Consumer Protection | Business Protection

Protect a Deceased Loved One from ID Theft

January 25th, 2016

Jackie here. The days and weeks after a loved one passes away are often very difficult for family members and friends. While you’re mourning, many identity thieves are busy capitalizing on your deceased relative’s credit. What can you do to prevent ID theft after the death of a loved one? Here are some tips:

Contact the Credit Bureaus

After a loved one dies, you’ll need to take a few steps to shut down their credit and lock up their identity. Contact each of the three credit bureaus (Experian, TransUnion, and Equifax) as quickly as possible and let them know about the death. The Social Security Administration will eventually do this, but it can take months and thieves often act quickly.

If you’re the executor of the estate, a spouse, or a child, write the credit bureaus and enclose a copy of the death certificate to ensure that no new credit can be issued in the person’s name. You’ll also need to provide proof that you’re the executor or that you have the legal right to act on behalf of the deceased in this matter. Certified letters are the best choice.

Contact Creditors

You’ll also want to get in touch with all of the deceased’s creditors. This will start the process of closing their accounts and settling up with the estate. If your loved one has been receiving Social Security, you’ll want to contact the Social Security Administration to ensure that benefits are stopped.


Is Your Mail Putting You at Risk for ID Theft?

October 26th, 2015

Jackie here. Does your mail put you at an increased risk of ID theft? We talk often about digital risks, but just like your inbox, your physical mailbox is packed with personal information. Let’s take a quick quiz and evaluate your mail practices. What are you doing well? What do you need to change?

Do you have a locking mailbox?- A locking mailbox is one of the easiest ways to protect your mail. Get a locking box with a key to protect against mail theft.

Do you collect your mail every day?- Don’t leave your mail sitting in the box, especially overnight. Bring it in as quickly as possible after it is delivered. If you’ll be out of town, put your mail on hold or arrange for someone to pick it up daily.

Do you pay bills online when you can?- Signing up for e-bills and online payments can keep thieves from accessing your credit card bills, bank statements, and other important documents. If thieves get access to a check of yours, they might be able to use a technique known as washing to change the payees name to theirs.

Do you take outgoing mail to the post office?- That little red flag on the mailbox alerts others to something inside. If you need to mail something containing personal information, take it to the post office.

Do you look for signs of id theft?- Prevention is important, but so is early detection. If you do become a victim of ID theft, you’ll want to find out as quickly as possible. Check your bank and credit card statements as frequently as you can. Examine your credit report at least once a year.

In a digital age, it is easy to forget that a big source of information is sitting right outside your front door. Take the necessary steps today to protect your mail.

Tags: ,

Cybersecurity Awareness and the Aftermath of Identity Theft

September 25th, 2015

AllClear ID proudly sponsors and provides financial support to the ITRC. For more information on the ITRC’s financial support relationships please visit their website.”

As experts and advocates in the cybersecurity space gear up to host National Cybersecurity Awareness Month in a few short weeks, there’s no time like the present to take a closer look at some statistics regarding identity theft. One of the most comprehensive looks at the impact that this type of crime has on its victims is the Identity Theft Resource Center’s annual Aftermath report, which follows up with victims who’ve reached out to their center for support.

The 2014 report, which compiled all of the information over the course of the 2013 calendar year, offered some key findings for the cybersecurity community:
• Age, race, location, and income level had very little to do with rates of victimization.
• Utility and cell phone accounts are highly lucrative for identity thieves.
• Criminal, Government, and Medical identity theft are on the rise.
• Most victims reported less than satisfactory experiences in working with law enforcement to clear up this crime.
• 94.2% of the victims reported that they are still highly engaged on the internet and through their mobile devices, despite having their identities stolen.

One of the more telling findings about the annual survey has been the change in behavior that many of the victims experienced. Even though almost all of the victims have said they’re still highly engaged online, approximately half of them have adopted some new habits as a result. One of the most important habits is the routine perusal of their credit reports, something that many people overlook as a preventative measure.

Other proactive behaviors can prevent issues with some of the increasingly common forms of identity theft. The survey found that the majority of Medical identity theft victims—whose identities were used to acquire medical services—only discovered their identities had been used fraudulently after they were billed for medical services. At the same time, of the 40% of victims who reported they’d suffered Government identity theft—when a thief had used their identities to apply for benefits, commit tax return fraud, or other related behaviors—the majority of victims typically find out their identities have been stolen after their legitimate documents or applications (such as a tax return) are rejected for being duplicates.

The results of this year’s Aftermath Survey will be released on October 15th as part of National Cyber Security Awareness Month. It is the ITRC’s hope that the findings will encourage the public to take steps to protect their data and monitor their identities before a thief has a chance to use them, we can reduce the number of victims and minimize the damage. Next month, when NCSAM is in full swing, be sure to follow up on the educational and informative content that can help stop identity theft and turn these proactive behaviors into good habits.

Tags: ,

Lesser-Known Ways to Steal an Identity

June 17th, 2015

Jackie here. We talk a lot about checking your credit report and bank statements for signs of ID theft, but making fraudulent charges on your accounts isn’t the only way thieves can use your identity. Thieves also love using not-so-well-known methods for theft as they can often avoid detection for much longer. Which of these types of identity fraud were you aware of?

Health Insurance

Medical care can be expensive, making health insurance a gold mine for thieves. Thieves can steal your insurance information and pretend to be you at the doctor or pharmacy. This isn’t just a financial nightmare; it can also lead to serious medical problems including cancelled insurance and conflicting medical records (which can lead to treatment difficulties).

Medical ID theft is surprisingly common. It is estimated that at least 2.3 million American adults have fallen victim to medical ID theft and the number continues to grow. Resolution is difficult too. Only 10% of respondents in a Ponemon survey had satisfactorily resolved their problem.

Criminal Record

Some thieves commit criminal ID theft by giving another person’s name, driver’s license number, or SSN during a criminal investigation. This can lead to arrest warrants in your name for crimes you didn’t commit. Although this type of ID theft is concerning, it is luckily rather uncommon. Here are some tips if you do find yourself in trouble.

Social Media Accounts

Your social media accounts are vulnerable to hacking. Thieves can gain control of your accounts and use them to solicit money from friends and to spread malware and other harmful links. Hacking your actual accounts isn’t the only way thieves take advantage of your identity on social media; some thieves create secondary accounts using your name and your pictures to trick friends into “friending” you so the scammers can attempt to take advantage of them.

Tax Refund

Tax ID theft topped the list of FTC consumer complaints in 2014, with the problem only expected to continue growing. Tax ID theft occurs when thieves file taxes in your name and take your refund. One of the best ways to fight this problem is to be sure you file early.

