Saturday, 3 September 2016

5 Smart Phone Security Tips

                                                                5 Smart Phone Security Tips


Because it’s not like a traditional hard drive where you store all your documents, many people forget about protecting their smartphones from hackers. Smartphone security is gaining traction and there are quite a few things you can do to help prevent your smartphone from being hacked. Many of the same measures you take to protect your computer can be used to protect your smartphone too.

1. Use Passcodes Everywhere

Whether you have an Android phone or an iPhone, you can prevent access to your device by adding a passcode or a lock pattern on Android. This simple security measure can prevent sensitive information from being viewed by others. This is especially important if you have apps installed where personal data is stored.

2. Protect Your iCloud & Google Account

Your Apple ID controls access to every single Apple service that currently exists from iTunes to iCloud to FaceTime to iMessage. If someone can access your Apple ID, they can wreak havoc on your Apple life including erasing your iPhone, iPad and computer remotely. It’s pretty much the same issue with Google. You should enable 2-step verification on both of these accounts.

3. Be Careful With the Apps You Install

This is especially important on Android devices. Google recently removed 50,000 apps that were suspected of being malware. There won’t be any shortage of apps that contain malware, viruses or other sneaky software to steal your data or damage your phone. The Apple app store also has this
problem, but to a much lesser extent. Apple vets each app before it gets listed in the store and routinely goes about removing apps from the store that are deemed to be violating store policies.

4. Use an App Instead of the Browser

If youre doing banking on your phone or stock trading or anything else that passes sensitive information between your phone and the Internet, it’s best to use an official app for that site or company rather
than opening using the browser on your phone.

5. Keep Your Data Backed Up

It’s not only a good idea to keep your smartphone backed up in case you drop it in the toilet, but also if it gets stolen and you have to remotely wipe it clean. Apple users can install the Find My iPhone app, which will let you remotely lock a phone and remotely wipe it if you know it’s been stolen.



                                                                5 Smart Phone Security Tips


Because it’s not like a traditional hard drive where you store all your documents, many people forget about protecting their smartphones from hackers. Smartphone security is gaining traction and there are quite a few things you can do to help prevent your smartphone from being hacked. Many of the same measures you take to protect your computer can be used to protect your smartphone too.

1. Use Passcodes Everywhere

Whether you have an Android phone or an iPhone, you can prevent access to your device by adding a passcode or a lock pattern on Android. This simple security measure can prevent sensitive information from being viewed by others. This is especially important if you have apps installed where personal data is stored.

2. Protect Your iCloud & Google Account

Your Apple ID controls access to every single Apple service that currently exists from iTunes to iCloud to FaceTime to iMessage. If someone can access your Apple ID, they can wreak havoc on your Apple life including erasing your iPhone, iPad and computer remotely. It’s pretty much the same issue with Google. You should enable 2-step verification on both of these accounts.

3. Be Careful With the Apps You Install

This is especially important on Android devices. Google recently removed 50,000 apps that were suspected of being malware. There won’t be any shortage of apps that contain malware, viruses or other sneaky software to steal your data or damage your phone. The Apple app store also has this
problem, but to a much lesser extent. Apple vets each app before it gets listed in the store and routinely goes about removing apps from the store that are deemed to be violating store policies.

4. Use an App Instead of the Browser

If youre doing banking on your phone or stock trading or anything else that passes sensitive information between your phone and the Internet, it’s best to use an official app for that site or company rather
than opening using the browser on your phone.

5. Keep Your Data Backed Up

It’s not only a good idea to keep your smartphone backed up in case you drop it in the toilet, but also if it gets stolen and you have to remotely wipe it clean. Apple users can install the Find My iPhone app, which will let you remotely lock a phone and remotely wipe it if you know it’s been stolen.



