Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
A Personal Experience with Identity Theft > NetSparsh - Viral Content you Love & Share

A Personal Experience with Identity Theft

Some months ago, before there was much publicity regarding phishing and identity theft, I became a victim.

My first inkling that I'd been scammed came from a telephone call from my bank asking if I had been to Italy or Roumania. Of course I had not. I was informed by the bank that a number of charges for hotel bills and cash withdrawals had been made from my account. Thieves had made a counterfeit Debit Card with which to rifle my account.

I had in the vicinity of $1900.00 in the account so I had to have the bank transfer enough from my savings to cover these charges, so as not to have my other checks "bounce". We closed the old account and opened a new one.

At first I could not imagine how it happened, then I remembered. I've been an eBayer for several years and I use Paypal frequently.

Some weeks previously I had received e-mail from eBay stating that there were some attempts to fraudulently access my account and they wanted to verify my account information. They said the matter was urgent and if I didn't respond promptly my account would be suspended.

I thought this was a bit odd, so I clicked on several links to see if it was a legitimate message and the links worked so I complied with the request. The result was that my checking account was cleaned out.

Since then I have found out ways to verify whether these messages are bogus or not. If you visit my web site http://www.caveatemptorus.com you will find detailed information in this regard. Checking a few links is not sufficient to verify the validity of a document.

Here in a nutshell is the best way to avoid this type scam:

DO NOT ANSWER ANY E-MAIL asking for personal financial data. EBay, Paypal, banks and other institutions never use e-mail for such purposes.

If you are concerned about your accounts initiate the contact yourself, then you'll know you're dealing with the right party.

NEVER GIVE YOUR PIN NUMBER to anyone for any reason. The only purpose it has is to relieve you of your money. Merchants don't need it when you make purchases.

DO NOT USE DEBIT CARDS or your checking account for online or phone transactions, in spite of Paypal's inducements. Use a consumer protected Credit Card. You have much better protection.

I recovered my money from the bank as this was a case of fraud, but it took several months. Since then I have received any number of similar messages, purportedly from eBay and Paypal. You can forward them to www.spoof@ebay.com for verification. All the ones I sent were bogus.

By: George W. Cannata
Owner and publisher of the web site:http://www.caveatemptorus.com

You have permission to publish this aticle in its entirety without changes and it must contain all links and credits to the author.

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

WIRED

A Twitter DM Fail, Free Credit Freezes, and More Security News This ...
WIRED
This week, President Donald Trump threatened to declassify swaths of information related to the ongoing Russian interference investigation, with seemingly little ...
Twitter squashes security bug leaking direct messages since 2017Digital Trends

all 13 news articles »

Fox News

Police beef up security for UN gathering, Trump visit
Fox News
The security arsenal features police boats patrolling the East River near the U.N., aviation units overhead and teams of officers trained to respond to chemical, biological and other potential terror threats. About 50 city Department of Sanitation dump ...

and more »

CNET

5 new Alexa security tricks to watch over your smart home
CNET
Alexa-enabled security cameras from Ring, Arlo and August, along with Amazon's own Cloud Cam indoor security camera, are getting the capability to work with the Amazon Cameras Recap API. This API allows you to view recorded video clips by saying, ...
Amazon Smart Plug | works with Amazon Alexa - Amazon.comAmazon.com
Facebook's 'Portal' Video Chat Device to Be Announced Next WeekCheddar
Facebook Dives into Home Device Market with Video Chat Product Named "Portal"Cheddar

all 222 news articles »

New York Times

Billionaire Backer of Maria Butina Had Russian Security Ties - The ...
New York Times
Konstantin Nikolaev, the oligarch who helped finance Ms. Butina, has been an investor in projects linked to the Russian government.

and more »

Reuters

Iran's Rouhani orders security forces to identify parade attackers: ISNA
Reuters
DUBAI (Reuters) - Iranian President Hassan Rouhani ordered the country's security forces to identify those reponsible for an attack on Saturday on a military parade, the semi-official ISNA news agency said. Iranian President Hassan Rouhani delivers a ...


