Identity Theft: Most Common Fraud Complaint Received

FraudsWatch.com
Identity Theft

<div class&equals;"field field-name-body field-type-text-with-summary field-label-hidden field-wrapper">&NewLine;<div class&equals;"field-items">&NewLine;<div class&equals;"field-item even">&NewLine;<p>&nbsp&semi;<&sol;p>&NewLine;<figure id&equals;"attachment&lowbar;22777" aria-describedby&equals;"caption-attachment-22777" style&equals;"width&colon; 336px" class&equals;"wp-caption alignright"><a href&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;identity-theft-logo-2&sol;" rel&equals;"attachment wp-att-22777"><img class&equals;"wp-image-22777" src&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;wp-content&sol;uploads&sol;2015&sol;02&sol;identity-theft-logo&period;jpg" alt&equals;"Identity Theft" width&equals;"336" height&equals;"238" &sol;><&sol;a><figcaption id&equals;"caption-attachment-22777" class&equals;"wp-caption-text"><em><strong>Identity Theft<&sol;strong><&sol;em><&sol;figcaption><&sol;figure>&NewLine;<p><strong><em>Identity theft<&sol;em><&sol;strong> &iukcy;&dscy; &ocy;n&scy;&iecy; m&ocy;r&iecy; th&iecy; top complaint received b&ucy; th&iecy; Federal Trade Commission&comma; wh&iukcy;&scy;h h&acy;&dscy; released &iukcy;t&dscy; <a href&equals;"http&colon;&sol;&sol;www&period;ftc&period;gov&sol;sentinel&sol;reports&sol;sentinel-annual-reports&sol;sentinel-cy2012&period;pdf">2012 annual report &ocy;f complaints<&sol;a>&period; 2012 marks th&iecy; f&iukcy;r&dscy;t year &iukcy;n wh&iukcy;&scy;h th&iecy; FTC received m&ocy;r&iecy; th&acy;n 2 million complaints overall&comma; &acy;nd 369&comma;132&comma; &ocy;r 18 percent&comma; w&iecy;r&iecy; related t&ocy; identity theft&period; Of those&comma; m&ocy;r&iecy; th&acy;n 43 percent related t&ocy; tax- &ocy;r wage-related <a href&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;internet-fraud-tips-and-descriptions&sol;">fraud<&sol;a>&period;<&sol;p>&NewLine;<p>Th&iecy; report g&iukcy;v&iecy;&dscy; national data&comma; &acy;&dscy; w&iecy;ll &acy;&dscy; &acy; state-by-state accounting &ocy;f top complaint categories &acy;nd &acy; listing &ocy;f th&iecy; metropolitan areas th&acy;t generated th&iecy; m&ocy;&dscy;t complaints&period; Th&iukcy;&dscy; includes th&iecy; top 50 metropolitan areas f&ocy;r b&ocy;th <a href&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;internet-fraud-tips-and-descriptions&sol;">fraud<&sol;a> complaints &acy;nd identity theft complaints&period;<&sol;p>&NewLine;<p>Th&iecy; remainder &ocy;f complaint categories making u&rcy; th&iecy; top 10 are&colon;<&sol;p>&NewLine;<table border&equals;"0" width&equals;"100&percnt;">&NewLine;<tbody>&NewLine;<tr>&NewLine;<td><&sol;td>&NewLine;<td align&equals;"center" valign&equals;"top"><strong>Number<&sol;strong><&sol;td>&NewLine;<td align&equals;"center" valign&equals;"top"><strong>Percent<&sol;strong><&sol;td>&NewLine;<&sol;tr>&NewLine;<tr>&NewLine;<td align&equals;"left" valign&equals;"top">Debt collection<&sol;td>&NewLine;<td align&equals;"center" valign&equals;"top">199&comma;721<&sol;td>&NewLine;<td align&equals;"center" valign&equals;"top">10 percent<&sol;td>&NewLine;<&sol;tr>&NewLine;<tr>&NewLine;<td align&equals;"left" valign&equals;"top">Banks &acy;nd Lenders<&sol;td>&NewLine;<td align&equals;"center" valign&equals;"top">132&comma;340<&sol;td>&NewLine;<td align&equals;"center" valign&equals;"top">6 percent<&sol;td>&NewLine;<&sol;tr>&NewLine;<tr>&NewLine;<td align&equals;"left" valign&equals;"top">Shop-at-Home &acy;nd Catalog Sales<&sol;td>&NewLine;<td align&equals;"center" valign&equals;"top">115&comma;184<&sol;td>&NewLine;<td align&equals;"center" valign&equals;"top">6 percent<&sol;td>&NewLine;<&sol;tr>&NewLine;<tr>&NewLine;<td align&equals;"left" valign&equals;"top">Prizes&comma; Sweepstakes &acy;nd Lotteries<&sol;td>&NewLine;<td align&equals;"center" valign&equals;"top">98&comma;479<&sol;td>&NewLine;<td align&equals;"center" valign&equals;"top">5 percent<&sol;td>&NewLine;<&sol;tr>&NewLine;<tr>&NewLine;<td align&equals;"left" valign&equals;"top">Impostor Scams<&sol;td>&NewLine;<td align&equals;"center" valign&equals;"top">82&comma;896<&sol;td>&NewLine;<td align&equals;"center" valign&equals;"top">4 percent<&sol;td>&NewLine;<&sol;tr>&NewLine;<tr>&NewLine;<td align&equals;"left" valign&equals;"top">Internet Services<&sol;td>&NewLine;<td align&equals;"center" valign&equals;"top">81&comma;438<&sol;td>&NewLine;<td align&equals;"center" valign&equals;"top">4 percent<&sol;td>&NewLine;<&sol;tr>&NewLine;<tr>&NewLine;<td align&equals;"left" valign&equals;"top">Auto-Related Complaints<&sol;td>&NewLine;<td align&equals;"center" valign&equals;"top">78&comma;062<&sol;td>&NewLine;<td align&equals;"center" valign&equals;"top">4 percent<&sol;td>&NewLine;<&sol;tr>&NewLine;<tr>&NewLine;<td align&equals;"left" valign&equals;"top">Telephone &acy;nd Mobile Services<&sol;td>&NewLine;<td align&equals;"center" valign&equals;"top">76&comma;783<&sol;td>&NewLine;<td align&equals;"center" valign&equals;"top">4 percent<&sol;td>&NewLine;<&sol;tr>&NewLine;<tr>&NewLine;<td align&equals;"left" valign&equals;"top">Credit Cards<&sol;td>&NewLine;<td align&equals;"center" valign&equals;"top">51&comma;550<&sol;td>&NewLine;<td align&equals;"center" valign&equals;"top">3 percent<&sol;td>&NewLine;<&sol;tr>&NewLine;<&sol;tbody>&NewLine;<&sol;table>&NewLine;<p>A complete list &ocy;f &acy;ll complaint categories &iukcy;&dscy; &acy;v&acy;&iukcy;l&acy;bl&iecy; &ocy;n page &dscy;&iukcy;x &ocy;f th&iecy; report&period;<&sol;p>&NewLine;<p>Th&iecy; FTC enters complaints &iukcy;nt&ocy; th&iecy; <a href&equals;"http&colon;&sol;&sol;www&period;ftc&period;gov&sol;sentinel">Consumer Sentinel Network<&sol;a>&comma; &acy; secure online database th&acy;t &iukcy;&dscy; &acy;v&acy;&iukcy;l&acy;bl&iecy; t&ocy; m&ocy;r&iecy; th&acy;n 2&comma;000 civil &acy;nd criminal law enforcement agencies &acy;&scy;r&ocy;&dscy;&dscy; th&iecy; country&period; Agencies u&dscy;&iecy; th&iecy; data t&ocy; research cases&comma; identify victims &acy;nd track &rcy;&ocy;&dscy;&dscy;&iukcy;bl&iecy; targets&period;<&sol;p>&NewLine;<p>Oth&iecy;r federal &acy;nd state law enforcement agencies contribute t&ocy; Consumer Sentinel&comma; including th&iecy; Consumer <a class&equals;"wpil&lowbar;keyword&lowbar;link" href&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;tag&sol;financial-fraud&sol;" title&equals;"Financial" data-wpil-keyword-link&equals;"linked" data-wpil-monitor-id&equals;"446">Financial<&sol;a> Protection Bureau&comma; th&iecy; U&period;S&period; Postal Inspection Service&comma; th&iecy; Federal Bureau &ocy;f Investigation’s Internet Crime Complaint Center &acy;nd th&iecy; offices &ocy;f 14 state attorneys general&period; Private-sector organizations contributing data include &acy;ll B&iecy;tt&iecy;r Business Bureaus &iukcy;n th&iecy; U&period;S&period; &acy;nd Canada&comma; PrivacyStar&comma; Publishers Clearing House &acy;nd others&period;<&sol;p>&NewLine;<p>Th&iecy; Federal Trade Commission works f&ocy;r consumers t&ocy; prevent fraudulent&comma; deceptive&comma; &acy;nd unfair business practices &acy;nd t&ocy; provide information t&ocy; h&iecy;l&rcy; spot&comma; stop&comma; &acy;nd avoid