Your Computer

Are identity thieves lurking in your computer? Thieves use malware, ransomware, and other types of malicious software to take over your computer. Thieves can track your typing to obtain your login credentials, lock up your computer until you pay a fee, and redirect you to their websites when you browse the web. Antivirus software is essential, as is keeping up on your updates. Here are some more tips for keeping your computer ID theft free.

Other Methods

While the methods listed above are some of the larger problems when it comes to lesser known types of ID theft, they aren’t the only things to watch out for. Thieves may also take advantage of your frequent flier miles, hotel points, gift cards, chat programs, etc. If it’s valuable, odds are thieves have found a way to take advantage.

Tags: , , ,

What You Should Know About Online Marketplaces

May 28th, 2015

AllClear ID proudly sponsors and provides financial support to the ITRC. For more information on the ITRC’s financial support relationships please visit their website.

Just about everything is online these days. Many items that used to require going to a store to purchase can now be acquired from the comfort of your living room or on the go with your smartphone or tablet. Shopping isn’t the only thing that can be done online, either. It’s also possible to look for jobs, apartments, and service providers online. While the rise of online marketplaces has made shopping, job hunting, and apartment searches more convenient, it has also made us more vulnerable to scams and identity theft. Here are some tips to protect yourself while using online marketplaces.

Tip #1:

Make sure that you do not give out your Personally Identifying Information (PII) until the right time. If a potential employer has not scheduled an in-person interview with you, but needs your Social Security number to run a background check, that’s a huge red flag. In addition, you should make sure that you have seen any housing you are looking at renting or buying before you offer up your PII or any type of deposit. You should do more than just drive by, as well. Just because a building is actually there doesn’t mean it is for rent, so do yourself a favor and ask questions of the landlord or manager and don’t be afraid to voice any concern you may have. Only once you are sure the property is legitimately available should you supply the information for a credit check needed to obtain the apartment.

Tip #2:

Avoid alternative payment methods when transacting online. Wire transfers, specifically via Western Union, are often used in scams. While this may be an obvious red flag when you are buying or selling something online, this can also be used in employment or housing scams. A potential employer may state that they will pay you via Western Union, or ask that you pay your first month’s rent via wire transfer. These are most likely scams and should be avoided. Other forms of payment that can be a red flag for fraud are cashier’s checks, money grams, and personal checks. These can be made fraudulently and liability will be transferred to the person taking the payment if false funds are deposited into their bank account.

Tip #3:

Most importantly, remember who is responsible for activities on online marketplaces. Most online marketplaces have a robust amount of information on avoiding scams while using their sites. Why do they do this? Because scammers are increasing their efforts to scam more and more people every day. You must remember, though, that online marketplaces ARE NOT, by law responsible for any nefarious activity taking place on their websites. Look at it this way – if you went into a department store and an employee ripped you off you could complain to the management of the department store and could reasonably expect for the situation to be resolved. This is not the case with sites such as Craigslist, eBay and others. The people you are doing transactions with, whether they be property managers, potential employers or merchants, are not associated with the site itself and therefore the site is not responsible for their actions. The bottom line is that if something does go wrong, there’s usually not going to be anyone to fix the problem for you.

All of these warnings make online marketplaces sound like risky places to conduct business. However, by being cautious with your information you can navigate your way through transactions to get what you need, when you need it. Keeping these tips in mind can help you avoid fraud, scams and identity theft.

Tags: ,

4 Key Pieces to Your Identity

May 18th, 2015

Jackie here. These days, it may seem like almost any bit of personal information about you can be used by fraudsters to commit ID theft. While methods are evolving, there are some standard pieces of information that make it much easier to pose as another person. Let’s take a look at what information thieves need to capitalize on your identity.

Your Name

You use it all the time. It’s on your name tag at work, proudly displayed across your social accounts, and something you share with the doctors, repair people, and even strangers at the grocery store. Your name is a big key to your identity. That doesn’t mean you should start keeping it a secret, though. Your name might be one key to your identity, but typically it must be paired with other information for ID theft to occur. What’s more, in some instances, ID thieves don’t use your real name at all, but instead pair other pieces of your identifying information with a different name.

Your Social Security Number

Who have you shared your SSN with lately? You might not openly tell this number to friends and family, but odds are you’ve given it to doctors, utility companies, and others more times than you realize over the years.

Your Address

Your address isn’t typically a secret (friends, family, and neighbors all know it), but it is an important part of your identity. With a name and an address, thieves can often access accounts, sometimes even sensitive ones. Your address can also be used to redirect mail, giving identity thieves a treasure trove of personal information. While you can’t keep your address a complete secret, you can take steps to better protect it. Don’t share it openly on sites like Facebook or Twitter. LexisNexis found that a surprising 20% of consumers admit to sharing their addresses on social media.

Your Date of Birth

If your PIN for your bank account is the year of your birth, change it immediately. Every combination of 19XX make up the top 20% of most common PIN numbers. Your birthdate can also be the final piece of identifying information to unlock various accounts.

These four keys to your identity are things we share daily. In fact, the only thing on this list that you don’t share often is your SSN. Do your best to protect your information, but know that it is out there. Watch closely for the signs of ID theft so you can catch it quickly if it does occur.

Tags: , ,

Spring Clean Your Identity

April 4th, 2015

Jackie here. Have you been neglecting your identity? In the daily hustle and bustle it is easy to let some important identity protecting tasks fall through the cracks. Just like you spring clean your house to get caught up once a year, take some time to spring clean your identity. Catch up on those tasks you’ve been forgetting and keep your identity a little safer. Here are some ideas:

Check Your Credit (and Clean it Up)- Have you ordered your free credit reports this year? Once a year you’re entitled to a free report from each of the credit bureaus. Get your reports by visiting If you notice any errors, correct them right away. If you see signs of ID theft, take action before the problem gets worse.

Opt Out- Are you getting unwanted credit card offers in the mail? Is your number on the Do Not Call Registry? Take a few minutes and opt-out to protect both your privacy and your identity. Here are a few opt-out options to consider:

Prescreened Credit Offers

Do Not Call Registry

Top Opt Outs from the World Privacy Forum- a great list of 10 opt-outs you should consider.

Shred- Unwanted paperwork can pile up. Take some time and get to shredding. Shred any paperwork with sensitive information that you no longer need, including old bills, medical statements and records, expired credit cards, bank statements, tax records, etc. Use a crosscut shredder to ensure your documents are really destroyed.

Change Your Passwords- Even if you’ve chosen strong passwords, it’s still a good idea to change them occasionally. If you haven’t changed your passwords lately, update them today!

Check Privacy Settings- When was the last time you checked your privacy settings on Facebook, Twitter, Google+ and other social accounts? This help sheet will walk you through the process on many of your favorite sites.

Re-Read Privacy Policies- Privacy policies might not be the most interesting reading around, but they are important. Review the privacy policies at your favorite websites and be aware of what you’re sharing.