Thursday, 25 August 2016

Zong Wingle unlock method

zong wingle trick
Zong wingle unlock method

Today I will tell your how you can unlock Zong Wingle Usb.For unlock Zong Wingle Usb there is a complete process and after that process done you are able to run any SIM card on Zong Wingle Usb. In Pakistan Zong is selling this device with network locked, after spending more than 3 months and wasting a lot of time Now i am able to unlock this device .
Complete instruction for Zong Wingle Unlock
1. First of All Get the Flash Code for your device from here – Huawei Flash Code which will be used in step #4.
2. Then get Huawei serial COM ports drivers pack – FcSerialDrv.rar, unpack it.
3. Now Download following firmware for downgrade – E8372_firmware_downgrade.7z(mirror), before you flash it with this version– check and remember your current firmware version. You may need it after complete process.
4. Now connect your Zong wingle with PC Flash P711s-WINGLE_Update_21.110.99.04.00 firmware which you download in step #3 and in same file there is a Wingle Update Wizard Application, open it and run for update, put Flash Code from step #1.
5. Connect your internet wingle to PC, check that you can access interface viahttp://192.168.8.1/, Here in my case i can’t get to web-interface, if same happens to you try step 6 and 7 or try by skipping step 6 and 7, i skipped step 6 and 7 and it works.
6. Use the following script E8372_switch_mode.7z to get device in COM ports mode.
7. Open Device Manager, in COM Ports section you must see several new COM ports, such as FC – Application Interface and FC – PC UI Interface. If you don’t see them – install the drivers from the step 2.
8. Get Huawei 2015 Code Reader software and launch it.
9. Then Press “1. Detect” button to get list of available COM-ports.
10. Choose FC – PC UI Interface from list and press “2. Connect” button.
11. If all appears correct you can see info about your device, and Hash 1 and Hash 2 fields in the top of window must be filled. This is important. Check Hash 1 and Hash 2, before you go to the next step – this values must be filled. If not – check your firmware version, it must be 21.110.99.04.00. If now – you should go to the step 4.
12. Press “3. Process” button and wait 4-5 min. After process complete – you will receive IMEI number and Encrypted Block in Log window:
IMEI: 866467xxxxxxxxx
— [ Begin Encrypted Block ] —
46001402676A1045226xxxxxxxxxxxxxxxxxxxxxxxxxxx
— [ End Encrypted Block ] —
After this now you need to buy unlock code which will definitely work.
13. Follow this link –Unlock modems and routers Huawei (2015) Code.
14. Check that you have IMEI and Encrypted Block from step 12 (!)
15. Check that with non-accepted SIM your E8372 prompts for enter unlock code in web-interface, i.e. you have retries.
16. If checks in steps 14 and 15 done – choose your payment from list 
Pay with … It can be, for example, PayPal/VISA and other options are available.
17. Press Buy now button and follow the instructions on display.
18. After your payment will complete (don’t forget to press “Back to the shop” or “Back to the seller button” if it appears) you will get a registration form, where you must fill your email, IMEI and Encrypted Block.
19. If you can’t see the registration form, check your email for the message from Plati.Com with a link to registration form to fill and open it.
20. After you fill all fields and press “Send” button 
NCK (Network Control Key) code for yourE8372 will instantly appear in the same window.
21. Enter received NCK into device (via web-interface) and enjoy.
Now your zong Wingle usb is unlock you can insert any sim card in this intertnet dongle usb
zong wingle trick
Zong wingle unlock method