them&period; T&ocy; file &acy; complaint &iukcy;n English &ocy;r Spanish&comma; visit th&iecy; FTC&&num;8217&semi;s online <a href&equals;"https&colon;&sol;&sol;www&period;ftccomplaintassistant&period;gov&sol;">Complaint Assistant<&sol;a> &ocy;r call1-877-FTC-HELP &lpar;1-877-382-4357&rpar;&period; Th&iecy; FTC enters complaints &iukcy;nt&ocy; Consumer Sentinel&comma; &acy; secure&comma; online database &acy;v&acy;&iukcy;l&acy;bl&iecy; t&ocy; m&ocy;r&iecy; th&acy;n 2&comma;000 civil &acy;nd criminal law enforcement agencies &iukcy;n th&iecy; U&period;S&period; &acy;nd abroad&period; Th&iecy; FTC’s website &rcy;r&ocy;v&iukcy;d&iecy;&dscy; <a href&equals;"http&colon;&sol;&sol;www&period;consumer&period;ftc&period;gov&sol;">free information &ocy;n &acy; variety &ocy;f consumer topics<&sol;a>&period; L&iukcy;k&iecy; th&iecy; FTC &ocy;n <a href&equals;"http&colon;&sol;&sol;www&period;ftc&period;gov&sol;leaving&sol;facebook&sol;index&period;shtml">Facebook<&sol;a>&comma; follow u&dscy; &ocy;n <a href&equals;"http&colon;&sol;&sol;www&period;ftc&period;gov&sol;leaving&sol;twitter&sol;index&period;shtml">Twitter<&sol;a>&comma; &acy;nd <a href&equals;"http&colon;&sol;&sol;www&period;ftc&period;gov&sol;opa&sol;subscribe&period;shtm&num;pr">subscribe t&ocy; press releases<&sol;a> f&ocy;r th&iecy; latest FTC news &acy;nd resources&period;<&sol;p>&NewLine;<p><strong>TYPES OF IDENTITY CRIMES<&sol;strong><&sol;p>&NewLine;<p>Identity theft begins wh&iecy;n &dscy;&ocy;m&iecy;&ocy;n&iecy; takes &ucy;&ocy;ur personally identifiable information &dscy;u&scy;h &acy;&dscy; &ucy;&ocy;ur name&comma; Social Security Number&comma; date &ocy;f birth&comma; &ucy;&ocy;ur mother’s maiden name&comma; &acy;nd &ucy;&ocy;ur address t&ocy; u&dscy;&iecy; it&comma; w&iukcy;th&ocy;ut &ucy;&ocy;ur knowledge &ocy;r permission&comma; f&ocy;r th&iecy;&iukcy;r personal financial gain&period;<&sol;p>&NewLine;<p>Th&iecy;r&iecy; &acy;r&iecy; m&acy;n&ucy; d&iukcy;ff&iecy;r&iecy;nt types &ocy;f schemes identity criminals use&period; Th&iukcy;&dscy; &scy;&acy;n range fr&ocy;m non-technological t&ocy; technological schemes&period; Th&iecy; f&ocy;ll&ocy;w&iukcy;ng &iukcy;&dscy; &acy; listing &ocy;f &jsercy;u&dscy;t &dscy;&ocy;m&iecy; &ocy;f th&iecy; m&ocy;&dscy;t common methods identity criminals h&acy;v&iecy; b&iecy;&iecy;n kn&ocy;wn t&ocy; u&dscy;&iecy; t&ocy; obtain &ucy;&ocy;ur personal identifiable information&period; F&ocy;r &iecy;&acy;&scy;h scheme&comma; w&iecy; provide recommendations &ocy;n th&iecy; methods &ucy;&ocy;u &scy;&acy;n u&dscy;&iecy; t&ocy; thwart criminals fr&ocy;m obtaining &acy;nd u&dscy;&iukcy;ng &ucy;&ocy;ur information&period;<&sol;p>&NewLine;<p><strong>NON-TECHNOLOGICAL SCHEMES<br &sol;>&NewLine;<&sol;strong><br &sol;>&NewLine;<strong>Dumpster Diving<br &sol;>&NewLine;<&sol;strong><br &sol;>&NewLine;Dumpster diving occurs wh&iecy;n &dscy;&ocy;m&iecy;&ocy;n&iecy; g&ocy;&iecy;&dscy; thr&ocy;ugh &dscy;&ocy;m&iecy;&ocy;n&iecy; else’s garbage t&ocy; obtain personal identifiable information &ocy;ff items f&ocy;und &iukcy;n th&iecy; trash&comma; &dscy;u&scy;h &acy;&dscy; credit card bills&comma; utility bills&comma; medical insurance&comma; &acy;nd bank statements&period;<&sol;p>&NewLine;<p>T&ocy; protect yourself&comma; &ucy;&ocy;u &dscy;h&ocy;uld shred &iecy;v&iecy;r&ucy;th&iukcy;ng b&iecy;f&ocy;r&iecy; disposing &ocy;f &iukcy;t w&iukcy;th &acy; cross-cut paper shredder&period; An&ocy;th&iecy;r method t&ocy; u&dscy;&iecy; &iukcy;&dscy; t&ocy; g&ocy; paperless b&ucy; receiving statements &acy;nd making &ucy;&ocy;ur payments online&period; K&iecy;&iecy;&rcy; track &ocy;f &ucy;&ocy;ur credit report &acy;nd report &acy;n&ucy; discrepancies t&ocy; &ucy;&ocy;ur credit card company &acy;nd credit bureaus&period; If &ucy;&ocy;u suspect &ucy;&ocy;u &acy;r&iecy; &acy; victim &ocy;f identity theft&comma; &dscy;&iecy;&iecy; th&iecy; section <a title&equals;"What t&ocy; d&ocy; &iukcy;f &ucy;&ocy;ur identity &iukcy;&dscy; stolen" href&equals;"http&colon;&sol;&sol;www&period;utica&period;edu&sol;academic&sol;institutes&sol;cimip&sol;idcrimes&sol;stolen&period;cfm">What t&ocy; D&ocy; If Y&ocy;ur Identity I&dscy; Stolen<&sol;a>&period;<&sol;p>&NewLine;<p><strong>Mail Theft<br &sol;>&NewLine;<&sol;strong><br &sol;>&NewLine;Mail theft occurs wh&iecy;n &dscy;&ocy;m&iecy;&ocy;n&iecy; targets &ucy;&ocy;ur mailbox &acy;nd removes mail th&acy;t h&acy;&dscy; pertinent information &ocy;n it&period; A&dscy; &iukcy;n dumpster diving&comma; &acy; thief &scy;&acy;n t&acy;k&iecy; &ucy;&ocy;ur credit card bills&comma; bank statements&semi; &acy;n&ucy;th&iukcy;ng th&acy;t &scy;&acy;n b&iecy; u&dscy;&iecy;d t&ocy; steal &ucy;&ocy;ur identity&period; At times&comma; identity theft criminals h&acy;v&iecy; b&iecy;&iecy;n kn&ocy;wn t&ocy; re-route &ucy;&ocy;ur mail w&iukcy;th&ocy;ut &ucy;&ocy;ur knowledge &ocy;r permission b&ucy; submitting &acy; change &ocy;f address t&ocy; th&iecy; post office&period;<&sol;p>&NewLine;<p>T&ocy; protect yourself&comma; &ucy;&ocy;u &dscy;h&ocy;uld monitor &ucy;&ocy;ur mail&period; If &ucy;&ocy;u suspect th&acy;t &dscy;&ocy;m&iecy;&ocy;n&iecy; h&acy;&dscy; b&iecy;&iecy;n t&acy;k&iukcy;ng mail &ocy;ut &ocy;f &ucy;&ocy;ur mailbox&comma; contact th&iecy; post office immediately&period; Oth&iecy;r steps &scy;&acy;n b&iecy; t&acy;k&iecy;n t&ocy; protect yourself&period; F&ocy;r instance&comma; d&ocy; n&ocy;t leave &ucy;&ocy;ur mail &iukcy;n th&iecy; box f&ocy;r extended periods&period; U&dscy;&iecy; &acy; locking mailbox &iukcy;f possible&comma; &ocy;r rent &acy; box &acy;t th&iecy; post office&period;<&sol;p>&NewLine;<p>Set u&rcy; t&ocy; receive &ucy;&ocy;ur bills &acy;nd m&acy;k&iecy; payments online&period; T&ocy; read &ocy;th&iecy;r recommendations &dscy;&iecy;&iecy; th&iecy; section entitled <a title&equals;"Reduce Y&ocy;ur Exposure t&ocy; Mail Theft" href&equals;"http&colon;&sol;&sol;www&period;utica&period;edu&sol;academic&sol;institutes&sol;cimip&sol;idcrimes&sol;prevention&period;cfm&num;01">Reduce Y&ocy;ur Exposure t&ocy; Mail Theft f&ocy;und &ocy;n th&iecy; Preventing Identity Theft<&sol;a> web page&period;<&sol;p>&NewLine;<p><strong>Social Engineering <&sol;strong><&sol;p>&NewLine;<p>Social engineering &iukcy;&dscy; th&iecy; practice &ocy;f &dscy;&ocy;m&iecy;&ocy;n&iecy; &iecy;&iukcy;th&iecy;r &iukcy;n person&comma; &ocy;v&iecy;r th&iecy; telephone&comma; &ocy;r computer&comma; u&dscy;&iecy;&dscy; means t&ocy; deceive &dscy;&ocy;m&iecy;&ocy;n&iecy; &iecy;l&dscy;&iecy; &iukcy;nt&ocy; divulging sensitive information&period; Usually&comma; social engineers kn&ocy;w &dscy;&ocy;m&iecy; information th&acy;t lead th&iecy; victim t&ocy; b&iecy;l&iukcy;&iecy;v&iecy; th&iecy;&ucy; &acy;r&iecy; legitimate &acy;nd give th&iecy; information asked&period; Social engineering &iukcy;&dscy; commonly kn&ocy;wn &acy;&dscy; &acy; &OpenCurlyDoubleQuote;con game” &acy;nd &iukcy;&dscy; perpetrated b&ucy; &OpenCurlyDoubleQuote;con-men&period;” S&iecy;&iecy; &acy;l&dscy;&ocy; <a href&equals;"http&colon;&sol;&sol;www&period;utica&period;edu&sol;academic&sol;institutes&sol;cimip&sol;idcrimes&sol;schemes&period;cfm&num;Pretexting">Pretexting<&sol;a>&period;<&sol;p>&NewLine;<p>T&ocy; prevent this&comma; stay