Language Selection

English French German Italian Portuguese Spanish

Don't Let Data Theft Happen to You

Filed under
Security

ABOUT two weeks ago, I was alarmed by a phone message from my bank alerting me to some "unusual activity" on my debit card. Unusual wasn't the word. Someone had gone on a shopping spree - $556.46 and $650.81 at one store, $264.99 and $300 in charges that were pending at another - and none of it was mine.

My debit card was still in my wallet. I hadn't used it in days. The bank said thieves might have created a counterfeit card. Someone - a store clerk, waiter, whoever - could have used a card reader to harvest the information imbedded in the magnetic strip to create a fake one. The bank assured me the debit account was closed and the thieves no longer had access to my cash - but who could be sure? How much of my personal information did these thieves get?

Between bouts of tears and frantic phone calls to my bank, I became obsessed with what I might have done to prevent this.

UNFORTUNATELY, although there are steps you can take to protect yourself - and you should - there are no guarantees. "You cannot protect yourself completely," said Edmund Mierzwinski, consumer program director at the U.S. Public Interest Research Group in Washington. "The best thing you can do is react swiftly if it does happen."

Besides the standard advice to shred personal documents, following are some tips I found useful:

Full Article

Ironic

Ironic, an article about Identity theft requires me to willing give up some of my identity to read the article. Sure I could make up a user profile, or use bugmenot, but instead, I choose not to support them in any way, shape, or form. I don't need (at least yet) to show photo ID to purchase their overrated rag, why do I need the equivalent to read their stuff on-line?

re: yeah baby - here's the rest of it

¶Avoid letting your cards out of your sight. Do not let store clerks take your card away on the pretext that there's a "problem."

¶Restrict the access to your personal data by signing up for the National Do Not Call Registry (www.donotcall.gov); remove your name and address from the phone book and reverse directories - and, most important, from the marketing lists of the credit bureaus to reduce credit card solicitations. The site www.optoutprescreen.com can help.

¶Consider freezing your credit report, an option available in a growing number of states. Freezing prevents anyone from opening up a new credit file in your name (a password lets you gain access to it), and it doesn't otherwise affect your credit rating.

¶Protect your home computer with a firewall, especially if you have a high-speed connection.

¶Rein in your Social Security number. Remove it from your checks, insurance cards and driver's license. Ask your bank not to use it as your identification number. Refuse to give your Social Security number to merchants, and be careful even with medical providers. The only time you are required by law to give your number, Mr. Mierzwinski said, is when a company needs it for government purposes, like tax matters, Social Security and Medicare.

¶Curtail electronic access to your bank accounts. Pay bills through snail mail. Avoid linking your checking to savings. Use a credit card for purchases rather than a debit card. Although I was able to get all $1,772.26 reimbursed, I was lucky. While individual liability for fraudulent credit card purchases is only $50, it can be higher for debit cards: up to $500 or even all the money in your account in some cases.

These and other preventive steps may help, but people really can't safeguard their money and their data on their own. Robert Douglas, the chief executive of PrivacyToday.com, a privacy advocate, believes that this is not an issue of consumer responsibility but of corporate negligence. "These companies are trying to tell people it's their fault, but the largest breaches have been within the financial services industry itself," Mr. Douglas said.

Mr. Douglas and Mr. Mierzwinski say that shredding documents is fine, but calling your state and local representatives is better. "Companies have refused to give consumers control over their financial DNA and they've refused to take responsibility for their actions," Mr. Mierzwinski said. "What will stop identity theft are stronger notification laws and stronger penalties, which we don't have now."

----
You talk the talk, but do you waddle the waddle?

yeah baby...

My thoughts exactly...from the ny times to a myriad of others...I simply refuse and write them to 'splain why. and we wonder why we end up on so many mailing lists and get so much spam. Oh, we won't sell your information. yeah right.

helios

re: ironic

I'm sorry guys, I forgot that it was sign up for site. Sad I usta try to post the whole thing and just give it a "source" link, but I got to where I forget which ones is which now. Sorry. I used to hate that too!!! But I signed up with a few of them since starting this site.

----
You talk the talk, but do you waddle the waddle?