Today I will tell your how you can unlock Zong Wingle Usb.For unlock Zong Wingle Usb there is a complete process and after that process done you are able to run any SIM card on Zong Wingle Usb. In Pakistan Zong is selling this device with network locked, after spending more than 3 months and wasting a lot of time Now i am able to unlock this device .
Complete instruction for Zong Wingle Unlock
1. First of All Get the Flash Code for your device from here – Huawei Flash Code which will be used in step #4.
2. Then get Huawei serial COM ports drivers pack – FcSerialDrv.rar, unpack it.
3. Now Download following firmware for downgrade – E8372_firmware_downgrade.7z(mirror), before you flash it with this version– check and remember your current firmware version. You may need it after complete process.
4. Now connect your Zong wingle with PC Flash P711s-WINGLE_Update_21.110.99.04.00 firmware which you download in step #3 and in same file there is a Wingle Update Wizard Application, open it and run for update, put Flash Code from step #1.
5. Connect your internet wingle to PC, check that you can access interface viahttp://192.168.8.1/, Here in my case i can’t get to web-interface, if same happens to you try step 6 and 7 or try by skipping step 6 and 7, i skipped step 6 and 7 and it works.
6. Use the following script E8372_switch_mode.7z to get device in COM ports mode.
7. Open Device Manager, in COM Ports section you must see several new COM ports, such as FC – Application Interface and FC – PC UI Interface. If you don’t see them – install the drivers from the step 2.
8. Get Huawei 2015 Code Reader software and launch it.
9. Then Press “1. Detect” button to get list of available COM-ports.
10. Choose FC – PC UI Interface from list and press “2. Connect” button.
11. If all appears correct you can see info about your device, and Hash 1 and Hash 2 fields in the top of window must be filled. This is important. Check Hash 1 and Hash 2, before you go to the next step – this values must be filled. If not – check your firmware version, it must be 21.110.99.04.00. If now – you should go to the step 4.
12. Press “3. Process” button and wait 4-5 min. After process complete – you will receive IMEI number and Encrypted Block in Log window:
IMEI: 866467xxxxxxxxx
— [ Begin Encrypted Block ] —
46001402676A1045226xxxxxxxxxxxxxxxxxxxxxxxxxxx
— [ End Encrypted Block ] —
After this now you need to buy unlock code which will definitely work.
13. Follow this link –Unlock modems and routers Huawei (2015) Code.
14. Check that you have IMEI and Encrypted Block from step 12 (!)
15. Check that with non-accepted SIM your E8372 prompts for enter unlock code in web-interface, i.e. you have retries.
16. If checks in steps 14 and 15 done – choose your payment from list 
Pay with … It can be, for example, PayPal/VISA and other options are available.
17. Press Buy now button and follow the instructions on display.
18. After your payment will complete (don’t forget to press “Back to the shop” or “Back to the seller button” if it appears) you will get a registration form, where you must fill your email, IMEI and Encrypted Block.
19. If you can’t see the registration form, check your email for the message from Plati.Com with a link to registration form to fill and open it.
20. After you fill all fields and press “Send” button 
NCK (Network Control Key) code for yourE8372 will instantly appear in the same window.
21. Enter received NCK into device (via web-interface) and enjoy.
Now your zong Wingle usb is unlock you can insert any sim card in this intertnet dongle usb

Tuesday, 16 August 2016

Sim network cell information terms

 Network Cell Information  Terms & Abbrivations


  •  MCC Mobile Country Code
  • MNC Mobile Network Code
  • ARFCN Assigned Radio Channel
  • CELL ID Cell Identifier
  • LAC Localization Area Code
  • C1 Coefficient for Base Station Selection
  • C2 Coefficient for Cell Re-Selection
  • TE Terminal Equipment; e.g. a computer (equal to DTE)
  • UE User Equipment
  • rxlev Received Signal Strength in dBm
  • BSIC Base Station Identification Code
  • PSC Primary Synchronization Code of the Cell
  • SSC Secondary Synchronization Code
  • FREQ Downlink Frequency of the Cell
  • ECIO Ec/Io
  • RSCP CPICH RSCP
  • SIM Subscriber Identity Module
  • WCDMA Wideband Code Division Multiple Access

 Network Cell Information  Terms & Abbrivations


  •  MCC Mobile Country Code
  • MNC Mobile Network Code
  • ARFCN Assigned Radio Channel
  • CELL ID Cell Identifier
  • LAC Localization Area Code
  • C1 Coefficient for Base Station Selection
  • C2 Coefficient for Cell Re-Selection
  • TE Terminal Equipment; e.g. a computer (equal to DTE)
  • UE User Equipment
  • rxlev Received Signal Strength in dBm
  • BSIC Base Station Identification Code
  • PSC Primary Synchronization Code of the Cell
  • SSC Secondary Synchronization Code
  • FREQ Downlink Frequency of the Cell
  • ECIO Ec/Io
  • RSCP CPICH RSCP
  • SIM Subscriber Identity Module
  • WCDMA Wideband Code Division Multiple Access