Update- Is your anti-virus software up to date? What about your favorite apps and plug-ins? Update your computer, run an extra security scan, and make sure you’re protected.

Delete Old Apps- Remember that heartbeat tracking app you installed and used only once? Now’s the time to say goodbye. Go through your apps and delete any that you aren’t currently using. In addition, double check the information you are allowing your current apps to access – many automatically request access to data they do not need.

What will you do spring clean your identity this year?

Tags: , , , ,

Tips: The Legal System and ID Theft

March 14th, 2015

Jackie here. In most instances, identity theft is considered a crime and that means that your local courts and legal system may be able to offer some assistance in identity theft resolution. The availability will vary greatly depending on where you live, but here are a few resources from the Identity Theft Resource Center.

Your Local District Attorney’s Office

Many district attorney’s offices offer some sort of victim assistance for ID theft. Contact your local DA’s office and ask what programs are available. Your local office may have group meetings, victim counselors, packets of local resources, helplines, or informative websites to provide information.

File for Restitution

If you want to file for civil restitution after ID theft (especially common when the perpetrator was local), your local court is the place to start. Restitution can help cover expenses related to the theft (including postage, time off work, photocopies, faxes, etc.). In order to file a claim, you’ll need to keep detailed records and save receipts.

Get Your Credit Report

As an identity theft victim, you’re entitled to free copies of your credit report during the resolution process. Your police report and records of other legal filings can be used to prove that you’re entitled to these free reports. Just a note, under the Fair Credit Reporting Act, each of the 3 credit bureaus is required to provide you with a free copy of your credit report, at your request, once every 12 months. Visit or call 1-877-322-8228 to request your copy.

Letter of Clearance

If you’re a victim of criminal identity theft and are struggling with mistaken identity, a letter of clearance from the court can be used to prove your identity to law enforcement and help you avoid jail stays due to your identity theft.

For more tips about using the legal system to your advantage after identity theft, check out this great tip sheet from the ITRC.

Tags: , ,

5 Simple Steps for a Safer Identity

February 26th, 2015

Jackie here. ITRC president Eva Velasquez recently shared some ID theft tips we can all take advantage of. Often it’s the little things you do that make the biggest difference in keeping your identity safe.

Password Protect Your Phone- Is your phone password protected? If you haven’t taken the time yet to set up this simple, but essential identity protection, stop reading and go do it. Setting up a password just takes a few minutes and can keep your personal information safe should your phone be lost or stolen.

Keep Your SSN to Yourself- When companies ask for your Social Security Number, ask them why. In many instances, they don’t actually need it. What should you do when asked for your SSN? Eva Velasquez offers a simple solution, “You are free to tell the company that you do not give out your Social Security number, and that you’ll be happy to provide different information, such as your phone number or address.” In certain instances, however, companies do need you SSN to provide you the services you request.

Take Your Mail to the Post Office- Don’t drop that tax form or check into the mailbox outside of your house. Take it to the Post Office instead. If you’re mailing anything that contains personal information (including checks, health insurance statements, and tax documents), send it directly from the Post Office.

Change Your Password- Change your passwords often and while you’re at it, make sure you’re choosing strong ones. Hint: your birthdate or address is not a good choice.

File Your Taxes Early- We’ve told you before and we’ll tell you again, file your taxes as soon as possible. If you’re waiting to file, remember that the thieves are not. “If a thief gets there first, your legitimate return will be rejected for having a return already filed under your Social Security number.”

Take these 5 simple steps today for a safer identity.

Tags: , ,

Is Your Tax Refund Safe?

February 5th, 2015

Jackie here. Tax season is upon us and for some people that means returns are around the corner. While you’re hard at work preparing your tax documents, thieves are busy too, filing returns and claiming refunds that aren’t theirs. How can you protect your refund this tax season? Here are some tips from Time to get you started.

File Quickly- If you haven’t yet started on your taxes, start as soon as you can. Filing quickly can protect your refund by ensuring that you file under your identity before thieves do. Waiting until the last minute to file can greatly increase your risk of tax identity theft.

Minimize Your Risk- How big is your refund? If you’re getting back thousands this year, you might want to change your withholding to reduce the size of your refund. This won’t protect you from tax ID theft, but will minimize the amount of money that you have at risk should you fall victim.

Protect Your Information- All thieves need to file a fraudulent refund in your name is your birthdate and SSN. Protect these numbers. When possible, have tax forms (like W-2s, 1099s, mortgage interest statements) sent to you electronically. At the very least, bring your mail in as soon as possible; thieves often steal tax forms out of mailboxes at this time of the year.

Get a PIN (when it becomes available)- The IRS is launching a pilot program where taxpayers can obtain a personal identification number (PIN) to protect their identities. This special number must be included on all tax documents. Right now the service is only available to those that filed a return from Washington DC, Florida, or Georgia last year or those that were victims of tax ID theft. Get your PIN here if you qualify. (Once you opt in, you can’t opt out.)

Don’t Use Public Wi-Fi to File- If you file online, use a secure computer and a secure network. Never use public Wi-Fi to file your taxes.

Avoid Scams- Tax themed scams are rampant this time of the year. Remember, the IRS isn’t going to call you on the phone – they communicate via snail mail. Be very careful with the sharing of personal information to keep your tax refund safe.

For more tips about protecting your refund, check out this article from Time Magazine.

Tags: , ,

Healthcare Scams Abound During Open Enrollment

January 6th, 2015

Jackie here. We’re right in the middle of open enrollment season for insurance and that means that scammers are out in full force looking for opportunities to trick consumers out of their personal information. Be on the lookout for health care scams this time of year and use these tips to help spot and avoid scams.

Watch for Grammar and Spelling Errors- If you receive an email riddled with grammar and spelling errors, send it to your spam folder immediately. It is very unlikely that a legitimate company will send emails packed with errors. This is a great first level screening for any spam, healthcare related or otherwise.

Look Deeply at the Sender’s Address- Even emails that appear to be from your health insurance company could be from scammers. Hover over the sender’s address to see where the email is really coming from. – if the real address doesn’t match who is supposedly sending the email, use caution before you click any links or take any action.

Avoid Clicking Links- If an email asks you to click a link immediately to input personal information, don’t do it. This is a common tactic used to direct you to malicious sites that may install malware on your computer. Avoid clicking links in unsolicited emails.

ACA not “Obamacare”- Scammers often refer to the nation’s health law as Obamacare. While this is a commonly known nickname for the law (actually called the Affordable Care Act or ACA), you won’t see it on official insurance correspondence. If you see “Obamacare” know that the email is likely spam.

Call Customer Service Yourself- If you receive a call or email from your insurance company, call them back yourself using the number on your card. This is a great way to check in and make sure your coverage is setup and working without disclosing personal information to the caller. When in doubt, call yourself.