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Open source docks with mainstream vendors

Open source and mainstream are joining forces this week as the Docker software containerisation platform comes under the spotlight at technology-focused network and information sessions in Cape Town and Johannesburg. "The diversity of our partners at the event − Docker, Microsoft Azure, Atlassian, SUSE and HPE – is a clear indication of the excitement around the Docker platform," says Muggie van Staden, MD of Obsidian Systems. Read more

What’s the best Linux firewall distro of 2017?

You don’t have to manage a large corporate network to use a dedicated firewall. While your Linux distro will have an impressive firewall – and an equally impressive arsenal of tools to manage it – the advantages don’t extend to the other devices on your network. A typical network has more devices connected to the internet than the total number of computers and laptops in your SOHO. With the onslaught of IoT, it won’t be long before your router doles out IP addresses to your washing machine and microwave as well. The one thing you wouldn’t want in this Jetsonian future is having to rely on your router’s limited firewall capabilities to shield your house – and everyone in it – from the malicious bits and bytes floating about on the internet. A dedicated firewall stands between the internet and internal network, sanitising the traffic flowing into the latter. Setting one up is an involved process both in terms of assembling the hardware and configuring the software. However, there are quite a few distros that help you set up a dedicated firewall with ease, and we’re going to look at the ones that have the best protective open source software and roll them into a convenient and easy to use package. Read more

Zorin OS 12 Business Edition Launches with macOS, Unity, and GNOME 2 Layouts

Three months after launching the biggest release ever of the Ubuntu-based operating system, the Zorin OS team is today announcing the availability of Zorin OS 12 Business Edition. Based on Ubuntu 16.04 LTS (Xenial Xerus) and powered by the long-term supported Linux 4.4 kernel, Zorin OS 12 Business Edition ships with the innovative Zorin Desktop 2.0 desktop environment that offers multiple layouts for all tastes. These means that you can make your Zorin OS 12 desktop look like macOS, GNOME 2, or Unity with a click. Read more

GNOME and Other Software

  • Nautilus 3.24 – The changes
    Since Nautilus was created, if a user wanted to open a folder where the user didn’t have permissions, for example a system folder where only root has access, it was required to start Nautilus with sudo. However running UI apps under root is strongly discouraged, and to be honest, quite inconvenient. Running any UI app with sudo is actually not even supported in Wayland by design due to the security issues that that conveys.
  • GNOME hackaton in Brno
    Last week, we had a presentation on Google Summer of Code and Outreachy at Brno University of Technology. Around 80 students attended which was a pretty good success considering it was not part of any course. It was a surprise for the uni people as well because the room they booked was only for 60 ppl.
  • Peek Gif Recorder Gets Updated, Now Available from a PPA
    Peek, the nifty animated gif screen capture app for Linux desktops, has been updated. Peek 0.9 reduces the size of temporary files, adds a resolution downsampling option (to help the app use fewer resources when rendering your gif), and introduces fallback support for avconf should ffmpeg be unavailable.
  • Cerebro is an Open Source OS X Spotlight Equivalent for Linux
    Billed as an ‘open-source productivity booster with a brain’, Cerebro is an Electron app able to run across multiple platforms. It’s an extendable, open-source alternative to Spotlight and Alfred on macOS, and Synapse, Kupfer, Ulauncher, GNOME Do, and others on Linux.
  • JBoss Fuse 6.3 integration services for Red Hat OpenShift released
    Red Hat announced the latest update to the Red Hat JBoss Fuse-based integration service on Red Hat OpenShift. With the growth of the Internet of Things (IoT), cloud-based SaaS systems, and new data streams, organizations can face increasing pressure to more quickly deliver innovative new services. Traditional centralized, monolithic ESB-style integration approaches are often ill-suited to support the business in responding to this pressure.
  • Fedora 25: The perf linux tool.
  • Meet the chap open-sourcing US govt code – Paul, an ex-Microsoft anti-piracy engineer [Ed: Used to work for Microsoft and now spreads the GPL ("cancer" according to Microsoft) in the US government]
    The manager of the project, Berg said, really wanted to release MOOSE as open source, but didn't know how to do so. As a result it took 18 months to traverse government bureaucracy and to obtain the necessary permissions. It's now available under the GPL 2.1 license.