Forums before death by AOL, social media and spammers... "We can't have nice things"
|    alt.privacy    |    Discussing privacy, laws, tinfoil hats    |    112,125 messages    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
|    Message 110,392 of 112,125    |
|    Leroy N. Soetoro to All    |
|    What's worse than thieves hacking into y    |
|    20 Jul 24 01:29:04    |
      XPost: talk.politics.guns, alt.crime, alt.politics.democrats       XPost: alt.fan.rush-limbaugh, sac.politics       From: democrat-criminals@mail.house.gov              https://apnews.com/article/fraud-identity-theft-fcc-wireless-providers-       8df930f2983d589c4822bba53eedfc1b              WASHINGTON (AP) — One Monday morning in May, I woke up and grabbed my cell       phone to read the news and scroll through memes. But it was out of cell       service. I couldn’t make calls or texts.              That, though, turned out to be the least of my problems.              Using my home Wi-Fi connection, I checked my email and discovered a       notification that $20,000 was being transferred from my credit card to an       unfamiliar Discover Bank account.              I thwarted that transfer and reported the cell phone issues, but my       nightmare was just starting. Days later, someone managed to transfer       $19,000 from my credit card to the same strange bank account.              I was the victim of a type of fraud known as port-out hijacking, also       called SIM-swapping. It’s a less-common form of identity theft. New       federal regulations aimed at preventing port-out hijacking are under       review, but it’s not clear how far they will go in stopping the crime.              Port-out hijacking goes a step beyond hacking into a store, bank or credit       card account. In this case, the thieves take over your phone number. Any       calls or texts go to them, not to you.              When your own phone access is lost to a criminal, the very steps you once       took to protect your accounts, such as two-factor authentication, can be       used against you. It doesn’t help to have a bank send a text to verify a       transaction when the phone receiving the text is in the hands of the very       person trying to break into your account.              Even if you’re a relatively tech-savvy individual who follows every       recommendation on how to protect your tech and identity, it can still       happen to you.              Experts say these scams will only increase and become more sophisticated,       and the data show they are on the rise.              I am not the most tech savvy person, but I am a law-school educated       journalist who specializes in finance reporting. Due to the very online       nature of my job, I was taught all the methods of staying safe online:       constantly changing my passwords with multi-factor authentication, signing       out of apps that I don’t use regularly and keeping my personal information       off the internet.              Still, despite being safe, I was vulnerable to criminals. And it took a       lot of time and legwork before I got my money and phone number back.              The FBI Internet Crime Complaint Center reports SIM-swapping complaints       have increased more than 400% from 2018 to 2021, having received 1,611 SIM       swapping complaints with personal losses of more than $68 million.              Complaints to the FCC about the crime have doubled, from 275 complaints in       2020 to 550 reports in 2023.              Rachel Tobac, CEO of SocialProof Security, an online security company,       says the rate of the crime is likely much higher since most identity       thefts are not reported.              She also says two-factor authentication is an outdated way of keeping       consumers safe, since it’s possible to find anyone’s phone number,       birthday and social security number through any number of public or       private databases on the web.              The ability of thieves to obtain your personal information was again made       clear Friday when AT&T said the data of nearly all of its customers was       downloaded to a third-party platform in a security breach two years ago.       Although AT&T claims no personal information was leaked, cybersecurity       experts have warned breaches involving telephone companies leave customers       vulnerable to SIM swapping.              As of now, switching numbers from one phone to another is easy and can be       done online or over the phone. The process takes less than a few hours so       long as a criminal has your personal information on hand.              While consumers need to be smart about having a variety of different       passwords and protections, consumers need to “put pressure on companies       where its their job to protect our data,” Tobac said.              “We need them to update consumer protection protocols,” she said, since       two-factor authentication is not enough.              FCC rules have recently changed to force companies to do more to protect       consumers from this type of scam.              In 2023, the FCC introduced rulemaking that require wireless providers to       “adopt secure methods of authenticating a customer before redirecting a       customer’s phone number to a new device or provider” among other new       rules. Companies could require more information when a customer tries to       port over a phone number to another phone — from requiring government       identification, voice verification or additional security questions.              The rules were scheduled to take effect on July 8, but the FCC on July 5       granted phone companies a waiver that delays implementation until the       White House Office of Management conducts a further review.              The wireless industry had sought the delay, stating among other reasons       that companies need more time to comply. CTIA, which lobbies on behalf of       the companies, said the new rules will require major changes in technology       and procedures both within the wireless companies and in their       interactions with phone manufacturers.              But if the FCC rules had been in place, my phone number might have been       harder to steal, experts say.              Ohio State University Professor Amy Schmitz says the new FCC rules make it       easier for consumers to protect themselves, but it is still reliant on       action and awareness of the consumers.              “I still question whether consumers will be aware of this, and will take       action to protect themselves,” she said.              It took ten days to get my number back from Cricket Wireless — and that       wasn’t until I told company representatives that I was writing a story       about my experience.              In that period of time the scammer was able to access my bank account       three times and eventually successfully transferred $19,000 from my credit       card— even though I removed my number from the bank account, froze my       credit, changed all my passwords, among other measures.              Bank of America worked to reverse the $19,000 wire after I visited a       branch near the AP bureau in Washington.              Cricket apologized for the error and said in an email that its       “expectation is to deliver a much better customer experience.”              “Fraudulent port-outs are a form of theft committed by sophisticated       criminals,” reads a company statement that was emailed to me. “We have       measures in place to help defeat them, and we work closely with law       enforcement, our industry and consumers to help prevent this type of       crime.”              An AT&T representative told me in an email that “all providers are working       to implement the FCC’s new rules on port-outs and SIM swaps.”              I’m still unsure of how this person got access to my accounts, whether       through my social security number, phone number or date of birth, or              [continued in next message]              --- SoupGate-Win32 v1.05        * Origin: you cannot sedate... all the things you hate (1:229/2)    |
[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]
(c) 1994, bbs@darkrealms.ca