Language Selection

English French German Italian Portuguese Spanish

Privacy watchdog warns job seekers to beware

Filed under
Security

Online fraudsters are increasingly taking advantage of vulnerable job seekers by using online résumés to steal their identity, a privacy expert warned this week.

The threats range from job fraud, where a criminal group poses as a legitimate employer to launder money, to the sale of résumé details to database companies for use in background checks. The seemingly small act of posting a résumé publicly can have significant impact: over the past year, more than a dozen Americans have been accused of a felony because their identity has been used for online crime, said Pam Dixon, executive director of the World Privacy Forum.

"If you post your résumé publicly you are asking for identity fraud," she said during an interview with SecurityFocus. "If you have a fantastic résumé, that puts you at a high risk, because your identity will get nabbed, and they will use your information to set up a new account in your name and do criminal acts and it will look like you participated in this scheme."

Ironically, the major résumé services offer tools to help job seekers keep their identity private from the public, but workers fail to take advantage of the features because they do not understand the dangers, Dixon said. However, a majority of résumé services still don't take the issues seriously, she added.

Dixon presented the findings of several studies authored by the World Privacy Forum at the Computer, Freedom and Privacy Forum last week in Seattle. In addition to identity-theft dangers, other privacy problems exist as well. She warned that inaccuracies in employment databases have hurt people's chances of getting the job.

The campaign to raise awareness of job fraud and inaccuracies in employment databases comes as major data leaks by companies such as ChoicePoint and Bank of America have raised public awareness of identity theft.

In a typical case of job fraud, for example, a criminal group will contact a job seeker offering employment handling money transfers. For each transfer -- usually of a sum just below the federally mandated $10,000 reporting requirement -- the "employee" gets to keep 5 percent.

Other criminal groups pose as employers and attempt to convince job seekers to give up sensitive information, such as social-security numbers and bank account information.

Full Story.

More in Tux Machines

Debian-Based Clonezilla Live 2.4.2-29 Is Out with Partclone 0.2.81 and Lots of Bugfixes

On the first day of August 2015, Steven Shiau has released a new testing version of his popular Clonezilla Live CD, which can be used for disk cloning and imaging operations, version 2.4.2-29. Read more

Arch Linux-Based BlackArch Penetration Testing Distro Now Using Linux Kernel 4.1 LTS

The development team behind the BlackArch project, a GNU/Linux distribution derived from Arch Linux and designed to be used for penetration testing and security analysis operations, released an updated installation media, BlackArch 2015.07.31. Read more

Linus Torvalds warns he's in no mood to be polite as Linux 4.2 drags

Linus Torvalds' regular Sunday night missive on the state of kernel development has labelled version 4.2 as a bit of a problem child and warned he “might not react politely” to some developer requests. Announcing the release of release candidate five (rv5), Torvalds says “it's looking like 4.2 might be one of the releases needing more than the usual seven rc releases.” Read more

Simplicity Linux 15.7 Officially Released, Based on LXPup and Linux Kernel 4.1 LTS

As reported at the beginning of July, David Purse, the developer of the Simplicity Linux distribution, announced the release and immediate availability for download of the final version of his Simplicity Linux 15.7 operating system on July 30, 2015. Read more