These simple tips will help you to avoid many of the healthcare scams this year. Check out more tips from the Identity Theft Resource Center (ITRC).

Tags: , , , , ,

Safer Holiday Shopping Without the Scams

December 9th, 2014

Jackie here. The holiday season is here and that means friends, family, hot cocoa, and of course, holiday shopping. As the holiday shopping season heats up, make sure you’re protecting yourself from ID theft and fraud. You aren’t the only one busy this time of year; fraudsters love using the chaos of the holidays to make a quick buck. These holiday shopping tips will help keep your family safe from ID theft this year.

Use Your Credit Card

If you missed our recent article on credit cards vs. debit cards check it out before you head out holiday shopping. Credit cards offer more fraud protections than other payment methods, making them one of the safer choices for holiday shopping.

Save Your Receipts

During the holidays when you’re making lots of purchases it can be hard to remember what you’ve spent and where. Save all your receipts including those for online purchases.

Check Your Statements

With your saved receipts in hand, checking your statements will be much easier. Double check amounts and purchases for any inaccuracies. If you notice a problem, report it to your financial institution quickly. With debit cards, you only have 2 business days to report fraud if you want to limit your maximum losses to $50.

Beware of Shopping Apps

Shopping on your phone is certainly convenient, but if you aren’t careful you might be sharing more information than you intend. Mobile shopping apps can collect a great deal of information about you including address, phone number, driver’s license number, and even your Social Security number. Before you install a shopping app, make sure you check the permissions and if you’re uncomfortable, find another way to buy the items you need.

Limit the Information You Share

Keeping your identity safe is all about limiting the information you share. Don’t give out your credit card number in exchange for an opportunity to win a gadget or gift card. Watch your inbox for phishing emails and don’t reply. Be very cautious about the information you provide this holiday season.

Not All Charities are Charitable

If you plan on making a donation to a charity, choose wisely. Charity scams are common year round. This guide from the FTC will help you spot charity scams and choose legitimate options for your donations. It is admirable to give back during the holidays, but you want to be sure that your generosity is actually helping those in need.

For more tips for safe holiday shopping, check out this guide from the FTC.

Tags: , , ,

Identity Theft Resource Center Radio Broadcast

November 6th, 2014

If you’re looking for a wonderful resource for all things identity theft related, head over to the Identity Theft Resource Center (ITRC). They have tons of free resources for identity theft victims, businesses, consumers, and others that are worried about ID theft. I was excited to discover that the ITRC president Eva Velasquez made a recent appearance on a San Diego radio show.

Listen to the full broadcast for yourself or keep reading for a few tips pulled from the show.

New Victim Every 3 Seconds- If you think you don’t need to protect yourself from ID theft, think again. According to Velasquez there is a new victim every 3 seconds. There are ways to minimize your risk, but there is no foolproof method to keep from becoming a victim with 100% certainty.

Some Types of ID Theft are Easier than Others to Resolve- Some types of ID theft are easily resolved while others can take much more effort. Simple credit card fraud is often resolved with just a phone call or two to your credit card company. More complicated cases can take many phone calls and several hours to resolve.

Thieves Keep Finding New Methods- Tax identity theft first became a headline-making issue in the 90s, but prior to that time, it just wasn’t something people even considered to be much of a risk. Thieves are going to keep finding new ways to use our information and data in the future. No one can predict with certainty how things will evolve going forward.

Not All Data Breaches are Equal- Some data breaches carry a larger impact for consumers than others. For example, a breach of payment information can be stopped by getting a new card (things are a bit easier with credit cards than with debit) while a breach of SSNs can lead to new accounts being opened in your name.

Use a Credit Card- If you can, use a credit card, especially when shopping online. Debit card fraud can clean out your bank account and make it hard to pay bills and access your cash while the issue is resolved. Credit cards make it a lot easier to resolve the problem and to keep access to your accounts should a compromise happen.

Ask Questions- If a company wants your SSN, ask why. Many times you won’t actually need to provide it. Ask companies how they plan to keep your information safe.

Don’t Check Email While Distracted- We are all at risk for phishing scams. Protect yourself by paying attention when checking your emails. If you’re distracted, wait to respond to emails that ask for personal information so you can take the time to research the sender and confirm that the request is legitimate.

Tags: , , , ,

Do Russian Hackers Have Your Information?

September 10th, 2014

Jackie here. More than a billion username and password combinations were recently stolen by Russian hackers along with more than 500 million email addresses. Here are some tips for protecting yourself in the aftermath of this heist.

Change Your Passwords Today

If you haven’t yet changed your passwords, do it today. You should change all of your passwords (and possibly your usernames) to your most sensitive accounts including bank accounts, email, and health insurance sites. While you’re at it, make sure that the new passwords are strong and unique. Include upper and lower case letters, symbols, and numbers when possible. Avoid words found in the dictionary.

Watch for Signs of a Problem

In instances such as these your information may have fallen into the wrong hands so keep a close watch on your accounts looking for signs of a problem. Don’t just be vigilant right now; you never know when your information might be compromised so always be aware. Unfamiliar charges, emails that appear to be from your bank or financial institution, and emails asking for personal information should be closely examined. Never click on links or reply with personal information to an unsolicited email. Instead visit the website of the company in question yourself using a known web address.

Check Your Credit Report and Card Statements

The best ways to deal with this hack are the same simple tactics we should use every day to protect against ID theft. Check your bank statements often and report any discrepancies to your bank. Also check your credit report at least once a year. You can get a free yearly report from
Learn more about the Russian hack here and get some tips from the FTC here.

Tags: , ,

Back to School – Backpack Safety

August 26th, 2014

Aaron here, AllClear ID Investigator. It’s that time of year again; summer is coming to a close. Many parents are going shopping for their kid’s school supplies and that perfect new backpack. However, most parents probably aren’t thinking about what personal information is being stored in this new backpack, nor would most be thinking of identity theft if the backpack was stolen.

Identity theft is at an all-time high; it seems almost everywhere you turn you are hearing something about a data breach and resulting identity theft. If an identity thief was to steal your child’s backpack would they find the key to your credit history? These days, children have all sorts of personal identifiable information stored in their backpacks and it’s important to take the time to learn about how that information could be used if it got into the wrong hands.

Below is a list of what most identity theft suspects would be looking for if they were to steal a child’s backpack, as well information on how to protect yourself in case this does happen.

  • 1. Child’s Smartphone
  • Most carriers have a simple code to access the actual account information. If a suspect were to get a hold of your child’s device they would potentially be able to order new services and wreak havoc on the account. Not only is the account at risk, but think about the contact information that your child may have on this device, and what risk occurs if this information was to get in the wrong hands. This type of intrusion causes issues like phishing emails, grandparent scams and malware installation. Not to mention the amount of notes and even passwords that parents and kids store in these devices.