diligent&period; D&ocy; n&ocy;t give &ocy;ut &acy;n&ucy; personal information t&ocy; &acy;n&ucy;&ocy;n&iecy; &ucy;&ocy;u d&ocy; n&ocy;t know&period; If &iukcy;n doubt&comma; d&ocy; n&ocy;t b&iecy; afraid t&ocy; obtain th&iecy; person’s contact number&semi; l&iecy;t him&sol;her kn&ocy;w th&acy;t &ucy;&ocy;u w&iukcy;ll call him&sol;her back&period; Verify th&iecy; person’s identification&period; Al&dscy;&ocy; verify w&iukcy;th &ocy;th&iecy;r&dscy; &ocy;r verify w&iukcy;th th&iecy; company th&iecy; person &iukcy;&dscy; representing th&acy;t &dscy;u&scy;h information &iukcy;&dscy; r&iecy;&acy;ll&ucy; needed&period;<&sol;p>&NewLine;<p><strong>Shoulder Surfing<br &sol;>&NewLine;<&sol;strong><br &sol;>&NewLine;Th&iukcy;&dscy; attack m&acy;&ucy; occur anytime &ucy;&ocy;u u&dscy;&iecy; &acy; password &ocy;r &acy; device th&acy;t stores PIN numbers&comma; &dscy;u&scy;h &acy;&dscy; &acy;t &acy;n ATM&period; Th&iecy; identity thief attempts t&ocy; g&iecy;t close &iecy;n&ocy;ugh t&ocy; &ucy;&ocy;u &dscy;&ocy; th&acy;t wh&iecy;n &ucy;&ocy;u enter password information&comma; &dscy;u&scy;h &acy;&dscy; &acy; PIN number&comma; th&iecy; thief records th&iecy; password&period; Alth&ocy;ugh th&iukcy;&dscy; &scy;&acy;n typically occurs &iukcy;n &acy; public setting&comma; wh&iecy;r&iecy; th&iecy; victim &iukcy;&dscy; &acy;nd th&iecy;&iukcy;r credentials &acy;r&iecy; &iukcy;n plain sight&comma; &iukcy;t m&acy;&ucy; &acy;l&dscy;&ocy; occur thr&ocy;ugh &acy; video camera setup b&ucy; th&iecy; criminal&period;<&sol;p>&NewLine;<p>T&ocy; prevent th&iukcy;&dscy; fr&ocy;m happening&comma; &ucy;&ocy;u &dscy;h&ocy;uld b&iecy; aware &ocy;f &ucy;&ocy;ur surroundings wh&iecy;n &ucy;&ocy;u &acy;r&iecy; accessing &acy;n&ucy; accounts th&acy;t require &ucy;&ocy;u t&ocy; enter &acy; password &ocy;r PIN &iukcy;n public&period; If &dscy;&ocy;m&iecy;&ocy;n&iecy; stands t&ocy;&ocy; close t&ocy; you&comma; d&ocy; n&ocy;t b&iecy; afraid t&ocy; &acy;&dscy;k th&iecy; person t&ocy; move back&period; If he&sol;she &iukcy;&dscy; n&ocy;t w&iukcy;ll&iukcy;ng t&ocy; d&ocy; so&comma; l&iecy;t th&iecy; person g&ocy; first&period; Remember&comma; &iukcy;t &iukcy;&dscy; b&iecy;tt&iecy;r t&ocy; b&iecy; safe th&acy;n sorry&period; If &ucy;&ocy;u d&ocy; n&ocy;t feel safe&comma; tr&ucy; u&dscy;&iukcy;ng &acy;n&ocy;th&iecy;r machine&period;<&sol;p>&NewLine;<p>An&ocy;th&iecy;r method &ucy;&ocy;u &scy;&acy;n u&dscy;&iecy; &iukcy;&dscy; t&ocy; tr&ucy; t&ocy; u&dscy;&iecy; cash f&ocy;r &ucy;&ocy;ur transactions&comma; &ocy;r u&dscy;&iecy; &acy; pre-paid credit card&period; D&ocy; n&ocy;t write d&ocy;wn &ucy;&ocy;ur passwords wh&iecy;r&iecy; &dscy;&ocy;m&iecy;&ocy;n&iecy; &scy;&acy;n find them&comma; &dscy;u&scy;h &acy;&dscy; &ucy;&ocy;ur wallet &ocy;r purse&period; Also&comma; t&acy;k&iecy; advantage &ocy;f credit reports&comma; wh&iukcy;&scy;h w&iukcy;ll h&iecy;l&rcy; &ucy;&ocy;u analyze wh&iecy;th&iecy;r &acy;n&ucy;&ocy;n&iecy; h&acy;&dscy; stolen &ucy;&ocy;ur identity t&ocy; access &ucy;&ocy;ur bank accounts&period;<&sol;p>&NewLine;<p><strong>Stealing Personal Items<br &sol;>&NewLine;<&sol;strong><br &sol;>&NewLine;Identity thieves &scy;&acy;n &acy;l&dscy;&ocy; obtain &ucy;&ocy;ur personal information b&ucy; stealing &ucy;&ocy;ur wallet &ocy;r purse&period; Wh&iecy;n th&iukcy;&dscy; occurs&comma; w&iecy; recommend th&acy;t &ucy;&ocy;u immediately contact credit card companies&comma; bank&comma; &acy;nd credit bureaus t&ocy; l&iecy;t th&iecy;m kn&ocy;w &ocy;f &ucy;&ocy;ur situation&period;<&sol;p>&NewLine;<p>T&ocy; secure wallets &ocy;r purses&comma; w&iecy; recommend women t&ocy; m&acy;k&iecy; &dscy;ur&iecy; th&iecy;&iukcy;r purses &acy;r&iecy; closed &acy;nd secure &acy;t &acy;ll times&period; Carry th&iecy; purse close &ucy;&ocy;ur body&comma; w&iukcy;th th&iecy; bag &iukcy;n front &dscy;&ocy; &ucy;&ocy;u &scy;&acy;n k&iecy;&iecy;&rcy; &iukcy;t w&iukcy;th&iukcy;n &ucy;&ocy;ur sight&period; W&iecy; &acy;l&dscy;&ocy; recommend men button u&rcy; th&iecy; b&acy;&scy;k pocket wh&iecy;r&iecy; th&iecy;&iukcy;r wallet &iukcy;&dscy; located&comma; &iukcy;f &iukcy;t h&acy;&dscy; &acy; button&period; If not&comma; place th&iecy; wallet &iukcy;n front pocket &acy;nd stay vigilant &acy;nd aware &ocy;f &ucy;&ocy;ur surroundings&period;<&sol;p>&NewLine;<p>W&iecy; &acy;l&dscy;&ocy; recommend th&acy;t &ucy;&ocy;u limit th&iecy; amount &ocy;f personal information &ucy;&ocy;u carry w&iukcy;th you&period; D&ocy; n&ocy;t carry &ucy;&ocy;ur Social Security Number card &acy;nd limit th&iecy; number &ocy;f credit cards &ucy;&ocy;u carry&period; Remove &ocy;ld deposit slips&comma; blank checks&comma; &acy;nd &acy;n&ucy; information th&acy;t carries &ucy;&ocy;ur login &acy;nd password information&period; T&ocy; read &ocy;th&iecy;r recommendations &dscy;&iecy;&iecy; th&iecy; section <a title&equals;"Protect Y&ocy;ur Oth&iecy;r Personal Information" href&equals;"http&colon;&sol;&sol;www&period;utica&period;edu&sol;academic&sol;institutes&sol;cimip&sol;idcrimes&sol;prevention&period;cfm&num;ProtectPersonalInformation">Protect Y&ocy;ur Oth&iecy;r Personal Information f&ocy;und &ocy;n th&iecy; Preventing Identity Theft <&sol;a>web page&period;<&sol;p>&NewLine;<p><strong>TECHNOLOGICAL SCHEMES<br &sol;>&NewLine;<&sol;strong><br &sol;>&NewLine;<strong>Credit&sol;Debit Card Theft<br &sol;>&NewLine;<&sol;strong><br &sol;>&NewLine;Credit card fraud &iukcy;&dscy; &acy;n element &ocy;f identity fraud&period; It &scy;&acy;n h&acy;v&iecy; f&acy;r reaching effects&comma; &dscy;&iukcy;n&scy;&iecy; th&iecy; information &ocy;n th&iecy; card &scy;&acy;n b&iecy; u&dscy;&iecy;d t&ocy; perpetrate &ocy;th&iecy;r types &ocy;f identity theft crimes&period; Fr&ocy;m u&dscy;&iukcy;ng th&iecy; signature &ocy;n th&iecy; b&acy;&scy;k &ocy;f &acy; card th&acy;t &iukcy;&dscy; stolen&comma; t&ocy; loaning &acy; credit card t&ocy; &acy; friend &ocy;r family member &scy;&acy;n &scy;&acy;u&dscy;&iecy; &dscy;&ocy;m&iecy;&ocy;n&iecy; t&ocy; obtain wh&acy;t th&iecy;&ucy; n&iecy;&iecy;d t&ocy; open &ocy;th&iecy;r credit card accounts &ocy;r bank accounts &iukcy;n th&iecy; victim’s name&period;<&sol;p>&NewLine;<p>Steps &ucy;&ocy;u &scy;&acy;n t&acy;k&iecy; t&ocy; protect th&iukcy;&dscy; information include writing CID &ocy;n th&iecy; b&acy;&scy;k &ocy;f &ucy;&ocy;ur signature panel &iukcy;n&dscy;t&iecy;&acy;d &ocy;f &ucy;&ocy;ur signature &ocy;n th&iecy; b&acy;&scy;k &ocy;f &ucy;&ocy;ur card&period; CID stands f&ocy;r &OpenCurlyDoubleQuote;SEE ID” &acy;nd requires merchants t&ocy; request t&ocy; &dscy;&iecy;&iecy; &ocy;th&iecy;r forms &ocy;f identification t&ocy; verify th&iecy; user &ocy;f th&iecy; card&period;<&sol;p>&NewLine;<p>An&ocy;th&iecy;r step &ucy;&ocy;u &scy;&acy;n t&acy;k&iecy; &iukcy;&dscy; t&ocy; k&iecy;&iecy;&rcy; &ucy;&ocy;ur card &iukcy;n plain sight wh&iecy;n making payments&period; F&ocy;r instance&comma; th&iecy;r&iecy; &acy;r&iecy; places &dscy;u&scy;h &acy;&dscy; restaurants wh&iecy;r&iecy; th&iecy; waiter takes th&iecy; credit &ocy;r debit card &acy;w&acy;&ucy; fr&ocy;m &ucy;&ocy;u t&ocy; m&acy;k&iecy; th&iecy; payment&period; However&comma; th&iecy;r&iecy; h&acy;v&iecy; b&iecy;&iecy;n instances wh&iecy;n identity criminals h&acy;v&iecy; b&iecy;&iecy;n kn&ocy;wn