Monday, 27 June 2016

Physical Security

When thinking of physical security, most people think of security guards, cameras, and locked doors. Many fail to realize that they themselves also have a big role in keeping information safe from physical attackers, since the information is in electronic form. Instead of giving examples now, let’s jump right in and get started. I’m going to start each section with a question that I’d like you to think over before I explain.

Are you the only person with access to your office?

I highly doubt that you are the only one. Custodial and maintenance staff have keys that get them just about anywhere. I’m sure that you have had visitors or have held meetings in your office. You may ask, “Can’t we trust these people?” Sure we can, but it’s better to think of ways to secure what is in our office so any temptation a person may have is greatly reduced.

Do you have any documents with sensitive data in plain view?

I know that you need to be able to see the documents to work with them, so of course they are in plain view at some point. When someone comes in your office or when you are absent, though, these documents need to be stored away. Remember the old movies where the spy would take photographs of documents with their bow-tie camera? Well, it’s not that different today. With miniature cameras like those in cell phones widely and easily available, it is simple for anyone to take a photo without being noticed... even when you are standing right there!

When you print documents, do you pick them up immediately, or do they sit on an office printer for some time? This is another area where caution needs to be taken.

When you dispose of documents with sensitive information, a shredder must always be used. People may legally dig through trash (called “dumpster diving”), and take whatever they find. Many people even treat this as a hobby and do so regularly.

Do you have any removable media (floppy disks, CDs, Flash drives, etc) with sensitive information?
How often have you misplaced a CD or a floppy? I know that I have. Even if you haven't, if you place one on your desk before leaving work, would you notice that it is missing the next day or would it take some time?



Removable media is very compact, which is convenient for both you and any thieves. Store these away safely. If one is lost, any information on it must be considered compromised, even if you think it may have been thrown away.

If you wish to throw away removable media, please destroy it so it would be very hard for anyone to use. Just deleting the contents is not enough. Recovering deleted files is a time-consuming task, but is fairly easy to do with the assortment of tools that are widely available.

I advise against saving sensitive information on removable media, but if you must, please encrypt the data. It will still be compromised, make no mistake, but it may protect the information enough that a less-than-determined attacker will give up or the media will be found.

Do you use a laptop, PDA, etc?

The same safety measures for removable media apply to portable devices as well. Since these devices hold even more information, they are even more critical. Remember, encryption is very important!

Do you either lock your screen or log out of your computer every time you leave your office?
An attacker only needs a minute or so to send themselves documents, send someone threats, etc. Your account is the one being used, so you would be investigated for it. Locking your screen only takes a second, and unlocking it only requires that you type your password. It’s a simple habit to learn that protects both you and the information.

To lock your screen in Windows, you press and hold the Windows key and press the L key. The Windows key is located in between the Ctrl and Alt keys on the lower left side of your keyboard.

Is your password written down anywhere? Is it a generic password? Is it a strong password?

If your password is written down, someone else probably knows it already. The most (in)famous hiding places are under your keyboard or in a desk drawer. If it is stuck to the front of your monitor, it isn't even hidden. If your password is a generic one (e.g. ‘password’), someone else probably knows it too. Also, I discussed strong passwords in February’s article. If your password isn’t strong (e.g. ‘password’, your ID #, etc), someone may know it or be able to guess it.
When thinking of physical security, most people think of security guards, cameras, and locked doors. Many fail to realize that they themselves also have a big role in keeping information safe from physical attackers, since the information is in electronic form. Instead of giving examples now, let’s jump right in and get started. I’m going to start each section with a question that I’d like you to think over before I explain.