    Ways to avoid these issues: Make sure you educate your child on the potential danger of this type of technology. Inform them about creative alpha numeric passwords. Also explain why certain types of sensitive information should not be stored in their device (like their SSN or any passwords). You can have your child set up the Find Me app, this app erases all content should someone ever steal the smart device your child has.

  • 2. Childs Laptop
  • Most everyone knows the risk of a laptop if it were to fall into the wrong hands. The same issues explained about the Smartphone can apply to this device as well. Now think about all the accounts that are tied to the parent and are also set up on the child’s laptop, apps like Netflix, Amazon, iTunes, and social media and most of these apps have it set to automatically log in once the child opens the device.
    Now think about all of the files, and emails that maybe saved on the child’s laptop, all of this PII (personal identifiable information) is a scammers dream. Everything from credit card information, addresses of family members, as well as birth dates.

    Ways to avoid these issues: Have your child make sure to log out of every online account that they have when they are done using it. Always make sure that no sensitive information is stored on a child’s laptop, and if it was handed down from the parent to the child, make sure to have all sensitive documentation deleted from the system. Make sure to educate on the importance of not storing user names and passwords on the device as well. Make sure that whatever password the child has up on the laptop is also shared with you.

  • 3. Name Tags and Keys to property
  • Most children will use a Karabiner attachment for the backpack to store keys and identifying name tags showing ownership. The problem that this causes is the potential risk of having a thief /robber show up at the home while away working. The best way to avoid this problem is not to put any address information and just to put a work contact phone number with the child/Parent’s name on it, no other information is necessary.

    Overall, child identity theft is a large issue and one we have done studies on in the past. While the options for protection are limited, the best protection starts at home, with you.

    Tags: , , ,

    Are You an Identity Theft Expert?

    August 15th, 2014

    Jackie here. When it comes to identity theft are you an expert or a novice? Check out this fun quiz from and see how you rank. If you’ve been reading our blog regularly you’ll probably score pretty well. After the quiz, come back here for additional resources that can help you if you struggled with some of the answers along the way.


    Passwords are the key to all our most sensitive online accounts. Your bank (and the money you keep in it) is only as secure as your online banking password. How secure is your password? This article from our blog will give you tips for making your passwords stronger.

    Social Security Numbers

    It seems like everyone wants your Social Security Number, from the doctor’s office to the electric company. Are you required to provide your SSN to everyone that asks? This fact sheet from the Privacy Rights Clearinghouse will help you determine when you must share your SSN and when you can safely decline. It’s usually a good idea to ask if another form of identification will suffice to limit how many people know your SSN.

    The IRS

    The IRS uses mail as their primary method of contact. If there’s a problem with your tax return you can expect to hear about via US Mail. Tax identity theft is a growing problem, so be on the lookout for scams related to your tax return. Anyone can fall victim to tax ID theft, even someone with extensive identity theft knowledge.

    Protect Personal Information

    “Big Data” knows a lot about each of us. We need to learn to safeguard our personal information, not just to protect from ID theft (although that is important), but also to preserve our privacy. Learn to read privacy policies so you know what information is being shared and collected about you.

    Is This Call Legitimate?

    When you get a call, don’t automatically trust the caller ID. This article from our blog will help you understand caller ID spoofing and how to avoid it.

    Credit Reports

    When was the last time you checked your credit report? Check as often as you can, but at least once a year. You can get your free annual reports from, the only source for your free yearly report.

    How did you do on the quiz? Do you have some brushing up you need to do? This quiz could be used as a tool to introduce id theft to teens and older children.

    Tags: ,

    Is Your Online Life Increasing Your Identity Theft Risk?

    June 11th, 2014

    Jackie here. If I were to take a quick peek at your social profiles, what would I learn? Would I know that you were out of town on vacation next week? Could I learn your birthdate, or the birthdates of your children? When we hop on Facebook (or other social media sites) we feel safe and secure. After all, we’re just sharing with friends. But, in reality, too much information shared has the potential to lead to ID theft. Here are some vital tips for keeping yourself safe.

    Read the Privacy Policy

    Do you read privacy policies? It is so easy to quickly glance over the legal information required to start an account without ever really discovering what permissions we are giving away. With companies that possess our most sensitive data, we need to know what rights we are granting and how our information might be used. Read the Terms and Conditions, Privacy Policies, and other important documents.

    Double Check Privacy Settings

    When you post to Facebook, who can see it? It’s always a good time to perform a privacy checkup on your social media accounts. Know what you’re sharing and who can see. Change settings and delete old posts if you’ve shared more than you’d like.

    How Could an Identity Thief Use This?

    It’s tempting to share every funny detail of your life with friends and family online, but we must remember that these details are very valuable to identity thieves. They can pair information mined from social media (think birth dates, answers to security questions, etc.) with information they’ve gathered about you to unlock your accounts and commit fraud. Before you post, think about how this information could be used by the wrong parties.

    Clean Out Your Friend List

    Before you accept a social media connection from a person, ask yourself if you really know them. We need to be careful about who we connect with online. Thieves and scammers may create fake accounts to gain access to your information. Knowing your connections personally will help to minimize your risk of falling victim to ID theft or fraud.

    Don’t make it easy on identity thieves and scammers. Take control of your social media profiles and stay in control. For more tips, check out this article from AZ Central.

    Tags: , , ,

    Identity Theft and New Graduates: A Survival Guide

    June 9th, 2014

    Jackie here. It’s graduation season. Congratulations to all of you new graduates out there! A graduation ceremony is a rite of passage, signaling that you are done with one chapter and ready to enter another. As you clutch that diploma and prepare to start a new life, bear in mind that identity theft can strike at any time. Here are some potential ID theft pitfalls that new graduates are especially vulnerable to (for more tips check out this great article).

    Tax ID Theft is No Joke

    Will this be your first year earning a paycheck and filing taxes? If so, you should be aware that tax identity theft is a growing problem. Thieves like to file fraudulent tax returns to steal refunds. Filing early is one way to combat the problem. You’ll also want to get any tax help you need from a trusted, reputable source.

    To Credit or Not to Credit?

    My first experience with credit was a store credit card I accidentally signed up for my first semester of college. I never used it. Pre-approved credit card offers and store accounts can be tempting to the new graduate. While these may be a wise financial choice, make sure you remain in control. Choose credit cards wisely and be sure that you understand the terms before signing up. Once you have those cards, monitor them closely looking for any charges that you didn’t make. You should also check your credit reports at least once a year at

    On the Job Hunt? Don’t Fall Victim to an Employment Scam

    Many new graduates find themselves in need of jobs and scammers love to prey on job hunters. Keep an eye open for work from home scams. Remember, if an opportunity promises to pay well for very little work it’s probably a scam.
    Protect your SSN during the job hunt process as well. You may want to hold off disclosing it until the interview stage in the hiring process. If you’re nervous about sharing your SSN with a potential employer, research them to make sure the job opportunity is legitimate.