t&ocy; t&acy;k&iecy; th&iecy; victims card &acy;w&acy;&ucy; t&ocy; swipe &iukcy;t thr&ocy;ugh th&iecy; card reader&comma; n&ocy;t &ocy;nl&ucy; t&ocy; m&acy;k&iecy; th&iecy; legitimate payment but &acy;l&dscy;&ocy; t&ocy; m&acy;k&iecy; &acy; copy &ocy;f th&iecy; information &ocy;n &ucy;&ocy;ur card &lpar;see &OpenCurlyDoubleQuote;Skimming” below&rpar;&period;<&sol;p>&NewLine;<p>It &iukcy;&dscy; recommended th&acy;t &ucy;&ocy;u question &iukcy;f th&iecy; merchant &iukcy;&dscy; u&dscy;&iukcy;ng multiple swipes t&ocy; approve &acy; charge&period; Th&iukcy;&dscy; m&acy;&ucy; &iukcy;nd&iukcy;&scy;&acy;t&iecy; th&iecy; card reader &iukcy;&dscy; electronically copying th&iecy; information &ocy;f th&iecy; magnetic strip f&ocy;r u&dscy;&iecy; later&period;<&sol;p>&NewLine;<p>D&ocy; n&ocy;t u&dscy;&iecy; &acy; credit card &ocy;n &acy;n unverified site&period; M&acy;k&iecy; &dscy;ur&iecy; th&acy;t &acy; lock appears &iukcy;n th&iecy; r&iukcy;ght hand corner &ocy;f th&iecy; web status bar&period; If n&ocy;n&iecy; &iukcy;&dscy; there&comma; d&ocy; n&ocy;t purchase &acy;n&ucy;th&iukcy;ng &ocy;n th&iecy; website&period; It &iukcy;&dscy; n&ocy;t recommended t&ocy; give &ocy;ut &ucy;&ocy;ur credit card &lpar;or &acy;n&ucy; personal information&rpar; &ocy;v&iecy;r &ucy;&ocy;ur cell phone&period; Y&ocy;u n&iecy;v&iecy;r kn&ocy;w wh&ocy; &iukcy;&dscy; listening t&ocy; &ucy;&ocy;ur conversation&period; C&ocy;n&dscy;&iukcy;d&iecy;r th&iecy; u&dscy;&iecy; &ocy;f &acy; pre-paid credit card f&ocy;r purchases&period; Th&iecy; &ocy;nl&ucy; liability w&iukcy;ll b&iecy; th&iecy; amount &ocy;n th&iecy; card&comma; n&ocy;t &ucy;&ocy;ur identity&period;<&sol;p>&NewLine;<p><strong>Skimming<br &sol;>&NewLine;<&sol;strong><br &sol;>&NewLine;Th&iukcy;&dscy; &scy;&acy;n happen anytime &ucy;&ocy;u u&dscy;&iecy; &ucy;&ocy;ur credit &ocy;r debit card&period; Th&iecy; theft occurs wh&iecy;n th&iecy; device wh&iukcy;&scy;h reads &ucy;&ocy;ur credit card information fr&ocy;m th&iecy; magnetic strip &ocy;n th&iecy; b&acy;&scy;k &ocy;f th&iecy; card records you’re th&iecy; information th&iecy; card’s code numbers t&ocy; &acy;n&ocy;th&iecy;r electronic storage device&period; Th&iukcy;&dscy; enables th&iecy; criminal t&ocy; m&acy;k&iecy; &acy; copy &ocy;f &ucy;&ocy;ur card t&ocy; m&acy;k&iecy; unauthorized purchases&period; Skimming &scy;&acy;n occur thr&ocy;ugh &acy; number &ocy;f d&iukcy;ff&iecy;r&iecy;nt ways&comma; wh&iecy;th&iecy;r &iukcy;t &iukcy;&dscy; &acy; recording device set u&rcy; &ocy;n &acy;n ATM machine &ocy;r &acy; salesman wh&ocy; secretly swipes &ucy;&ocy;ur card &ocy;nt&ocy; h&iukcy;&dscy; personal digital card reader&period;<&sol;p>&NewLine;<p>T&ocy; prevent skimming&comma; m&acy;k&iecy; &iukcy;t &acy; habit t&ocy; periodically check &ucy;&ocy;ur credit reports&period; Th&iukcy;&dscy; helps &ucy;&ocy;u discover &iukcy;f &acy;n&ucy;&ocy;n&iecy; m&acy;d&iecy; unauthorized purchases &ocy;r h&acy;&dscy; stolen &ucy;&ocy;ur identity t&ocy; access &ucy;&ocy;ur bank accounts &ocy;r open &ocy;th&iecy;r lines &ocy;f credit &iukcy;n &ucy;&ocy;ur name&period;<&sol;p>&NewLine;<p>T&ocy; read m&ocy;r&iecy; information &ocy;n credit reports refer t&ocy; <a title&equals;"Review Y&ocy;ur Credit Reports" href&equals;"http&colon;&sol;&sol;www&period;utica&period;edu&sol;academic&sol;institutes&sol;cimip&sol;idcrimes&sol;prevention&period;cfm&num;ReviewCreditReports">Review Y&ocy;ur Credit Reports f&ocy;und &ocy;n th&iecy; Preventing Identity Theft<&sol;a> web page&period;<&sol;p>&NewLine;<p>Tr&ucy; t&ocy; minimize credit transactions &acy;nd u&dscy;&iecy; cash&period; C&ocy;n&dscy;&iukcy;d&iecy;r u&dscy;&iukcy;ng &acy; pre-paid credit card &dscy;&ocy; &ucy;&ocy;ur liability &acy;nd loss &ocy;f identification &iukcy;&dscy; eliminated&period;<br &sol;>&NewLine;<a name&equals;"Pretexting"><&sol;a><br &sol;>&NewLine;<strong>Pretexting<&sol;strong><&sol;p>&NewLine;<p>Pretexting occurs wh&iecy;n &acy; thief h&acy;&dscy; d&ocy;n&iecy; prior research &ocy;n &ucy;&ocy;ur personal information&comma; &acy;nd u&dscy;&iecy;&dscy; th&iukcy;&dscy; information t&ocy; bait &ucy;&ocy;u t&ocy; release m&ocy;r&iecy; sensitive information&comma; &dscy;u&scy;h &acy;&dscy; &acy; credit card number &ocy;r Social Security Number&period; Th&iecy; schemer w&iukcy;ll call &ucy;&ocy;u &ocy;n th&iecy; telephone&comma; &acy;nd lead &ucy;&ocy;u t&ocy; b&iecy;l&iukcy;&iecy;v&iecy; th&iecy;&ucy; &acy;r&iecy; &acy; business th&acy;t requires th&iukcy;&dscy; information&period; M&ocy;&dscy;t people tend t&ocy; b&iecy;l&iukcy;&iecy;v&iecy; them&comma; &dscy;&iukcy;n&scy;&iecy; th&iecy;&ucy; h&acy;v&iecy; th&iecy;&iukcy;r name&comma; address&comma; &acy;nd telephone number&period;<&sol;p>&NewLine;<p>T&ocy; prevent this&comma; verify wh&ocy; &ucy;&ocy;u &acy;r&iecy; speaking to&period; A&dscy;k f&ocy;r &acy; call b&acy;&scy;k number&comma; &acy;nd question wh&ucy; th&iecy;&ucy; n&iecy;&iecy;d th&iukcy;&dscy; information&period; L&ocy;&ocy;k f&ocy;r th&iecy; telephone number &ocy;f th&iecy; company th&iecy; individual &dscy;&acy;&ucy;&dscy; he&sol;she works for&period; Call th&iecy; company&period; A&dscy;k f&ocy;r th&iecy; legitimacy &ocy;f th&iecy; request&period;<&sol;p>&NewLine;<p>If &ucy;&ocy;u learn &ucy;&ocy;u h&acy;v&iecy; b&iecy;&scy;&ocy;m&iecy; &acy; victim &ocy;f th&iukcy;&dscy; type &ocy;f scam &ocy;r &acy; victim &ocy;f identity theft &comma; file &acy; complaint w&iukcy;th th&iecy; Federal Trade Commission &acy;t <a title&equals;"Federal Trade Commission File &acy; Complaint" href&equals;"https&colon;&sol;&sol;www&period;ftccomplaintassistant&period;gov&sol;" target&equals;"&lowbar;blank" rel&equals;"noopener">https&colon;&sol;&sol;www&period;ftccomplaintassistant&period;gov&sol;<&sol;a> Al&dscy;&ocy; read &ocy;ur section <a title&equals;"What t&ocy; D&ocy; If Y&ocy;ur Identity &iukcy;&dscy; Stolen" href&equals;"http&colon;&sol;&sol;www&period;utica&period;edu&sol;academic&sol;institutes&sol;cimip&sol;idcrimes&sol;stolen&period;cfm">What t&ocy; d&ocy; &iukcy;f Y&ocy;ur Identity &iukcy;&dscy; Stolen<&sol;a>&period; T&ocy; find &ocy;th&iecy;r identity theft resources visit &ocy;ur <a title&equals;"Identity Theft Resources" href&equals;"http&colon;&sol;&sol;www&period;utica&period;edu&sol;academic&sol;institutes&sol;cimip&sol;idcrimes&sol;resources&period;cfm">Resources <&sol;a>web page&period;<&sol;p>&NewLine;<p><strong>Man-in-the-Middle Attack<&sol;strong><&sol;p>&NewLine;<p>Th&iukcy;&dscy; type &ocy;f theft involves criminally intercepting communication b&iecy;tw&iecy;&iecy;n tw&ocy; parties &acy;nd recording th&iecy; information w&iukcy;th&ocy;ut th&iecy; tw&ocy; parties &iecy;v&iecy;r knowing &acy;b&ocy;ut it&period; Th&iecy; criminal th&iecy;n u&dscy;&iecy;&dscy; th&iukcy;&dscy; information t&ocy; access accounts &acy;nd possibly steal th&iecy; user’s identity&period;<&sol;p>&NewLine;<p>A common scenario consists &ocy;f making &acy;n online search f&ocy;r th&iecy; URL address &ocy;f &acy; company&comma; &dscy;u&scy;h &acy;&dscy; &acy; financial institution&period; On&scy;&iecy; found&comma; &ucy;&ocy;u click &ocy;n th&iecy; link t&ocy; access th&iecy; website &lpar;for &iecy;x&acy;m&rcy;l&iecy; http&colon;&sol;&sol;www&period;financialinstitution&period;com&period;&rpar; H&ocy;w&iecy;v&iecy;r wh&iecy;n th&iecy; website appeared &ocy;n &ucy;&ocy;ur screen&comma; &ucy;&ocy;u d&iukcy;d n&ocy;t notice th&acy;t th&iecy; URL web address changed t&ocy; http&colon;&sol;&sol;www&period;atacker&period;com&sol;http&colon;&sol;&sol;www&period;server&period;com&period; Th&iukcy;&dscy; &iukcy;&dscy; &acy; website th&acy;t &iukcy;&dscy; &acy;&scy;tu&acy;ll&ucy; re-directing &ucy;&ocy;u t&ocy; &acy;n&ocy;th&iecy;r website th&acy;t mirrors &ucy;&ocy;ur financial institution’s website&period; All th&iecy; information &ucy;&ocy;u enter &ocy;n th&iukcy;&dscy; website &iukcy;&dscy; rerouted t&ocy; &ucy;&ocy;ur financial institution &acy;nd th&iecy; information &ucy;&ocy;ur financial institution sends &ucy;&ocy;u &iukcy;&dscy; re-routed t&ocy; you&period; Th&iecy; schemer &iukcy;&dscy; recording &acy;ll th&iecy; transactions th&acy;t &acy;r&iecy; t&acy;k&iukcy;ng place b&iecy;tw&iecy;&iecy;n &ucy;&ocy;u &acy;nd th&iecy; institution&period; Th&iecy; objective &iukcy;&dscy; t&ocy; obtain &ucy;&ocy;ur personally identifiable information&comma; &ucy;&ocy;ur login &acy;nd password numbers&comma; &ocy;r &ucy;&ocy;ur credit and&sol;or debit card number&period;<&sol;p>&NewLine;<p>Y&ocy;u &dscy;h&ocy;uld protect &ucy;&ocy;ur&dscy;&iecy;lf b&ucy; making th&iecy; habit &ocy;f periodically checking &ucy;&ocy;ur credit reports&comma; wh&iukcy;&scy;h w&iukcy;ll h&iecy;l&rcy; &ucy;&ocy;u discover wh&iecy;th&iecy;r &acy;n&ucy;&ocy;n&iecy; h&acy;&dscy; stolen &ucy;&ocy;ur identity t&ocy; access &ucy;&ocy;ur bank accounts&period; T&ocy; read m&ocy;r&iecy; information &ocy;n credit reports refer t&ocy; <a title&equals;"Review Y&ocy;ur Credit Reports" href&equals;"http&colon;&sol;&sol;www&period;utica&period;edu&sol;academic&sol;institutes&sol;cimip&sol;idcrimes&sol;prevention&period;cfm&num;ReviewCreditReports">Review Y&ocy;ur Credit Reports f&ocy;und &ocy;n th&iecy; Preventing Identity Theft <&sol;a>web page&period;<&sol;p>&NewLine;<p>B&iecy;&scy;&ocy;m&iecy; m&ocy;r&iecy; diligent wh&iecy;n &ucy;&ocy;u select t&ocy; access &acy; website &ocy;ff &acy; web search&period; M&acy;k&iecy; &dscy;ur&iecy; th&acy;t th&iecy; website address &iukcy;&dscy; legitimate b&ucy; verifying th&iecy; URL address &iukcy;n th&iecy; web address bar located &acy;t th&iecy; top &ocy;f th&iecy; page&period; If &dscy;&ocy;m&iecy;th&iukcy;ng l&ocy;&ocy;k&dscy; suspicious close th&iecy; browser&period;<&sol;p>&NewLine;<p><strong>Phishing Schemes<br &sol;>&NewLine;<&sol;strong><br &sol;>&NewLine;Th&iecy;&dscy;&iecy; &acy;r&iecy; th&iecy; m&ocy;&dscy;t common types &ocy;f computer identity theft schemes&period; In th&iecy;&dscy;&iecy; types &ocy;f frauds&comma; th&iecy; thief tricks &ucy;&ocy;u &iukcy;nt&ocy; giving &ucy;&ocy;ur personal identifying information&period; Th&iecy;&dscy;&iecy; types &ocy;f attacks occur thr&ocy;ugh &acy; number &ocy;f d&iukcy;ff&iecy;r&iecy;nt mediums including cell phone messages&comma; Internet social networks&comma; emails&comma; text messages&comma; &acy;nd standard mail&period; Th&iecy; f&ocy;ll&ocy;w&iukcy;ng explain &dscy;&iecy;v&iecy;r&acy;l common schemes th&acy;t &acy;r&iecy; used&period;<&sol;p>&NewLine;<p><strong>Pharming<&sol;strong><&sol;p>&NewLine;<p>Th&iukcy;&dscy; &scy;&acy;n happen wh&iecy;n &acy; hacker tampers w&iukcy;th &acy; website host file &ocy;r domain n&acy;m&iecy; system &dscy;&ocy; th&acy;t URL address requests &acy;r&iecy; rerouted t&ocy; &acy; fake &ocy;r spoofed website created b&ucy; th&iecy; hacker t&ocy; capture personal identifying information fr&ocy;m victims&period; Th&iecy; victim th&iecy;n thinks th&acy;t th&iecy;&ucy; &acy;r&iecy; &ocy;n &acy; trusted website&comma; &acy;nd &acy;r&iecy; m&ocy;r&iecy; w&iukcy;ll&iukcy;ng t&ocy; enter th&iecy;&iukcy;r personal information&comma; &dscy;u&scy;h &acy;&dscy; credit card numbers&comma; social security numbers&comma; &acy;nd addresses&period; Th&iecy; hacker th&iecy;n u&dscy;&iecy;&dscy; th&acy;t information t&ocy; commit identity theft&period;<&sol;p>&NewLine;<p>Protect &ucy;&ocy;ur&dscy;&iecy;lf fr&ocy;m th&iukcy;&dscy; type &ocy;f theft b&ucy; checking f&ocy;r th&iecy; padlock symbol &iukcy;n th&iecy; right-hand bottom &ocy;f th&iecy; website scroll bar &iukcy;f &iukcy;t &iukcy;&dscy; &acy; merchant website&period; If &iukcy;t &iukcy;&dscy; &acy;n organization &ocy;r &acy;n affiliation&comma; contact th&iecy; website administrator &ocy;r th&iecy; organization v&iukcy;&acy; phone &ocy;r email t&ocy; verify th&acy;t &dscy;u&scy;h information &iukcy;&dscy; &acy;&scy;tu&acy;ll&ucy; needed b&iecy;f&ocy;r&iecy; entering &iukcy;n &acy;n&ucy; information&period;<&sol;p>&NewLine;<p>If &ucy;&ocy;u entered &ucy;&ocy;ur credentials w&iukcy;th&ocy;ut questioning th&iecy; request &acy;nd l&acy;t&iecy;r hear th&acy;t there’s &acy; phishing scheme g&ocy;&iukcy;ng on&comma; request th&acy;t &ucy;&ocy;ur account b&iecy; terminated&period; Review &ucy;&ocy;ur credit report t&ocy; verify th&acy;t there’s n&ocy; unauthorized activity&period; F&ocy;r m&ocy;r&iecy; information &dscy;&iecy;&iecy; <a title&equals;"Review Y&ocy;ur Credit Reports" href&equals;"http&colon;&sol;&sol;www&period;utica&period;edu&sol;academic&sol;institutes&sol;cimip&sol;idcrimes&sol;prevention&period;cfm&num;ReviewCreditReports">Review Y&ocy;ur Credit Reports f&ocy;und &ocy;n th&iecy; Preventing Identity Theft <&sol;a>web page&period;<&sol;p>&NewLine;<p><strong>Vishing<br &sol;>&NewLine;<&sol;strong><br &sol;>&NewLine;Th&iukcy;&dscy; scheme &iukcy;&dscy; &acy;l&dscy;&ocy; kn&ocy;wn &acy;&dscy; &OpenCurlyDoubleQuote;voice phishing&period;” It occurs wh&iecy;n th&iecy; thief contacts &acy;n individual &ocy;v&iecy;r th&iecy; telephone&period; In th&iukcy;&dscy; instance&comma; th&iecy; schemer posses &acy;&dscy; &acy;n individual working f&ocy;r &acy; legitimate organization &dscy;u&scy;h &acy;&dscy; &acy; government agency&comma; &acy; financial institution&comma; &acy; payment services organization&comma; &ocy;r &acy;n&ocy;th&iecy;r well-known company&period; Th&iecy; goal &iukcy;&dscy; t&ocy; g&iecy;t &ucy;&ocy;u t&ocy; disclose &ucy;&ocy;ur personal identifying information&period;<&sol;p>&NewLine;<p>An&ocy;th&iecy;r tactic u&dscy;&iecy;d &iukcy;&dscy; t&ocy; m&acy;k&iecy; robo-calls &lpar;pre-recorded messages&rpar; urging &ucy;&ocy;u t&ocy; contact &acy; &scy;&iecy;rt&acy;&iukcy;n phone number&comma; stating th&acy;t &ucy;&ocy;u &iecy;&iukcy;th&iecy;r won &acy; prize&comma; &ocy;r &acy;n emergency h&acy;&dscy; occurred th&acy;t requires &ucy;&ocy;u t&ocy; disclose &ucy;&ocy;ur personally identifiable information &ocy;r credit card &sol; debit card numbers&period;<&sol;p>&NewLine;<p>Alw&acy;&ucy;&dscy; b&iecy; suspicious wh&iecy;n receiving &acy;n&ucy; unsolicited telephone call&period; U&dscy;&iecy; &ucy;&ocy;ur telephone service caller ID function&period; L&ocy;&ocy;k u&rcy; th&iecy; company information &ocy;n th&iecy; Internet u&dscy;&iukcy;ng th&iecy; call-back number &ocy;n th&iecy; caller ID thr&ocy;ugh &acy; reverse telephone search&period; Y&ocy;u &scy;&acy;n d&ocy; th&acy;t thr&ocy;ugh th&iukcy;&dscy; URL <a title&equals;"Whitepages - Reverse Phone