Protect your identity

November 2010 Access Control & Identity Management, Information Security

Identity fraud, according to Wikipedia is “a form of fraud in which someone pretends to be someone else by assuming that person’s identity, typically in order to access resources or obtain credit and other benefits in that person’s name. The victim of identity theft (here meaning the person whose identity has been assumed by the identity thief) can suffer adverse consequences if he or she is held accountable for the perpetrator’s actions.”

But how can an identity be ‘stolen’? In a time when almost anything can be done on a computer, phishing is a common process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communication claiming to be from a popular social web site, for example, can be used to lure the unsuspecting public.

Usually in the form of an e-mail or instant message, phishing typically directs recipients to enter details at a fake website which has been designed to closely resemble a legitimate one. The fraudsters then have the information they need to pose as the person who supplied the details, and the information is used for activities such as opening accounts or purchasing items fraudulently.

The public is regularly warned of such threats, but what about those phone calls we may innocently answer…

Remember this call?

Your cellphone rings. The caller ID is hidden…

“Hello.”

“Good afternoon Mrs Jones, I am phoning you from VMC Mobile. Your number has been selected and you qualify for two free tickets to the fourth game of the world cup”

“Tell me more.”

“First I need you to confirm your ID number please.”

You wait for the caller to read out your ID number so that you can confirm it. Nothing is forthcoming.

“Your ID number please,” the caller continues.

If you unthinkingly rattle off your ID number, followed by your address and any other information you are asked to ‘confirm’, you are supplying the caller with enough information for them to effectively pose as you!

Are you a victim?

Jayson O’Reilly, regional manager Africa, McAfee describes identity theft as a serious crime that can cost victims a lot of time and money by destroying their credit and ruining their reputations.

“Identity thieves and hackers target home computers because they know families often do not maintain adequate security protection on their PCs. This makes these family users easy and lucrative targets. Many hackers access your personal information in order to steal your identity and your money. Others might want to use your home computer as a shield to mask their identity as they steal from others,” says O’Reilly. “Phishing is a particular type of identity theft: the online method of fraudulently obtaining personal information for identity theft, such as passwords, social security numbers, and credit card details, by sending spoofed


e-mails that look like they come from trusted sources, such as banks or legitimate companies.”

According to O’Reilly typically, phishing e-mails request that recipients click on the link in the e-mail to verify or update contact details or credit card information. Like spam, identity theft e-mails are sent to a large number of e-mail addresses with the expectation that some percentage of recipients will read the messages and disclose their personal information.

Wally Gast, regional profit centre manager at Chartis South Africa, Personal Lines, Africa Region, defines identity theft as “the unauthorised and illegal use of personal information to obtain a loan or open credit accounts that the victim did not authorise.”

According to Gast, identity theft is on the rise, not only because of the vast amount of personal information that can be accessed via the Internet, but also the ‘low tech’ ways that this crime can be committed.

“This can happen when people lose or have their ID books stolen, when criminals go through your garbage to find old accounts and statements or swipe your mail for the same purpose. People really need to take care with documents when they throw them away. Shredding documents before disposal is a very good idea,” says Gast.

“We also take note of notorious cases where the Department of Home Affairs has issued duplicate identification books using the identification number of an innocent person. There are also a lot of cases where people have discovered they are ‘married’ to someone only when they start getting massive bills in the post. It is worthwhile to have protection against this type of crime especially as it is so prevalent in South Africa. Getting your identity back can take weeks of personal time and could cost tens of thousands of Rands in legal fees,” he adds.

O’Reilly further points out that this form of cybercrime is a federal crime in the United States and the country’s Federal Trade Commission has named identity fraud as the most popular form of consumer fraud.

In South Africa the issue continues to plague general trade, with authorities continuing to receive more complaints than in the past. It is particularly prevalent within the world of finance and fraudsters have emerged far more tech-savvy than in the past. It occurs when a criminal uses personal information to produce false FICA documents, to steal financial resources,” he adds.