    Congratulations on your graduation and the new and exciting things coming your way… just make sure that identity theft isn’t one of them.

    Tags: , ,

    Resource: Privacy Rights Clearinghouse

    June 3rd, 2014

    Jackie here. Sometimes it feels like our privacy is being assaulted on many fronts. And it can all be very confusing. You may have questions about your privacy rights or the best way to handle a privacy concern. When you have privacy questions or complaints, turn to the privacy experts at the Privacy Rights Clearinghouse. They offer an Online Complaint Center to address privacy questions, concerns and complaints.

    If you plan on submitting a question, be aware that all requests must be submitted online. They take each question seriously and need time to research before replying so you can’t call in, even if you think the question is a simple one. Their focus is consumer privacy, basically how companies handle your information, not the government. They also can’t provide legal advice or take action for you, but they may be able to direct you to resources and others that can help.
    If you don’t have a specific question, but do want more information about privacy in general, take some time and browse their website. They have a comprehensive set of Fact Sheets available that cover everything from cellphone privacy to data marketers and even debt collection. Check it out!

    I’m excited to share this great privacy resource with you today. If you give it a try, comment and let us know how this tool works for you.

    Tags: , ,

    New Texas Law Aimed at Identity Theft of Minor IDs

    May 29th, 2014

    Ben here, AllClear ID Investigator. A new bill passed in Texas that will give parents and guardians the ability to better protect their children from ID theft. Texas Sentate Bill 60 will allow a parent or guardian to place a security freeze on the consumer file or other record created or maintained by a consumer reporting agency. This will make it more difficult for minors to become victims of fraud or identity theft.

    Typically credit is the last thing on the mind of a parent when raising a child. It is not until 16-18 years of age that a child would typically start being connected with credit via authorized user accounts or student loans. With no established credit file before that point, minors are often victims of ID theft as thieves use their SSNs to establish a false credit file without anyone knowing it. In some cases, identity thieves have even been able to use a SSN before it has been issued out.

    In a statement, Texas Senator Jane Nelson said “ A staggering number of Texas children have fallen victim to illegal child identity theft, putting them at risk for credit problems before they ever reach adulthood.” Prior to the passing of this bill, a parent was very limited at the tools necessary to help fight or detect identity theft. While child identity theft will never be eliminated completely, this bill certainly is a step in the right direction as it is designed to make it more difficult for children to become the victims of identity theft or credit card abuse.

    Tags: , , ,

    Scam Alert: Financial Aid Scams Cost Students Big Money

    May 2nd, 2014

    Jackie here. Do you need help paying for college? As education expenses increase, students and parents look for ways to cut down on costs seeking financial aid, scholarships, and other monetary help. Scammers are taking advantage of the desperation students feel when searching for financial help to pay for school and are create fake financial aid offers. Get an education on what these scams look like, so you can head to school without falling victim to a financial aid scam.

    Signs of a Financial Aid Scam

    There are lots of great scholarship and financial aid opportunities out there. Don’t disregard all financial aid and scholarship opportunities because of a few scams. Instead, learn the warning signs of and keep a diligent watch for potential problems. A good tip to remember when it comes to education scams (and all others as well) is, “If it looks too good to be true, it probably is.”

    Here are some clues that might alert you to a potential financial aid scam.

    • Pay in Advance- Some fake scholarship opportunities offer a guaranteed scholarship in exchange for a small upfront payment. Be extremely cautious of any scholarships or aid opportunities that ask for an advance payment. Some scams call the payment a processing fee while others promise to do the work of getting the scholarship in exchange for a small payment. Also be aware of opportunities that guarantee results or that promise your money back if you don’t qualify for a scholarship.
    • Don’t Provide Banking Information- Most legitimate scholarships will make their payments directly to your college. Some will reimburse receipts submitted by their recipients and others mail out checks. Be cautious of any aid opportunity that requires bank account information for a direct deposit. Some scam scholarships will ask for bank information to confirm eligibility and will then charge accounts without authorization from the student.
    • Do Your Research- Before accepting an aid offer, do your research. Find out all you can about the company offering the scholarship. Often legitimate scholarships have websites and other information posted online. Past scam victims may share stories of their struggles if you look.
    • Be Wary of Scholarships You Didn’t Apply For- Everyone loves free money, but if you didn’t apply for a particular scholarship, grant, or contest, odds are you didn’t win it. Be very cautious as you proceed.
    • Ask Questions- Asking questions (and lots of them) is a great way to spot potential scams. Ask questions and watch for answers that don’t seem quite right. Don’t feel rushed; take your time and do your research.

    For more information check out this great article about financial aid scams from the Better Business Bureau.

    Tags: , , ,

    More Than a Credit Report

    April 21st, 2014

    Jackie here. We’ve talked many times about the importance of regularly reviewing your free annual credit reports, but today I’d like to share some of the other resources you can use to discover ID theft. I recently ran across an article shared by AARP that highlights a few of the lesser known reports available to consumers. I personally haven’t used any of these, but now that I know they are available, I may need to pull a few reports.

    Many of the reports are free, but some may require a fee unless you have proof that you were harmed by the information in your file.

    Check Writing History

    If you have a history of writing bad checks, you may have trouble opening bank accounts or using checks in the future. There are several
    companies that track your check writing history
    . Here are a few to check out.

    • ChexSystems- Order your report online (it will come via postal mail in about a week) or call 800-428-9623.
    • TeleCheck/First Data. Mail in a written request for a report or call 800-366-2425.
    • Certegy- If you had a check declined based on information in your Certegy check writing report, you can look up the details online. Enter the purchase amount, date, and check number in their online form for more information.

    Health Care Information

    Errors in your medical records can cause problems with insurance companies and health care providers. If you have a major medical condition or have applied for various health and life insurance policies in the past few years you may have a record with the MIB Group. Request a free copy of your record here.

    Rental History

    If you’re trying to get an apartment, your rental history might hold the key. These companies are a good place to start your search for your tenant records:

    The Privacy Rights Clearinghouse also maintains a comprehensive list of specialty consumer reports. Check out their listing and order copies of the reports that might apply to you.

    Tags: ,

    Top 9 Things to Avoid Online

    April 15th, 2014

    Jackie here. Do you click on pop-ups or sign up for free trial offers online? These two behaviors, along with many others, may increase your risk of ID theft and online fraud. In a report published by AARP called Caught in the Scammers Net, several activities were shown to increase your risk of being an identity theft victim. How do your browsing habits stack up? Check out this list of the top 10 things NOT to do online. Avoiding these potentially dangerous behaviors could help keep you and your family safer.