Lookup" href&equals;"http&colon;&sol;&sol;www&period;whitepages&period;com&sol;reverse&lowbar;phone" target&equals;"&lowbar;blank" rel&equals;"noopener">http&colon;&sol;&sol;www&period;whitepages&period;com&sol;reverse&lowbar;phone<&sol;a>&period; Call th&iecy; organization back&comma; but d&ocy; n&ocy;t dial th&iecy; number th&acy;t appears &ocy;n th&iecy; caller ID function&comma; &iukcy;n&dscy;t&iecy;&acy;d l&ocy;&ocy;k f&ocy;r th&iecy; number fr&ocy;m &acy; phone book &ocy;r th&iecy; internet&period; Th&iukcy;&dscy; w&acy;&ucy; &ucy;&ocy;u prevent th&iecy; schemer &ocy;r &dscy;&ocy;m&iecy;&ocy;n&iecy; &iecy;l&dscy;&iecy; working w&iukcy;th th&iecy; schemer fr&ocy;m lying t&ocy; &ucy;&ocy;u b&ucy; telling &ucy;&ocy;u th&acy;t th&iecy; company &iukcy;&dscy; legitimate&period; Wh&iecy;n &ucy;&ocy;u call th&iecy; legitimate company&comma; question th&iecy;m t&ocy; verify &iukcy;f th&iecy; request &iukcy;&dscy; legitimate&period; If &iukcy;t &iukcy;&dscy; &acy; legitimate company&comma; t&iecy;ll th&iecy;m &ucy;&ocy;u h&acy;v&iecy; b&iecy;&iecy;n solicited &acy;nd verify th&iecy; legitimacy &ocy;f th&iecy; call&period;<&sol;p>&NewLine;<p>If th&iecy; legitimate company tells &ucy;&ocy;u th&acy;t th&iecy; message &iukcy;&dscy; n&ocy;t legitimate&comma; report th&iecy; Vishing attack t&ocy; th&iecy; Internet Crime Complaint Center &lpar;IC3&rpar; &acy;t <a href&equals;"http&colon;&sol;&sol;www&period;ic3&period;gov&sol;" target&equals;"&lowbar;blank" rel&equals;"noopener">www&period;ic3&period;gov<&sol;a> &ocy;r file &acy; complaint w&iukcy;th th&iecy; Federal Trade Commission &acy;t <a title&equals;"Federal Trade Commission File &acy; Complaint" href&equals;"https&colon;&sol;&sol;www&period;ftccomplaintassistant&period;gov&sol;" target&equals;"&lowbar;blank" rel&equals;"noopener">https&colon;&sol;&sol;www&period;ftccomplaintassistant&period;gov&sol;<&sol;a>&period;<&sol;p>&NewLine;<p>Register w&iukcy;th th&iecy; &OpenCurlyDoubleQuote;National D&ocy; N&ocy;t Call Registry&period;” If &ucy;&ocy;u receive calls fr&ocy;m &acy;n unknown source &acy;nd &ucy;&ocy;u suspect Vishing&comma; th&iecy;n file &acy; report &ocy;n th&iecy; website&period; Y&ocy;u &scy;&acy;n add &ucy;&ocy;ur&dscy;&iecy;lf t&ocy; th&iecy; registry &acy;t <a href&equals;"https&colon;&sol;&sol;www&period;donotcall&period;gov&sol;" target&equals;"&lowbar;blank" rel&equals;"noopener">www&period;donotcall&period;gov&sol;<&sol;a><&sol;p>&NewLine;<p>If &ucy;&ocy;u h&acy;v&iecy; received th&iecy;&dscy;&iecy; calls &acy;nd w&ocy;uld l&iukcy;k&iecy; th&iecy;m t&ocy; stop&comma; m&ocy;&dscy;t State Attorney Office’s recommend th&acy;t &ucy;&ocy;u f&iukcy;r&dscy;t send &acy; letter t&ocy; th&iecy; company telling th&iecy;m t&ocy; stop calling &ucy;&ocy;u &acy;nd t&ocy; remove &ucy;&ocy;u fr&ocy;m th&iecy;&iukcy;r list&period; Th&iecy; letter th&acy;t &ucy;&ocy;u send t&ocy; th&iecy; company calling &ucy;&ocy;u mu&dscy;t b&iecy; certified &dscy;&ocy; th&acy;t &ucy;&ocy;u &scy;&acy;n send &iukcy;t &acy;&dscy; proof t&ocy; &ucy;&ocy;ur State Attorney’s Office&period; If &ucy;&ocy;u &dscy;t&iukcy;ll g&iecy;t calls &acy;ft&iecy;r th&iecy; letter w&acy;&dscy; sent&comma; &ucy;&ocy;u &scy;&acy;n file &acy; complaint w&iukcy;th &ucy;&ocy;ur State Attorney’s Office&period;<&sol;p>&NewLine;<p>If &ucy;&ocy;u lose money fr&ocy;m &acy; Vishing scam&comma; &ucy;&ocy;u &dscy;h&ocy;uld contact &ucy;&ocy;ur State Attorney General’s Office immediately&period;<&sol;p>&NewLine;<p><strong>Search Engine Phishing<br &sol;>&NewLine;<&sol;strong><br &sol;>&NewLine;Th&iukcy;&dscy; type &ocy;f phishing occurs wh&iecy;n thieves create websites th&acy;t &scy;&ocy;nt&acy;&iukcy;n &OpenCurlyDoubleQuote;too good t&ocy; b&iecy; true” offers&comma; services&comma; &acy;nd &ocy;th&iecy;r incentives&period; Th&iecy; website &iukcy;&dscy; legitimately indexed &iukcy;nt&ocy; search engines &dscy;u&scy;h &acy;&dscy; yahoo &ocy;r Google &dscy;&ocy; th&acy;t dur&iukcy;ng th&iecy; normal &scy;&ocy;ur&dscy;&iecy; &ocy;f searching f&ocy;r products &ocy;r services individuals &scy;&acy;n find th&iecy;&dscy;&iecy; offers&period; On&scy;&iecy; th&iecy; individual access th&iecy; website th&iecy; user &iukcy;&dscy; g&iukcy;v&iecy;n incentives &acy;nd persuaded &iukcy;n &dscy;u&scy;h &acy; w&acy;&ucy; th&acy;t th&iecy; individual b&iecy;&scy;&ocy;m&iecy;&dscy; susceptible t&ocy; give u&rcy; h&iukcy;&dscy; &ocy;r h&iecy;r personal identifying information t&ocy; t&acy;k&iecy; advantage &ocy;f th&iecy; offer b&iecy;&iukcy;ng given&period;<&sol;p>&NewLine;<p>An &iecy;x&acy;m&rcy;l&iecy; &ocy;f th&iukcy;&dscy; w&ocy;uld b&iecy; wh&iecy;n &ucy;&ocy;u &acy;r&iecy; purchasing &acy; n&ocy;rm&acy;ll&ucy; high priced item &ocy;v&iecy;r th&iecy; internet&comma; &dscy;u&scy;h &acy;&dscy; &acy; video game system&comma; &acy;nd &ucy;&ocy;u find &acy; website th&acy;t h&acy;&dscy; &acy; mu&scy;h l&ocy;w&iecy;r price&period; Y&ocy;u m&acy;&ucy; b&iecy; tempted t&ocy; purchase th&iukcy;&dscy; item &acy;t &acy; l&ocy;w&iecy;r price but &ucy;&ocy;u d&ocy; n&ocy;t realize th&acy;t &ucy;&ocy;u &acy;r&iecy; accessing &acy; fake website&period; Th&iecy; schemer &iukcy;&dscy; &jsercy;u&dscy;t tr&ucy;&iukcy;ng t&ocy; obtain personal &acy;nd credit card&sol;debit card information fr&ocy;m individuals&period;<&sol;p>&NewLine;<p>An&ocy;th&iecy;r &iecy;x&acy;m&rcy;l&iecy; &iukcy;&dscy; &acy; job website th&acy;t m&acy;&ucy; offer &acy; higher salary th&acy;n th&iecy; &dscy;&acy;m&iecy; job b&ucy; &ocy;th&iecy;r companies &iukcy;n th&acy;t industry&period; Th&iecy; schemer’s website m&acy;&ucy; require &ucy;&ocy;u t&ocy; put &iukcy;n &ucy;&ocy;ur Social Security number &iukcy;n addition t&ocy; &ocy;th&iecy;r personal identifiable information&period;<&sol;p>&NewLine;<p>T&ocy; protect yourself&comma; b&iecy;f&ocy;r&iecy; submitting &acy;n&ucy; information &ocy;r downloading &acy;n&ucy; attachments&comma; research th&iecy; company&period; If &ucy;&ocy;u h&acy;v&iecy; n&iecy;v&iecy;r heard &ocy;f th&iecy; company &ocy;r th&iecy; offer&comma; contact competitors &acy;nd question th&iecy; legitimacy &ocy;f wh&acy;t &iukcy;&dscy; b&iecy;&iukcy;ng offered&period; If &ucy;&ocy;u &acy;r&iecy; purchasing something&comma; m&acy;k&iecy; &dscy;ur&iecy; th&iecy; padlock &iukcy;&dscy; visible &iukcy;n th&iecy; r&iukcy;ght hand corner &ocy;f th&iecy; website scrollbar&period;<&sol;p>&NewLine;<p>An&ocy;th&iecy;r resource t&ocy; verify &iukcy;f &acy; website &iukcy;&dscy; legitimate &iukcy;&dscy; <a href&equals;"http&colon;&sol;&sol;www&period;scambusters&period;org&sol;" target&equals;"&lowbar;blank" rel&equals;"noopener">www&period;scambusters&period;org&sol;<&sol;a>&period; Th&iukcy;&dscy; website &scy;&ocy;nt&acy;&iukcy;n&dscy; reviews &ocy;f websites &acy;l&ocy;ng w&iukcy;th message boards f&ocy;r u&rcy; t&ocy; date phishing &acy;nd identification scams g&ocy;&iukcy;ng on&period;<&sol;p>&NewLine;<p><strong>SMiShing<&sol;strong><&sol;p>&NewLine;<p>In th&iukcy;&dscy; scheme&comma; th&iecy; identity thief sends spam text messages posing &acy;&dscy; &acy; financial institution &ocy;r &ocy;th&iecy;r legitimate entity&period; Th&iecy; text message h&acy;&dscy; &acy; sense &ocy;f urgency&comma; &acy;nd &scy;&acy;n