Are you the only person with access to your office?

I highly doubt that you are the only one. Custodial and maintenance staff have keys that get them just about anywhere. I’m sure that you have had visitors or have held meetings in your office. You may ask, “Can’t we trust these people?” Sure we can, but it’s better to think of ways to secure what is in our office so any temptation a person may have is greatly reduced.

Do you have any documents with sensitive data in plain view?

I know that you need to be able to see the documents to work with them, so of course they are in plain view at some point. When someone comes in your office or when you are absent, though, these documents need to be stored away. Remember the old movies where the spy would take photographs of documents with their bow-tie camera? Well, it’s not that different today. With miniature cameras like those in cell phones widely and easily available, it is simple for anyone to take a photo without being noticed... even when you are standing right there!

When you print documents, do you pick them up immediately, or do they sit on an office printer for some time? This is another area where caution needs to be taken.

When you dispose of documents with sensitive information, a shredder must always be used. People may legally dig through trash (called “dumpster diving”), and take whatever they find. Many people even treat this as a hobby and do so regularly.

Do you have any removable media (floppy disks, CDs, Flash drives, etc) with sensitive information?
How often have you misplaced a CD or a floppy? I know that I have. Even if you haven't, if you place one on your desk before leaving work, would you notice that it is missing the next day or would it take some time?



Removable media is very compact, which is convenient for both you and any thieves. Store these away safely. If one is lost, any information on it must be considered compromised, even if you think it may have been thrown away.

If you wish to throw away removable media, please destroy it so it would be very hard for anyone to use. Just deleting the contents is not enough. Recovering deleted files is a time-consuming task, but is fairly easy to do with the assortment of tools that are widely available.

I advise against saving sensitive information on removable media, but if you must, please encrypt the data. It will still be compromised, make no mistake, but it may protect the information enough that a less-than-determined attacker will give up or the media will be found.

Do you use a laptop, PDA, etc?

The same safety measures for removable media apply to portable devices as well. Since these devices hold even more information, they are even more critical. Remember, encryption is very important!

Do you either lock your screen or log out of your computer every time you leave your office?
An attacker only needs a minute or so to send themselves documents, send someone threats, etc. Your account is the one being used, so you would be investigated for it. Locking your screen only takes a second, and unlocking it only requires that you type your password. It’s a simple habit to learn that protects both you and the information.

To lock your screen in Windows, you press and hold the Windows key and press the L key. The Windows key is located in between the Ctrl and Alt keys on the lower left side of your keyboard.

Is your password written down anywhere? Is it a generic password? Is it a strong password?

If your password is written down, someone else probably knows it already. The most (in)famous hiding places are under your keyboard or in a desk drawer. If it is stuck to the front of your monitor, it isn't even hidden. If your password is a generic one (e.g. ‘password’), someone else probably knows it too. Also, I discussed strong passwords in February’s article. If your password isn’t strong (e.g. ‘password’, your ID #, etc), someone may know it or be able to guess it.

Wednesday, 4 May 2016

Preventing and Responding to Identity Theft

Is identity theft just a problem for people who submit information online?

You can be a victim of identity theft even if you never use a computer. Malicious people may be able to obtain personal information (such as credit card numbers, phone numbers, account numbers, and addresses) by stealing your wallet, overhearing a phone conversation, rummaging through your trash (a practice known as dumpster diving), or picking up a receipt at a restaurant that has your account number on it. If a thief has enough information, he or she may be able to impersonate you to

purchase items, open new accounts, or apply for loans.

The internet has made it easier for thieves to obtain personal and financial data. Most companies and other institutions store information about their clients in databases; if a thief can access that database, he or she can obtain information about many people at once rather than focus on one person at a time. The internet has also made it easier for thieves to sell or trade the information, making it more difficult for law enforcement to identify and apprehend the criminals.

How are victims of online identity theft chosen?