HuffPost

Homeland Security Orders FEMA Boss To Pay For Personal Use Of Government Vehicles
HuffPost
Homeland Security Secretary Kirstjen Nielsen has ordered Federal Emergency Management Agency Administrator Brock Long to reimburse the government for improper personal use of official vehicles, which was uncovered in an investigation. But he won't ...

and more »

The Journal News | LoHud.com

New Rochelle to re-release security audit with fewer redactions
The Journal News | LoHud.com
The New Rochelle school district is re-releasing an audit on school security, two weeks after The Journal News/lohud reported on the heavily-redacted contents of the district's initial public report. The new report will include fewer redactions ...


Council on Foreign Relations (blog)

CFR Digital Interactive Explores Women's Contributions to Peace and Security
Council on Foreign Relations (blog)
While recurrent armed conflicts, expanded extremist networks, and record levels of displacement remain defining features of global security, standard peacemaking methods continue to overlook a proven strategy to reduce conflict and advance stability ...

and more »

NPR

Hacks, Security Gaps And Oligarchs: The Business Of Voting Comes ...
NPR
Heading into midterm elections, pressure is on for governments and campaigns to secure elections. But what about the companies that make the machines and ...
Hacks, Security Gaps And Oligarchs: The Business Of Voting Comes Under Scrutiny89.3 KPCC
Indictment - Department of JusticeDepartment of Justice
Tensions Flare as Hackers Root Out Flaws in Voting MachinesWall Street Journal
The Intercept -Center for Internet Security -YouTube
all 117 news articles »

WIRED

Cloudflare Embraces Google Roughtime, Giving Internet Security a ...
WIRED
Cryptography schemes are complicated to understand and implement. A lot of things can go wrong. But when it comes to web encryption, a surprising number ...

and more »
Google News

Temporary Internet Files - the Good, the Bad, and the Ugly

A little bit of time invested into learning about internet... Read More

Mall Protection

The Loss Prevention Manager should be receptive to the needs... Read More

Hacking the Body Via PDA Wireless Device

First I would like to stress I am condoning the... Read More

Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

Airport Menace: The Wireless Peeping Tom ---------------------------------------- As a network... Read More

Money Mule Email Scam Hits U.S.

Imagine this ? you open up your email box and... Read More

Be Aware of Phishing Scams!

If you use emails actively in your communication, you must... Read More

How to Get Rid of New Sobig.F Virus?

As you know, this time the virus under the name... Read More

Free Spyware Removal - Its Not As Easy As It Sounds

Nobody wants to pay to remove spyware. At the very... Read More

Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge

Is your enterprise following the rules?The bulk of financial information... Read More

Delete Cookies: New-Age Diet or Common Sense Internet Security?

No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More

Fishing for Fortunes. Scam!

Spelt phishing, but pronounced as above, this despicable act is... Read More

Message Board Security Problems

Security leaks can be a big problem for any site... Read More

Preventing Online Identity Theft

Identity theft is one of the most common criminal acts... Read More

Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and Worms

Never before with Instant Messaging (IM) has a more vital... Read More

Are You Surfing Safe?

Ok, you've got a computer, and you get online. You... Read More

How to Protect Yourself Against Online Criminals

Credit card fraud is a growing problem for online businesses... Read More

Social Engineering - The Real E-Terrorism?

One evening, during the graveyard shift, an AOL technical support... Read More

Phishing

Recently I have received email from my bank/credit Card Company,... Read More

Its Time to Sing the Encryption Song - Again!

Yes, I'm wearing my encryption hat again. Why you may... Read More

How to Know Whether an Email is a Fake or Not

A few nights ago I received an email from "2CO"... Read More

Social Engineering: You Have Been A Victim

Monday morning, 6am; the electric rooster is telling you it's... Read More

Avoiding Scams: If It Sounds Too Good to Be True, It Probably Is

A week or so ago, I received an inquiry from... Read More

Top Spyware Removers Considerations

Only the top spyware removers are successful at detecting and... Read More

How to Fight Spyware

If you are wondering how to fight spyware for safe... Read More

Reporting Internet Scams

When it comes to reporting Internet scams most of us... Read More