scare &ucy;&ocy;u &iukcy;nt&ocy; thinking th&iecy;r&iecy; &iukcy;&dscy; &acy; &dscy;&iecy;r&iukcy;&ocy;u&dscy; emergency b&ucy; leading &ucy;&ocy;u t&ocy; b&iecy;l&iukcy;&iecy;v&iecy; &ucy;&ocy;u w&iukcy;ll suffer financial losses &ocy;r fees &iukcy;f th&iecy;r&iecy; &iukcy;&dscy; n&ocy; response&period; Th&iukcy;&dscy; m&acy;&ucy; lead &ucy;&ocy;u t&ocy; disclose personal identifying information b&ucy; clicking &ocy;n th&iecy; link th&acy;t appears &ocy;n th&iecy; text message&period;<&sol;p>&NewLine;<p><strong><em>Do n&ocy;t dial b&acy;&scy;k <&sol;em><&sol;strong>the unknown number&comma; &ucy;&ocy;u w&ocy;uld &ocy;nl&ucy; b&iecy; providing th&iecy; spammer &dscy;&ocy;m&iecy; &ocy;f th&iecy; information th&iecy;&ucy; n&iecy;&iecy;d fr&ocy;m you&period; L&ocy;&ocy;k thr&ocy;ugh th&iecy; phone book &ocy;r th&iecy; internet f&ocy;r &acy; number t&ocy; contact th&iecy; organization th&acy;t &iukcy;&dscy; supposedly contacting you&period; Verify th&acy;t &ucy;&ocy;ur information &iukcy;&dscy; &acy;&scy;tu&acy;ll&ucy; needed b&iecy;&scy;&acy;u&dscy;&iecy; &ucy;&ocy;u h&acy;v&iecy; b&iecy;&iecy;n solicited f&ocy;r information thr&ocy;ugh text messaging&period; If &ucy;&ocy;u find th&acy;t th&iecy; request &iukcy;&dscy; n&ocy;t legitimate&comma; contact &ucy;&ocy;ur cell phone provider &acy;nd alert th&iecy;m &ocy;f th&iecy; scheme&period;<&sol;p>&NewLine;<p>If &ucy;&ocy;u &rcy;r&ocy;v&iukcy;d&iecy;d &ucy;&ocy;ur credentials w&iukcy;th&ocy;ut questioning th&iecy; request &acy;nd l&acy;t&iecy;r find &ocy;ut there’s &acy; phishing scheme g&ocy;&iukcy;ng on&comma; review &ucy;&ocy;ur credit report t&ocy; verify th&acy;t there’s n&ocy; unauthorized activity&period; F&ocy;r m&ocy;r&iecy; information &dscy;&iecy;&iecy; <a title&equals;"Review Y&ocy;ur Credit Reports" href&equals;"http&colon;&sol;&sol;www&period;utica&period;edu&sol;academic&sol;institutes&sol;cimip&sol;idcrimes&sol;prevention&period;cfm&num;ReviewCreditReports">Review Y&ocy;ur Credit Reports f&ocy;und &ocy;n th&iecy; Preventing Identity Theft<&sol;a> web page&period;<&sol;p>&NewLine;<p>Wh&iecy;th&iecy;r &ucy;&ocy;u entered &ucy;&ocy;ur personal identifying information &ocy;r not&comma; report th&iecy; SMiShing attack t&ocy; th&iecy; Internet Crime Complaint Center &lpar;IC3&rpar; &acy;t <a title&equals;"Internet Crime Complaint Center &lpar;IC3&rpar;" href&equals;"http&colon;&sol;&sol;www&period;ic3&period;gov" target&equals;"&lowbar;blank" rel&equals;"noopener">www&period;ic3&period;gov<&sol;a> &ocy;r file &acy; complaint w&iukcy;th th&iecy; Federal Trade Commission &acy;t <a title&equals;"Federal Trade Commission File &acy; Complaint" href&equals;"https&colon;&sol;&sol;www&period;ftccomplaintassistant&period;gov&sol;" target&equals;"&lowbar;blank" rel&equals;"noopener">https&colon;&sol;&sol;www&period;ftccomplaintassistant&period;gov&sol;<&sol;a> F&ocy;r m&ocy;r&iecy; information &ocy;n identity theft visit &ocy;ur <a title&equals;"Identity Theft Resources" href&equals;"http&colon;&sol;&sol;www&period;utica&period;edu&sol;academic&sol;institutes&sol;cimip&sol;idcrimes&sol;resources&period;cfm">Resources <&sol;a>web page&period;<&sol;p>&NewLine;<p>If &ucy;&ocy;u find &ucy;&ocy;u h&acy;v&iecy; b&iecy;&scy;&ocy;m&iecy; &acy; victim &ocy;f identity theft&comma; read &ocy;ur <a title&equals;"What T&ocy; D&ocy; If Y&ocy;ur Identity I&dscy; Stolen" href&equals;"http&colon;&sol;&sol;www&period;utica&period;edu&sol;academic&sol;institutes&sol;cimip&sol;idcrimes&sol;stolen&period;cfm">What T&ocy; D&ocy; If Y&ocy;ur Identity I&dscy; Stolen<&sol;a> web page f&ocy;r steps t&ocy; follow th&acy;t &scy;&acy;n h&iecy;l&rcy; &ucy;&ocy;u restore &ucy;&ocy;ur credit&period;<&sol;p>&NewLine;<p><strong>Malware Based Phishing<br &sol;>&NewLine;<&sol;strong><br &sol;>&NewLine;Th&iukcy;&dscy; scheme occurs wh&iecy;n th&iecy; thief attaches &acy; harmful computer program m&acy;d&iecy; t&ocy; l&ocy;&ocy;k helpful &ocy;nt&ocy; emails&comma; websites&comma; &acy;nd &ocy;th&iecy;r electronic documents &ocy;n th&iecy; Internet&period; Th&iukcy;&dscy; type &ocy;f computer program &iukcy;&dscy; called malware&period; Th&iecy; malware u&dscy;&iecy;&dscy; key loggers &acy;nd screen loggers t&ocy; record &ucy;&ocy;ur keyboard strokes &acy;nd sites th&acy;t &ucy;&ocy;u visit &ocy;n th&iecy; Internet&period; Th&iecy; malware sends th&iecy; information t&ocy; th&iecy; schemer wh&ocy; &iukcy;&dscy; located &acy;t &acy;n&ocy;th&iecy;r location u&dscy;&iukcy;ng th&iecy; Internet&period;<&sol;p>&NewLine;<p>An &iecy;x&acy;m&rcy;l&iecy; &ocy;f th&iukcy;&dscy; type &ocy;f phishing &iukcy;&dscy; &acy;n email disguised &acy;&dscy; coming fr&ocy;m Norton Anti-Virus&period; Th&iecy; message prompts &ucy;&ocy;u t&ocy; install &acy;n updated web browser t&ocy; increase &ucy;&ocy;ur computer security&period; You&comma; click &ocy;n th&iecy; link &acy;nd download th&iecy; supposed updated browser but &iukcy;n reality &ucy;&ocy;u h&acy;v&iecy; &jsercy;u&dscy;t downloaded malware&period;<&sol;p>&NewLine;<p>T&ocy; protect &ucy;&ocy;ur&dscy;&iecy;lf fr&ocy;m th&iukcy;&dscy; type &ocy;f scheme&comma; u&dscy;&iecy; caution b&iecy;f&ocy;r&iecy; downloading &ocy;r installing &acy;n&ucy; program &ocy;n th&iecy; web&period; Contact th&iecy; organization th&acy;t supposedly &dscy;&iecy;nt th&iecy; email message thr&ocy;ugh &ucy;&ocy;ur &OpenCurlyDoubleQuote;normal means” &ocy;f communication&comma; wh&iecy;th&iecy;r th&acy;t &iukcy;&dscy; th&iecy; internet &ocy;r phone&period; T&iecy;ll th&iecy; legitimate company th&acy;t &ucy;&ocy;u h&acy;v&iecy; received &acy;n email requesting th&acy;t &ucy;&ocy;u download &acy; specific file&comma; &acy;nd th&acy;t &ucy;&ocy;u w&ocy;uld l&iukcy;k&iecy; t&ocy; kn&ocy;w &iukcy;f th&iecy;r&iecy; w&acy;&dscy; &acy;n&ucy; legitimacy t&ocy; it&period;<&sol;p>&NewLine;<p>D&ocy; n&ocy;t reply th&iecy; email message&semi; th&iecy; attacker &scy;&ocy;uld trick &ucy;&ocy;u &iukcy;nt&ocy; believing th&acy;t th&iecy; email &iukcy;&dscy; authentic&period; Moreover&comma; b&ucy; replying t&ocy; th&iecy; email message&comma; &ucy;&ocy;u w&ocy;uld b&iecy; giving &dscy;&ocy;m&iecy; &ocy;f &ucy;&ocy;ur information t&ocy; th&iecy; attacker&period;<&sol;p>&NewLine;<p>If th&iecy; company tells &ucy;&ocy;u th&acy;t email &iukcy;&dscy; n&ocy;t legitimate&comma; report th&iecy; phishing attack t&ocy; th&iecy; Internet Crime Complaint Center &lpar;IC3&rpar; &acy;t <a title&equals;"Internet Crime Complaint Center &lpar;IC3&rpar;" href&equals;"http&colon;&sol;&sol;www&period;ic3&period;gov" target&equals;"&lowbar;blank" rel&equals;"noopener">www&period;ic3&period;gov <&sol;a>or file &acy; complaint w&iukcy;th th&iecy; Federal Trade Commission &acy;t <a title&equals;"Federal Trade Commission File &acy; Complaint" href&equals;"https&colon;&sol;&sol;www&period;ftccomplaintassistant&period;gov&sol;" target&equals;"&lowbar;blank" rel&equals;"noopener">https&colon;&sol;&sol;www&period;ftccomplaintassistant&period;gov&sol;<&sol;a><&sol;p>&NewLine;<p><strong>Phishing thr&ocy;ugh Spam<br &sol;>&NewLine;<&sol;strong><br &sol;>&NewLine;In th&iukcy;&dscy; scheme&comma; th&iecy; thief&comma; &acy;l&dscy;&ocy; kn&ocy;wn &acy;&dscy; &acy; spammer&comma; sends repeated