Get protected

“As with any threat, the more a person is empowered with knowledge, the better. An example of identity fraud is when someone steals personal information, opens a credit account in your name without permission, and charges merchandise to those accounts. Conversely, identity fraud does not occur when a credit card is simply stolen. Stealing one’s credit card may be consumer fraud, but is not identity fraud” he adds.

Aside from being informed and staying informed, the consumer and user of information, communication and digital lifestyle technology has various options available to ensure that they do not fall victim to this fraud. The problem cannot completely be eradicated, but there are a number of steps that can be taken to reduce risk.

“Criminals can commit identity theft relatively easily because of lax credit industry practices, careless information-handling practices in the workplace, and the ease of obtaining personal information. But you can reduce your risk of fraud by following a few very practical tips. The most important advice we can give you is to check your credit report at least once a year. If you are a victim of identity theft, you will catch it early by checking your credit report regularly,” Gast concludes.

Buyer beware

* When using your credit and debit cards at restaurants and stores, pay close attention to how the magnetic stripe information is swiped by the waiter or clerk. Dishonest employees have been known to use small handheld devices called skimmers to commit fraud.

* When creating passwords and PINs (personal identification numbers), avoid using common information or combinations that would easily be linked to your details.

* Install a firewall on your home computer to prevent hackers from obtaining personal identifying and financial data from your hard drive. This is especially important if you connect to the Internet by DSL or cable modem.

* Install and update virus protection software to prevent a worm or virus from causing your computer to send out files or other stored information.

* Subscribe to an Identity Protection Services that offers insurance against identity theft.

Proactive steps for victims of ID theft

* Report the theft to local law enforcement representatives.

* File a complaint and complete the ID theft affidavit.

* Inform all relevant institutions of the fraudulent activity – both telephonically and in writing.

* Send follow-up letters to the credit bureaus detailing the status of resolution with institutions and creditors.

Telephone tactics

* When a caller asks you to ‘confirm’ any information, they need to supply that information first and you either confirm it as correct or not.

* Private information, eg, your full name, phone numbers, e-mail address, credit card numbers, postal address and e-mail address, could be used for identity theft. Do not give these out over the phone unless you have made the call and you are certain of whom you are talking to.

* Ask the caller to identify themselves by name and company. If you have any suspicion, ask to be transferred to their superior, and ask for a reference number for the call.

For more information contact:, Ideco, +27 (0)11 745 5600, www.ideco.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Corporate and academic teams can register for Kaspersky contest
Kaspersky News & Events Information Security
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

Read more...
Secure, touchless access control
Access Control & Identity Management Products & Solutions Commercial (Industry)
Invixium has joined forces with SAP to deliver a touchless access control experience for the S.Mart Store, SAP’s first fully automated, 24/7 self-service retail outlet, located at its global headquarters in Walldorf, Germany.

Read more...
The real cost of DHA’s verification fee
Ideco Biometrics Integrated Solutions
South Africa’s Department of Home Affairs has proposed a significant increase in its online ID-verification fee, which could have severe unintended consequences, potentially undermining the progress made in anti-money laundering initiatives and exposing individuals to greater risk of identity fraud.

Read more...
Continuous security optimisation.
News & Events Information Security
Cymulate has announced its partnership with SentinelOne, a threat exposure validation and AI-powered cybersecurity platform. The collaboration delivers self-healing endpoint security that empowers businesses to increase protection for every endpoint on their network.

Read more...
Protect your smart home devices
Kaspersky IoT & Automation Information Security Smart Home Automation
Voice assistants, kitchen robots, smart lights and many other intelligent devices have become part of our everyday life. However, with the rise of smart technology comes the need for robust protection against potential vulnerabilities.

Read more...
ISPA’s take-down process protects from local scams
News & Events Information Security
During the recent school holidays, parents could rest a little easier knowing that ISPA, SA’s official internet industry representative body, is removing an average of three to four problematic websites from the local internet every week.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.