to reconstruct cross-shredded documents.
So what, then, should you make a habit of shredding?
All financial documents and information, including financial information you’ve jotted on a ... Views: 842
There are a number of ways that you can protect yourself online, and one of the things you can do is to start using two-factor authentication.
You probably have seen two-factor authentication even if you aren’t sure what it is. For instance, if you do online banking, your bank might ... Views: 842
If you looked at a photo of a baby boy, could you ever predict that he would grow up to become a sexual predator? Probably not. However, a study shows that men who commit sexual crimes are more likely to have something called an “anxious attachment” to their mothers due to feeling ... Views: 841
Companies have been struggling for years to keep cyber-attacks at bay. Cyberthieves are working faster than ever before to send out their malicious attacks, and it’s become increasingly difficult for companies to keep up.
CNN reports that almost one million malware strains are ... Views: 839
Quest Diagnostics is a US-based company that provides medical testing services, and announced that it used third-party billing collection companies that were hit by a severe data breach. In fact, about 11.9 million Quest customers were affected.
The compromised information could include ... Views: 839
September is almost over. This means National Preparedness Month is nearing its end. Nevertheless, you must be prepared all year long to stay safe. National Preparedness Month culminates September 30th with National PrepareAthon Day.
In the boxing ring, if you focus on the knockout ... Views: 839
Back in August, 2016, Kala Brown and Charles Carver arrived to a 100-acre property in South Carolina for a cleaning job. Charles Carver never made it off the property, and Kala Brown spent more than two months in a metal shipping container, allegedly held captive by Todd Christopher ... Views: 839
Ever consider the possibility that a person gets a job as a bank teller…for the sole purpose of stealing a patron’s identity?
Do you realize how easy this would be?
No techy hacking skills required.
No gun required.
So we’ve all been instilled with fear of our bank ... Views: 838
Scams targeting older people are probably very under-reported, as seniors don’t want to appear senile. The most vulnerable group is educated men over 55, because, quite frankly, they think they know everything.
Sweepstakes/Lottery
This scam comes in many forms, but the common ... Views: 838
Most people have heard of storing information in “the cloud,” but do you know what this means, and if it is even safe?
A cloud is basically a network of servers that offer different functions. Some of these servers allow you to store data while others provide various services. The ... Views: 838
Have you ever seen a house and thought…I wish I could afford that? Some people actually try it, but let this story be a lesson learned: if you can’t afford the cost of a house, you probably shouldn’t try to buy it.
Pamela Chandler was arrested and now faces forgery charges ... Views: 837
Every time you have a medical procedure done, including routine checkups and treatment for minor issues, paperwork is generated. You should have copies of every single paper. This is one line of defense against medical identity theft.
Review your paperwork thoroughly for unauthorized or ... Views: 837
When it comes to tossing into the rubbish your old computer device, out of sight means out of mind, right? Well yeah, maybe to the user. But let’s tack something onto that well-known mantra: Out of site, out of mind, into criminal’s hands.
Your discarded smartphone, laptop or ... Views: 836
Are you a small business? Do you know your business’s credit score? The range is zero to 100 for most credit reporting agencies, with at least 75 being desirable if you want to be approved for financing and trade credit (business loan or line of credit), says a report at nav.com and from ... Views: 835
Many, including me, have reported for years about all the “work at home” scams. And frankly, there are still plenty out there, unless you know where to look. There has never been more opportunity to legitimately earn a living working at home, and NOT get scammed.
Mothers with ... Views: 835
Hackers are making a lot of money thanks to phishing attacks these days, and now they are also focusing on gift card scams. One of the most notorious scam groups, Scarlet Widow, which is out of Nigeria, has been boosting its efforts to scam people with gift cards since 2015. This group generally ... Views: 834
Have a small business? Great. Have two-factor authentication for your accounts? If you’re not sure of the answer to that question, you could be in trouble. October is National Cyber Security Awareness Month, the perfect time to learn more about cyber security. As a small business owner, ... Views: 834
If you reach your hand to a strange dog loose on the street to pet it on top of the head, and it mauls your hand, whose fault is this? One camp would put most of the blame on the dog owner. But most people would blame the victim.