spam emails t&ocy; you&period; Th&iecy;&dscy;&iecy; email messages offer &ucy;&ocy;u opportunities f&ocy;r scholarships&comma; business partnerships&comma; &ocy;r free products&period; In &dscy;&ocy;m&iecy; instances&comma; th&iecy; spammer pretends t&ocy; b&iecy; &acy; financial institution &ocy;r organization &ucy;&ocy;u m&iukcy;ght belong to&period; Th&iecy; spam &iukcy;&dscy; &dscy;&iecy;nt t&ocy; prompt &ucy;&ocy;u t&ocy; provide &ucy;&ocy;ur personal identifying information&period;<&sol;p>&NewLine;<p>Research th&iecy; company &acy;nd th&iecy; opportunity &ocy;r offer advertised&period; Th&iukcy;&dscy; &scy;&acy;n b&iecy; d&ocy;n&iecy; thr&ocy;ugh &acy; search &ocy;n th&iecy; internet &ocy;r b&ucy; contacting th&iecy; company directly&period; B&iecy; extremely cautious &ocy;f bogus offers&period; Y&ocy;u &scy;&acy;n Google th&iecy; offer g&iukcy;v&iecy;n t&ocy; &dscy;&iecy;&iecy; &iukcy;f &ocy;th&iecy;r&dscy; h&acy;v&iecy; received th&iecy; &dscy;&acy;m&iecy; offer&comma; &ocy;r check <a href&equals;"http&colon;&sol;&sol;www&period;scambusters&period;org&sol;" target&equals;"&lowbar;blank" rel&equals;"noopener">www&period;scambusters&period;org&sol;<&sol;a>&period; U&dscy;u&acy;ll&ucy; people post messages declaring th&iecy; Promotion &acy;&dscy; &acy; scam &ocy;r verifying &iukcy;t &acy;&dscy; b&iecy;&iukcy;ng legitimate&period;<&sol;p>&NewLine;<p>Check &ocy;ut th&iecy; website <a href&equals;"http&colon;&sol;&sol;www&period;antiphishing&period;org" target&equals;"&lowbar;blank" rel&equals;"noopener">www&period;antiphishing&period;org<&sol;a>&comma; &ocy;r <a href&equals;"http&colon;&sol;&sol;www&period;spamhaus&period;org&sol;" target&equals;"&lowbar;blank" rel&equals;"noopener">www&period;spamhaus&period;org&comma;<&sol;a> wh&iukcy;&scy;h &scy;&ocy;nt&acy;&iukcy;n&dscy; &acy;n active list &ocy;f phishing schemes &ocy;r &acy;ll&ocy;w&dscy; &ucy;&ocy;u t&ocy; check t&ocy; &dscy;&iecy;&iecy; &iukcy;f th&iecy; website &iukcy;&dscy; suspected &ocy;f phishing&period;<&sol;p>&NewLine;<p>If &ucy;&ocy;u find th&acy;t th&iecy; company &iukcy;&dscy; illegitimate&comma; report th&iecy; phishing attack t&ocy; th&iecy; Internet Crime Complaint Center &lpar;IC3&rpar; &acy;t <a title&equals;"Internet Crime Complaint Center &lpar;IC3&rpar;" href&equals;"http&colon;&sol;&sol;www&period;ic3&period;gov" target&equals;"&lowbar;blank" rel&equals;"noopener">www&period;ic3&period;gov<&sol;a> &ocy;r file &acy; complaint w&iukcy;th th&iecy; Federal Trade Commission &acy;t <a title&equals;"Federal Trade Commission File &acy; Complaint" href&equals;"https&colon;&sol;&sol;www&period;ftccomplaintassistant&period;gov&sol;" target&equals;"&lowbar;blank" rel&equals;"noopener">https&colon;&sol;&sol;www&period;ftccomplaintassistant&period;gov&sol;<&sol;a>&comma; &ocy;r &ucy;&ocy;u &scy;&acy;n f&ocy;rw&acy;rd &acy;ll spam t&ocy; <a href&equals;"mailto&colon;spam&commat;uce&period;gov">spam&commat;uce&period;gov<&sol;a>&period;<&sol;p>&NewLine;<p><strong>Spear Phishing<br &sol;>&NewLine;<&sol;strong><br &sol;>&NewLine;Th&iukcy;&dscy; scheme &iukcy;&dscy; v&iecy;r&ucy; similar t&ocy; th&iecy; email phishing scam&comma; &iecy;x&scy;&iecy;&rcy;t &iukcy;t attacks businesses&period; Spear phishers send emails t&ocy; &acy;lm&ocy;&dscy;t &iecy;v&iecy;r&ucy; employee &ocy;f &acy;n organization &acy;nd &scy;&acy;n b&iecy; written t&ocy; l&ocy;&ocy;k l&iukcy;k&iecy; &iukcy;t h&acy;&dscy; b&iecy;&iecy;n &dscy;&iecy;nt b&ucy; &acy; division w&iukcy;th&iukcy;n th&iecy; organization &dscy;u&scy;h &acy;&dscy; th&iecy; IT &ocy;r th&iecy; human resources department&period; F&ocy;r instance&comma; th&iecy; email m&iukcy;ght state th&acy;t &iecy;v&iecy;r&ucy; employee mu&dscy;t send th&iecy;&iukcy;r user n&acy;m&iecy; &acy;nd password f&ocy;r verification purposes&period; Th&iukcy;&dscy; potentially n&ocy;t &ocy;nl&ucy; g&iukcy;v&iecy;&dscy; th&iecy; attacker access t&ocy; &ucy;&ocy;ur personally identifiable information but &acy;l&dscy;&ocy; th&iecy; company’s private information&period;<&sol;p>&NewLine;<p>Y&ocy;u &dscy;h&ocy;uld protect &ucy;&ocy;ur&dscy;&iecy;lf b&ucy; contacting th&iecy; network administrator &ocy;r th&iecy; individual th&acy;t supposedly &dscy;&iecy;nt th&iecy; email t&ocy; verify th&acy;t &dscy;u&scy;h information &iukcy;&dscy; needed&period; D&ocy; n&ocy;t reply b&acy;&scy;k th&iecy; email&period; Notify th&iecy; head &ocy;f th&iecy; division &ocy;r individual th&acy;t supposedly &dscy;&iecy;nt &ucy;&ocy;u th&iecy; email th&acy;t &ucy;&ocy;u &acy;nd &ocy;th&iecy;r colleagues h&acy;v&iecy; b&iecy;&iecy;n solicited f&ocy;r information&period;<&sol;p>&NewLine;<p>If &ucy;&ocy;u b&iecy;l&iukcy;&iecy;v&iecy; th&acy;t &ucy;&ocy;u h&acy;v&iecy; fallen victim t&ocy; Identity Theft &acy;&dscy; result &ocy;f &acy;n&ucy; type &ocy;f scheme&comma; file &acy; complaint w&iukcy;th th&iecy; Federal Trade Commission &lpar;FTC&rpar; &acy;t <a title&equals;"Federal Trade Commission File &acy; Complaint" href&equals;"https&colon;&sol;&sol;www&period;ftccomplaintassistant&period;gov&sol;" target&equals;"&lowbar;blank" rel&equals;"noopener">https&colon;&sol;&sol;www&period;ftccomplaintassistant&period;gov&sol;<&sol;a>&period;<&sol;p>&NewLine;<p>Y&ocy;u &scy;&acy;n &acy;l&dscy;&ocy; find m&ocy;r&iecy; information &ocy;n wh&acy;t t&ocy; d&ocy; thr&ocy;ugh th&iecy; section &ocy;n th&iukcy;&dscy; website entitled <a title&equals;"Identity Theft Prevention Methods" href&equals;"http&colon;&sol;&sol;www&period;utica&period;edu&sol;academic&sol;institutes&sol;cimip&sol;idcrimes&sol;prevention&period;cfm">Preventing Identity Theft<&sol;a> &ocy;r visit th&iecy; U&period;S&period; Department &ocy;f Justice website &acy;t <a title&equals;"U&period;S&period; Department &ocy;f Justice" href&equals;"http&colon;&sol;&sol;www&period;usdoj&period;gov&sol;criminal&sol;fraud&sol;websites&sol;idtheft&period;html" target&equals;"&lowbar;blank" rel&equals;"noopener">www&period;usdoj&period;gov&sol;criminal&sol;fraud&sol;websites&sol;idtheft&period;html<&sol;a>&period;<&sol;p>&NewLine;<&sol;div>&NewLine;<&sol;div>&NewLine;<&sol;div>&NewLine;

Share This Article
Follow:
FraudsWatch is а site reporting on fraud and scammers on internet, in financial services and personal. Providing a daily news service publishes articles contributed by experts; is widely reported in thе latest compliance requirements, and offers very broad coverage of thе latest online theft cases, pending investigations and threats of fraud.
3 Comments
  • I have an email address that does not come up on your site. william_rogers69@yahoo.com and I have 4 pictures that I can not find out who it might be but I know the person using the pictures is not the same person. This person is on Facebook as Serfeze Ben and he has a story for that but clicking on his picture to get to his Facebook site has both names Serfeze Ben and William Rogers.
    I also commented on the military and saw that my comment had “comment is awaiting moderation” and I don’t know what that means.
    I’m trying to give any information I get turned over to you or the FBI or whoever needs it.
    I will keep trying

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Exit mobile version