    • Clicking on Pop Ups- You see an interesting pop up, what should you do? Don’t click on it! Clicking on pop ups is a risky online behavior. Instead, close the pop up immediately and access websites by visiting them directly. You can even install or enable a pop up blocker on your web browser to eliminate the temptation to click. Not all pop-ups are harmful, but it’s often better to be safe than sorry.
    • Selling Products on eBay- While there are a lot of great opportunities for buying and selling products on auction sites like eBay, there is also some risk. The AARP study found that selling items on auction sites increased your risk of fraud. If you do choose to sell, be careful and be on the lookout for fraud—check your credit reports and bank statements carefully.
    • Opening Emails from Unknown Senders- Do you open emails from people you don’t know? This can be a risky behavior, especially if you follow links or open attachments. When opening an unknown email can’t be avoided, use caution and never share personal information with the sender.
    • Downloading Apps- I love a good app just as much as the next person, but each time I download a new one, I carefully review it. Choose apps only from a reputable marketplace and carefully analyze user reviews before downloading. If you want a great app that will actually help you protect your identity, check out the AllClear ID app.
    • Visiting a Website that Requires You to Read a Privacy Policy or a Terms of Agreement Statement- You might not think that a privacy policy could increase your ID theft risk, but the study authors certainly do. They found that both required consent to privacy policies and terms of agreement were risk factors for being a victim of fraud. This doesn’t necessarily mean you shouldn’t visit these sites, but you should be aware that this is a potential problem behavior. To be fair, one reason for this is the fact that websites requiring privacy policies and agreements to terms of use are sites that collect personal information that can sometimes become compromised.
    • Being Impulsive- Do you click before you think? Take time to analyze before you do things online. Many scams can be avoided with a little caution.
    • Signing Up for Free Trial Offers- We all love getting things for free, but is the freebie worth sacrificing your identity for? Be cautious of limited time free trial offers.
    • Purchasing Through a Payment Transfer Website- When it comes to spending money, be very cautious online. Avoid sites that ask you to transfer money to a third party or to an unknown recipient.
    • Believing Everything You See- If you regularly read our blog, you probably know that banks won’t send emails asking for personal information. Just because you receive an email, doesn’t mean it is true. Likewise, don’t believe that a privacy policy means you’re safe from having your personal information shared with other companies.

    While you can’t avoid every item on this list, reducing the number of risky behaviors you help you stay safe from online fraud. The study authors found that of 15 risky behaviors, nearly 1 in 5 American respondents had engaged in at least 7. More than half of the respondents (65%) had received at least 1 online scam offer during 2013.

    Check out the full study report here.

    Tags: , , ,

    Goodbye to 2014 Tax Season

    April 14th, 2014

    Jackie here. Have you filed your taxes yet? As tax season comes to a close we wanted to share one last post with some tax identity theft tips. We are all at risk for this ever growing problem; being aware and remaining educated is one of the best ways to protect ourselves from tax ID theft and fraud.

    Finding Out You Have a Problem

    How do you know if you’ve fallen victim to tax ID theft? Most people discover the problem when they go to file their taxes. You may be unable to file since a return has already been submitted with your name and SSN. Other people receive a notice that they underreported their income after they have filed (this often happens when someone is using your SSN to work illegally).

    If you do discover a problem, don’t despair; there are things you can do. In January Jenna shared her story of tax ID theft which can give you a good starting point for resolving your own problem. Here are some other tips to try:

    • File a police report- A police report is often the first step resolving ID theft. While your local police probably won’t be able to do much in fixing your problem, the police report is a valuable tool you can use to prove that you are a victim when talking to credit bureaus and other agencies.
    • Review your credit- If someone uses your SSN to file taxes, they might use it for other things too. Check your credit reports carefully and look for signs of fraud. You may want to initiate a credit freeze and put fraud alerts on your credit reports as well.

    While there is extra attention focused on tax identity theft during tax season, many of the things you should do to protect yourself are ongoing practices that happen all year long. Make sure you regularly check your credit report, and keep an eye on your bank statements for anything suspicious. Remember, even small amounts can idicate trouble. In addition, be cautious when clicking on links and don’t share information that isn’t absolutely necessary.

    Here’s a great article about tax ID theft from ABC News.

    Tags: , ,

    Is it Safe to Visit Shortened URLs?

    April 8th, 2014

    Jackie here. If you’re on social media, odds are you’ve seen a shortened URL or two (or twenty… they are everywhere). These services take a long link and shave it down to just a few characters paired with the shortening URL. Are shortened URLs safe or should you think before you click?

    How Shortened URLs Work

    Shortened URLs act as a portal of sorts, capturing the location of a link and redirecting visitors to the intended site. Much of the time a long URL isn’t a problem, but on social media sites (especially ones like Twitter that limit characters), shorter makes it easier to share. Do you want to use three lines of text sharing a long URL?

    Many legitimate businesses, celebrities, and others use shortened URLs. But, you should be aware that scammers do too. They can camouflage malicious websites this way, tricking people into clicking on links they shouldn’t. Some will use this technique to direct you to sites that install malware, phish for information, and increase your ID theft risk. With a shortened URL you don’t know where you’re headed until it is too late.

    What Can You Do?

    While some people may choose to avoid shortened URLs altogether, this approach may keep you from a lot of great content. For example, we regularly share shortened URLs from the AllClear ID Twitter page; skip them and you might miss out on some great information about avoiding ID theft. Short URLs aren’t bad in and of themselves; you just need to use a little extra caution.

    Here are some tips for keeping yourself safe when using shortened URLs:

    • Source Matters- Before you click on a shortened URL, consider the source. Is it shared by a company or person you trust? Bear in mind that scammers may create fake websites or profiles (or hack legitimate ones) to share their malicious links.  Before you click, ask yourself, “Do you trust the source?”
    • Use a URL Expander- Shortened URLs leave you in the dark about the website you’re trying to visit; a URL expander turns on the lights. and are two of several sites that show you the full URL for a shortened one. Some of these sites will even check the link for malware before you click. You may also be able to install a browser plug-in that checks short URLs without having to visit another site.

    For more information and tips see this great article from the Better Business Bureau.

    Tags: , , ,

    Scam Alert: Don’t be Fooled by the Verizon Voucher Scam

    March 24th, 2014

    Jackie here. Are you a Verizon customer? Be on the alert for this Verizon voucher scam. Scammers are using the promise of a voucher to fool customers into sharing their personal information. Not only will you not receive a voucher, you will increase your ID theft risk.