Identity theft is usually a crime of opportunity, so you may be victimized simply because your information is available. Thieves may target customers of certain companies for a variety of reasons: a company database is easily accessible, the demographics of the customers are appealing, there is a market for specific information, etc. If your information is stored in a database that is compromised, you may become a victim of identity theft.

Are there ways to avoid being a victim?

Unfortunately, there is no way to guarantee that you will not be a victim of online identity theft. However, there are ways to minimize your risk:

§  Do business with reputable companies

- Before providing any personal or financial information, make sure that you are interacting with a reputable, established company. Some attackers may try to trick you by creating malicious web sites


that appear to be legitimate, so you should verify the legitimacy before supplying any information.

§  Take advantage of security features

-  Passwords and other security features add layers of protection if used appropriately.
§  Check privacy policies

-  Take precautions when providing information, and make sure to check published privacy policies to see how a company will use or distribute your information. Many companies allow customers to request that their information not be shared with other companies; you should be able to locate the details in your account literature or by contacting the company directly.

§  Be careful what information you publicize

-  Attackers may be able to piece together information from a variety of sources. Avoid posting personal data in public forums.
§  Use and maintain anti-virus software and a firewall

-  Protect yourself against viruses and Trojan horses that may steal or modify the data on your own computer and leave you vulnerable by using anti-virus software and a firewall. Make sure to keep your virus definitions up to date.

§  Be aware of your account activity

-  Pay attention to your statements, and check your credit report yearly. You are entitled to a free copy of your credit report from each of the main credit reporting companies once every twelve

months.

How do you know if your identity has been stolen?

Companies have different policies for notifying customers when they discover that someone has accessed a customer database. However, you should be aware of changes in your normal account activity. The following are examples of changes that could indicate that someone has accessed your information:

§  unusual or unexplainable charges on your bills

§  phone calls or bills for accounts, products, or services that you do not have
§  failure to receive regular bills or mail


§  new, strange accounts appearing on your credit report

§  unexpected denial of your credit card

What can you do if you think, or know, that your identity has been stolen?
Recovering from identity theft can be a long, stressful, and potentially costly process. Many credit card companies have adopted policies that try to minimize the amount of money you are liable for, but the implications can extend beyond your existing accounts. To minimize the extent of the damage, take action as soon as possible:

§  Contact companies, including banks, where you have accounts

-  Inform the companies where you have accounts that someone may be using your identity, and find out if there have been any unauthorized transactions. Close accounts so that future charges are denied. In addition to calling the company, send a letter so there is a record of the problem.

§  Contact the main credit reporting companies (Equifax, Experian, TransUnion)

-  Check your credit report to see if there has been unexpected or unauthorized activity. Have a fraud alerts placed on your credit reports to prevent new accounts being opened without verification.
§  File a report

-  File a report with the local police so there is an official record of the incident. You can also file a complaint with the Federal Trade Commission.

§  Consider other information that may be at risk

-  Depending what information was stolen, you may need to contact other agencies; for example, if a thief has access to your Social

Security number, contact the Social Security Administration. You should also contact the Department of Motor Vehicles if your

driver's license or car registration have been stolen.

The following sites offer additional information and guidance for recovering from identity theft:


§  Federal Trade Commission -

http://www.ftc.gov/bcp/conline/pubs/credit/idtheft.htm and http://www.consumer.gov/idtheft/
§  United States Department of Justice - http://www.usdoj.gov/criminal/fraud/idtheft.html
§  Social Security Administration - http://www.ssa.gov/pubs/idtheft.ht
Is identity theft just a problem for people who submit information online?

You can be a victim of identity theft even if you never use a computer. Malicious people may be able to obtain personal information (such as credit card numbers, phone numbers, account numbers, and addresses) by stealing your wallet, overhearing a phone conversation, rummaging through your trash (a practice known as dumpster diving), or picking up a receipt at a restaurant that has your account number on it. If a thief has enough information, he or she may be able to impersonate you to

purchase items, open new accounts, or apply for loans.