But everyone with half an ounce of sense would agree on one ... Views: 834
Let’s face it In today's digital world our work, personal life, and finances all have begun to gravitate towards the world of the internet, mobile computing, and electronic media. But, this widespread situation makes us prone to more vulnerabilities and risks than ever to malicious attacks, ... Views: 834
Does your wallet contain enough information about you for someone to steal your identity and commit crimes under your name? That’s what happened to Jessamyn Lovell when Erin Hart stole her wallet in 2011.
Hart shoplifted, checked into hotels and rented cars in Lovell’s name. Of all the ... Views: 833
As part of Gemalto’s #ChipAwayAtFraud campaign, I’m being tasked with numerous tasks, some tacky, some essential to living. Gemalto, one of the world’s leaders in digital security, wants a real-world take on the EMV card experience. Which includes the security benefits EMV ... Views: 832
Hey YOU, SMB, yeah I’m talking to you. There are a number of things that you can do to not only protect your personal information, but also the information you have in your business:
Hire a professional – It is entirely possible the small business was hacked because they did not ... Views: 831
If you have a home, you should be worried about burglars. Here are 44 home security tips that you can use to keep the burglars away:
Keep your doors locked all of the time.
Use a deadbolt on every door.
Don’t leave ladders outside.
Teach young kids NOT to answer the door.
Make ... Views: 831
Did you know that sometimes, the apps you use for your smartphone have access to your personal information and are capable of sharing it? Are you aware that your privacy can be invaded across the network board? That includes Twitter, Facebook, Instagram, LinkedIn, Google+ and more.
And how ... Views: 831
If you are like most people, there are several devices in your home that fight for WiFi connections at any given time. This slows your network, and gives you a shoddy experience. Instead, look into upgrading your system immediately and save some cash too.
The Nighthawk is a 2-in-1 cable ... Views: 829
Women should never take a ride from a stranger because it’s dangerous – unless she’s paying the driver???
Wrong, of course. Uber and Lyft drivers provide paid rides to strangers as requested via the Uber and Lyft apps.
As of August 2018 WhosDrivingyou.org tallied the number ... Views: 828
If you are the parent of a child or teen who uses the internet, here are some stats you need to know:
Stats About Teens and the Internet
Teens think that the internet is mostly private
They also think that they can make the best decisions for their life online
They believe they are safe ... Views: 828
Ever wonder how a water leak sensor actually works?
Water comes into contact with the sensor. The sensor makes and electrical contact and send a signal.
The sensor transmits a signal to a central station of sorts (kind of like how if extreme heat or a needle comes in contact with your ... Views: 826
As recent data breaches have shown, cyber attacks are particularly threatening to government entities handling sensitive data like Social Security numbers. Unfortunately, state agencies struggle to hire cybersecurity professionals.
The cause of this staffing shortage? There simply ... Views: 825
A well done New York Times article recently re-introduced this topic to the masses. Being “owned” isn’t new, but the term is not becoming part of popular culture. If you use the internet or are often on social media, odds are good that you have been OWNED. Whether you are ... Views: 824
Whether you’re driving long distance to make a career move, visit family/friends, or just sightsee multiple states, you may be wondering what kind of helpful applications for your phone are out there.
There’s just tons, and many fall under the category of convenience, such as apps ... Views: 824
With Cyber Monday, you don’t have to camp outside in the cold overnight so you can be the first person busting through the doors like on Black Friday. But you still may get trampled to a pulpby cyber scammers waiting for their prey.
How can you avoid these predators?
You know that ... Views: 824
After receiving medical treatment, many people never look over the paperwork (save for bill total) and just shove it into some folder in a file cabinet. But medical identity theft is very much out there; know the signs:
You’re denied coverage because you allegedly have a condition you ... Views: 824
Ever wonder just what happens to the data in a data breach incident? Does it go into some kind of wormhole in cyberspace, out through the other end? Well, the answer is pretty much so, when you consider that hacked data makes its rounds on a global scale, taking only 14 days to land in 22 ... Views: 824
Some people believe that monitoring your kids’ online activities crosses the line of privacy or trust. But monitoring and controlling online activities is, essentially, no different than controlling access to the cookie jar or TV or even locking a liquor cabinet.