    The Scam

    This scam starts with a phone call. Scammers use Caller ID spoofing to masquerade as “Technical Support” from Verizon Wireless. They explain that they are offering bill credit vouchers to various customers. All you have to do to claim the voucher is fill out a short form on a website. The web address provided usually includes “Verizon” and possibly the amount of the promised voucher. A recent version of the scam directed victims to “”.

    The website will look like an official Verizon site. It includes the company logos and color scheme. Visitors are encouraged to verify their accounts by entering their phone number, user name, password, and the last 4 digits of their SSN. Don’t do it! This is a clever phishing scam designed to trick you.

    Tips for Avoiding this Scam

    Phishing scams are always changing, targeting different people and different companies. The easiest way to protect yourself is to use caution before sharing personal information. If you are in doubt, contact the company in question directly and ask them. It’s important to remember that things aren’t always as they seem; just because a website looks like Verizon (or any other company for that matter) doesn’t mean it is an official company site. As a general rule, be wary of people offering you money or a refund for no apparent reason.

    Learn more about this scam from the Better Business Bureau.

    Tags: , ,

    ID Theft a Top Complaint in 2013

    March 14th, 2014

    Jackie here. If you think identity theft is no longer a serious problem, think again. Once again it topped the list of consumer complaints made to the FTC in 2013. This is the 14th consecutive year that identity theft ranked #1. Identity theft is still a major problem; how will you protect yourself and your family?

    The FTC’s recent report shows that it is still essential to watch for the signs of ID theft. Finding problems sooner often makes them easier to resolve. Some red flags to watch for include:

    • Unexplained withdrawals from your bank account
    • Charges you didn’t make on your credit card
    • Not receiving expected bills in the mail
    • Debt collection calls about debt that isn’t yours
    • Errors in your credit report
    • Medical bills (or explanation of benefits forms) from doctors you didn’t visit
    • Receiving a data breach notification

    For more information about staying safe from ID theft, check out some of these great resources:

    FTC ID Theft Site

    Identity Theft Resource Center

    Medical ID Theft site from the Office of the Inspector General

    Tax ID Theft Info from the IRS

    We also share ID theft tips, resources and information here on our blog, on Twitter and our Facebook page.

    Keep yourself safe from identity theft this year!

    Tags: ,

    CFPB Tips: What to do After a Data Breach Notification

    March 10th, 2014

    Jackie here. What do you do if your credit card information is compromised in a hacking event or data breach? Here are some tips for from the Consumer Financial Protection Bureau for keeping yourself safe from ID theft and fraud after your information is compromised.

    Check Your Accounts…. And Check Again

    After you’ve been notified of a credit card breach, check your accounts for any unauthorized charges, daily if possible. If you don’t have internet or mobile access, carefully review your paper statements for any charges you didn’t make.

    Report any discrepancies you find, even if they are small. Although a $1 or $2 charge might not seem like a big deal, thieves often start small and build up to larger charges if the smaller charges go through. It may take a while for fraudulent charges to start showing up; keep checking. In fact, you should carefully analyze your statements all of the time, not just when you’re worried about a recent data security incident.

    Report Fraud Immediately

    If you find a fraudulent charge, report it immediately. First, call customer service at your card provider and report the problem. Then, follow up with a written letter. Make sure you keep a copy of the letter you send; send it with delivery confirmation so you have proof it was received. Also keep a record of the dates and times you make phone calls, what you discussed and who you spoke with.

    Don’t Give Out Information in Response to Phone Calls or Emails

    Breaches give scammers a great opportunity to trick people into sharing personal account information. Don’t share your account numbers, SSN, birthdates, etc. with callers claiming to be from your bank or credit card company. If you need to talk with them, contact them yourself using a known phone number from their website or your bank statement.

    What Should I Do If My Bank Isn’t Resolving the Problem?

    If you have trouble with your credit card company or bank after reporting fraud, you have options. Banks should investigate any reports of debit fraud, generally within 10 business days (credit card transactions can take longer, but you don’t have to pay the amount in question while you wait). Once the investigation is complete, you have the right to obtain a copy of results.  If you have a problem with how a fraud case is handled, file a complaint with the Consumer Financial Protection Bureau online or by calling (855) 411-2372.

    More information about handling a breach is available here.

    Tags: , ,

    Scam Alert: Flappy Bird Scams are Flapping Around

    February 27th, 2014

    Jackie here. Like every internet trend, Flappy Bird has generated a trove of scams as scammers seek to cash in on the now forbidden app. Don’t find yourself a victim of a flappy bird scam and possibly identity theft; learn how to spot and avoid potentially dangerous apps. A few minutes of fun isn’t worth compromising your identity.

    The Scam

    Released in May 2013 Flappy Bird was a hugely popular app until it was removed from the app marketplaces early this year. The controversy surrounding its removal made the app even more popular. In fact, some people  who had the original app installed on their smartphones tried to sell them on eBay for thousands of dollars.

    Now that the app is unavailable scammers are cashing in, creating look-a-like apps that secretly rack up phone charges and steal information. Be aware that the original Flappy Bird is no longer available; if you are downloading something called Flappy Bird, it is not a legitimate app. Flappy Bird has been removed by its developer and is not available for sale.

    Spotting Malicious Apps

    Before you install an app on your device make sure you know what you’re installing. Trend Micro has created a great guide for spotting illegitimate apps. Here are a few tips:

    Check the Ratings

    User ratings provide great insight into the legitimacy of an app. Popular apps should have many reviews and ratings, so if the one you’re considering does not, it might an imposter. Look at some of the reviews and look for potential problems before you install.


    Before you select an app, check it out. Research the app not only in the marketplace, but also online. A quick search may reveal potential problems and scams you should be aware of.

    Keep yourself safe from this Flappy Bird scam by choosing your apps carefully and by avoiding malicious ones.

    Tags: , , ,

    Scam Alert: Fake Funeral Notices

    February 20th, 2014

    Jackie here. Be on the lookout for a new scam involving fake funeral notices. This scam preys on emotion by enticing victims to click on malicious links for more information about a departed family member or friend. If you see a notice like this one, play it safe and click delete. You don’t want to risk ID theft or computer viruses by indulging your curiosity.

    The Scam

    Fake funeral notices are popping up in email boxes around the country. The notice usually bears a subject line with something like, “Funeral Notification”. Once they open the email recipients see an official looking email that looks like it comes from a funeral home. While the reported emails at this point all claim to be from a Texas funeral home, this could change as more people become aware of the scam. The email invites the viewer to a celebration of life for a dear friend (name not included in the body of the email) and encourages clicking on the link for more information.

    If you receive an email like this one, don’t click on the link. It will direct you to a foreign website that will install malware on your device. The email is not what it seems and is just a clever trick to get people to click on the malicious links within.

    Learn more about this scam from the Better Business Bureau.


    Tags: , , ,