Hoax & Security | ||
Home Page |
Overall Summary---Anything that has information about you, your family, your friends, your possessions, your job, is information that identity thieves can use to steal from you and create chaos in your life
1. LONG - TERM PARKING Some people left their car in the long-term parking at San Jose while away, and one of the cars was broken into. Using the information on the car's registration in the glove compartment, they drove the car to the people's home in Pebble Beach and robbed it. If we are going to leave the car in long-term parking, we should NOT leave the registration/insurance cards in it, or your remote garage door opener. This gives us something to think about with all our new electronic technology.
2. GPS: Someone had their car broken into while they were at a football game. Their car was parked on the green which was adjacent to the football stadium and specially allotted to football fans. Things stolen from the car included a garage door remote control, some money and a GPS which had been prominently mounted on the dashboard. When the victims got home, they found that their house had been ransacked and just about everything worth anything had been stolen. The thieves had used the GPS to guide them to the house. They then used the garage remote control to open the garage door and gain entry to the house. The thieves knew the owners were at the football game, they knew what time the game was scheduled to finish and so they knew how much time they had to clean out the house. It would appear that they had brought a truck to empty the house of its contents. Something to consider if you have a GPS - don't put your home address in it. Put a nearby address (like a store or gas station) so you can still find your way home if you need to, but no one else would know where you live if your GPS were stolen.
3. CELL PHONES: I never thought of this! This lady has now changed her habit of how she lists her names on her cell phone after her handbag was stolen. Her handbag, which contained her cell phone, credit card, wallet, etc., was stolen. Twenty minutes later when she called her hubby, from a pay phone telling him what had happened, hubby says, "I received your text asking about our Pin number and I've replied a little while ago." When they rushed down to the bank, the bank staff told them all the money was already withdrawn. The thief had actually used the stolen cell phone to text "hubby" in the contact list and got hold of the pin number. Within 20 minutes he had withdrawn all the money from their bank account. How to list the names in my contact list on the phone. For example, every name in there is a nickname that only I know, a place of employment, a title, a street name, or some code word that I can associate with the name of the person. For instance (and this isn't a real contact in my list) if it said "Handshake" it might mean "Palmer." I am pretty sure that, if my phone fell into the wrong hands, not many of the "names" could be identified; nor used to scam. Lessons learned: a. Do not disclose the relationship between you and the people in your contact list. Avoid using names like Home, Honey, Hubby, Sweetheart, Dad, Mom, etc. b. When sensitive info is being asked through texts, CONFIRM by calling back. c. When you're being texted by friends or family to meet them somewhere, be sure to call back to confirm that the message came from them. If you don't reach them, be very careful about going places to meet "family and friends" who text you. 4. PURSE IN THE Shopping CART A lady went grocery-shopping at a local mall and left her purse sitting in the children's seat of the cart while she reached for something on a shelf. Her wallet was stolen, and she reported it to the store personnel. After returning home, she received a phone call from the Mall Security to say that they had her wallet and that although there was no money in it, it did still hold her personal papers. She immediately went to pick up her wallet, only to be told by Mall Security that they had not called her. By the time she returned home again, her house had been broken into and burglarized. The thieves knew that by calling and saying they were Mall Security, they could lure her out of her house long enough for them to burglarize it. Remember, these are just a few examples of what/how/where/when Identity Theft can occur. (See the Websites, at the end of this email, for more types of Identity theft and how to prevent them) Summary +++Now, think carefully, what/where/when/how are you digitally vulnerable to the smartest identity thieves? +++And, what are you going to do to protect yourself, your family, your possessions, your job against the smartest identity thieves? +++Don't forget that"paper" Identity Theft occurs when your mail or your credit card receipts are stolen...don't just discard it, shred it! +++Anything that has information about you, your family, your friends, your possessions, your job is information that identity thieves can use to steal from you and create chaos in your life Now, execute your anti-identity theft plan, and keep it up-to-date.
Here are just a few websites that talk about Identity Theft Click or Copy and paste. https://www.experian.com/blogs/ask-experian/20-types-of-identity-theft-and-fraud/ https://www.lifelock.com/learn-identity-theft-resources-types-identity-theft.html https://www.cnbc.com/2020/02/27/these-are-the-latest-ways-identity-thieves-are-targeting-you.html |