Which brings me to a ... Views: 823
Consider a keychain for a moment. For most of us, a keychain holds all of our necessities such as home keys, car keys, work keys and even forgotten keys, that we aren’t quite sure what to do with. Now, think about this. What if your keychain had keys that look identical, but each key only ... Views: 823
Imagine getting a call from someone identifying themselves as a federal court official or U.S. Marshal, informing you that your arrest is imminent unless you pay a cost—all because you failed to respond to a jury summons (which you don’t remember getting). I’d like to think ... Views: 821
Pokémon Go has taken the world by storm, even though it is nothing more than a silly little game that people play on their mobile device. And it is not just child’s play, either. Plenty of adults are hooked on Pokémon Go—including college degreed professionals who ... Views: 821
Jeannette Tamayo was nine when she was abducted in June 2003, and exhibited a presence of mind that few adults would have in a similar circumstance.
Home from school, Jeannette entered her house, unaware that a man had been following her; he entered too, and that’s when the nightmare ... Views: 820
Most of us have no idea when a disaster is about to strike, and even if we do have a little warning, it’s very possible that things can go very wrong.
This is where you can put a business continuity plan to good use. What does this do? It gives your business the best odds of success ... Views: 820
Guess who may be compromising the security of your Social Security Number.
The Social Security Administration!
Yep, that’s right. Did you know that 66 percent of the mail the SSA sends out contains someone’s Social Security number? This is what the inspector general of the SSA, ... Views: 820
In a recent Wired.com expose’, they expose how the FBI has been secretly hacking civilian computers for about 20 years, but thanks to Rule 41, their ability to hack has been expanded.
Nevertheless, effective record keeping for these hacking incidents doesn’t exist. For instance, ... Views: 820
Wow, a lawyer in Memphis got scammed by his secretary—she embezzled over $362,000 from him, says an article on wreg.com. Attorney Jerry Schatz hired Teresa Sumpter, 48, in July of 2013.
Little did he know that his assistant would end up stealing checks from his trust account, forging ... Views: 818
Social Security numbers and credit card numbers are not the only types of data that hackers are after. Now, they are looking at frequent flyer accounts, and they are stealing reward miles, and then selling them online.
How do Hackers Steal Frequent Flyer Miles?
As with other types of ID ... Views: 817
Companies that cut corners by giving cybersecurity training only to their technical staff and the “big wigs” are throwing out the welcome mat to hackers. Cyber criminals know that the ripe fruit to pick is a company’s sales staff. Often, the sales personnel are clueless about ... Views: 817
Often, hucksters prey on the consumer’s desperation, which is why it’s no surprise that the No. 1 rip-off (at least between 2011 and 2012)) was bogus products promising weight loss.
VICE (vice.com) interviewed psychologist Maria Konnikova about how cyber cons are so ... Views: 817
Do you Uber? If you do, you probably feel pretty safe getting into the car of a stranger. However, you might not be as safe as you think.
Most people take for granted that Uber does background checks on its drivers, but there are actually a number of shady drivers who have recently been ... Views: 816
It only took a minute for 12-year old Erik Robinson to die while playing a macabre game called the “Choking Game.” His mother desperately tried to save her son when she found him with a Boy Scout rope around his neck, but it was too late. Erik was brain dead due to lack of oxygen, ... Views: 815
Handwriting analysts really have their work cut out from them now, thanks to the development of new software that can forge—better than a human can—a person’s handwriting. So if you are worried about identity theft, add one more element to the kettle: a crook getting ahold of ... Views: 815
It’s been said that nobody can make you feel bad about yourself without your permission. Well bah! Some people don’t wait for your permission to denigrate you. They are toxic. Lifehacker.com offers some ways to deal with such people.
Love Yourself
If someone’s words have ... Views: 815