The internet has made it easier for thieves to obtain personal and financial data. Most companies and other institutions store information about their clients in databases; if a thief can access that database, he or she can obtain information about many people at once rather than focus on one person at a time. The internet has also made it easier for thieves to sell or trade the information, making it more difficult for law enforcement to identify and apprehend the criminals.

How are victims of online identity theft chosen?

Identity theft is usually a crime of opportunity, so you may be victimized simply because your information is available. Thieves may target customers of certain companies for a variety of reasons: a company database is easily accessible, the demographics of the customers are appealing, there is a market for specific information, etc. If your information is stored in a database that is compromised, you may become a victim of identity theft.

Are there ways to avoid being a victim?

Unfortunately, there is no way to guarantee that you will not be a victim of online identity theft. However, there are ways to minimize your risk:

§  Do business with reputable companies

- Before providing any personal or financial information, make sure that you are interacting with a reputable, established company. Some attackers may try to trick you by creating malicious web sites


that appear to be legitimate, so you should verify the legitimacy before supplying any information.

§  Take advantage of security features

-  Passwords and other security features add layers of protection if used appropriately.
§  Check privacy policies

-  Take precautions when providing information, and make sure to check published privacy policies to see how a company will use or distribute your information. Many companies allow customers to request that their information not be shared with other companies; you should be able to locate the details in your account literature or by contacting the company directly.

§  Be careful what information you publicize

-  Attackers may be able to piece together information from a variety of sources. Avoid posting personal data in public forums.
§  Use and maintain anti-virus software and a firewall

-  Protect yourself against viruses and Trojan horses that may steal or modify the data on your own computer and leave you vulnerable by using anti-virus software and a firewall. Make sure to keep your virus definitions up to date.

§  Be aware of your account activity

-  Pay attention to your statements, and check your credit report yearly. You are entitled to a free copy of your credit report from each of the main credit reporting companies once every twelve

months.

How do you know if your identity has been stolen?

Companies have different policies for notifying customers when they discover that someone has accessed a customer database. However, you should be aware of changes in your normal account activity. The following are examples of changes that could indicate that someone has accessed your information:

§  unusual or unexplainable charges on your bills

§  phone calls or bills for accounts, products, or services that you do not have
§  failure to receive regular bills or mail


§  new, strange accounts appearing on your credit report

§  unexpected denial of your credit card

What can you do if you think, or know, that your identity has been stolen?
Recovering from identity theft can be a long, stressful, and potentially costly process. Many credit card companies have adopted policies that try to minimize the amount of money you are liable for, but the implications can extend beyond your existing accounts. To minimize the extent of the damage, take action as soon as possible:

§  Contact companies, including banks, where you have accounts

-  Inform the companies where you have accounts that someone may be using your identity, and find out if there have been any unauthorized transactions. Close accounts so that future charges are denied. In addition to calling the company, send a letter so there is a record of the problem.

§  Contact the main credit reporting companies (Equifax, Experian, TransUnion)

-  Check your credit report to see if there has been unexpected or unauthorized activity. Have a fraud alerts placed on your credit reports to prevent new accounts being opened without verification.
§  File a report

-  File a report with the local police so there is an official record of the incident. You can also file a complaint with the Federal Trade Commission.

§  Consider other information that may be at risk

-  Depending what information was stolen, you may need to contact other agencies; for example, if a thief has access to your Social

Security number, contact the Social Security Administration. You should also contact the Department of Motor Vehicles if your

driver's license or car registration have been stolen.

The following sites offer additional information and guidance for recovering from identity theft:


§  Federal Trade Commission -

http://www.ftc.gov/bcp/conline/pubs/credit/idtheft.htm and http://www.consumer.gov/idtheft/
§  United States Department of Justice - http://www.usdoj.gov/criminal/fraud/idtheft.html
§  Social Security Administration - http://www.ssa.gov/pubs/idtheft.ht

 

Security Learner's Blog

This content is DMCA Protected.Copying or reproducing of procedure is prohibited.Do Not Copy!!