Thursday, June 7, 2012

Are you experiencing Identity theft using WiFi Hotspots?


It seems more and more people are becoming victims of Identity Theft these days and many of those people became victims because they don't realize how vulnerable they are and don't know how to protect their information at all times. So they go to WiFi Hotspots in coffee shops and book stores, and they travel using the airport and hotel WiFi always assuming they are safe.

According to the Javelin report (https://www.javelinstrategy.com/research/Brochure-209) 11.6 million adults in the U.S. were victims of ID fraud last year, and that is 13% more than in 2010. In a 2011 survey conducted for the Wi-Fi Alliance, it was discovered that only 18% of public Wifi users reported they use a VPN to encrypt their information when they’re logged into hotspots. So that means the sensitive information of the remaining 72% is easily accessible to hackers and they are a higher risk for Identity Theft.
So how do we protect ourselves in public when we don't control the internet connection or the firewall settings? Software is easily obtained from various hacker web sites that allow even unskilled people to scan all the data across a network. Now, anyone who wants it can download a wireless hacking kit and anyone in the room could be scanning everyone's data.
Here are a few suggestions from the Better Business Bureau for you to use when you're connecting to public WiFi networks:
How to Disconnect from Hotspot Hacking Risks
  • Never connect to any unfamiliar network. Disable automatic connections to wireless networks.
  • Turn off file sharing when you’re on the road .
  • When you use public Wifi networks, the BBB says it’s wise to use a virtual private network (VPN) to prevent hackers from intercepting your data.
The Federal Trade Commission also recommends that if you access online accounts through Wifi hotspots, you use a personal VPN to encrypt traffic between your computer and the Internet.


What is a VPN
A VPN (Virtual Private Network) creates a secure tunnel between you and a safe server that encrypts and protects you and your sensitive information by making it invisible to hackers. It's like using your own  PRIVATE WiFi, even when you’re on unsecure networks. That means your identity is safe every time you go online.





When you connect through a secure VPN, your IP (Internet Protocol) address becomes the one of the trusted server you are connected to. Therefore, as you surf the internet, the owners of the websites you visit do not know who you are and cannot collect information on you based on your IP address. Web sites can no longer use your surfing habits to create targeted marketing databases, containing your information, and sell them to anyone willing to pay.


How do you create a VPN??
There are several Personal VPN's available to the public today, ranging from free to very expensive. Try to resist the urge to use a free or inexpensive VPN service. In exchange for providing the free service, you agree to let them look at your data for marketing purposes. In essence, you give them an exclusive license to look at your personal data. Did you read the full terms of service contract before you licked o the "OK, Sign Me Up" button? Not every Terms of Use contract is the same, companies use attorneys to create a legally binding contract that protects them, and when you agree to those terms, you have no recourse. Considering your privacy is what you're striving for - the 'free' solution isn't really a bargain is it?


When seeking a good VPN service, steer clear of vendors selling 'Personal VPN' services that only offer the PPTP protocol included with most operating systems. It is a flawed protocol and it's the cheap and easy way to do a VPN. If a vendor is not using SSL encryption, just steer clear! You can usually identify PPTP vendors by the advertising claim of 'no software required'. A PPTP VPN is mostly used with mobile phone devices and tablets that do not support any other encryption type. So if the vendor offers a choice between PPTP and L2TP, use the L2TP protocol as the better option on your phone or tablet computer. Companies who use SSL encryption so protect their networks are banks and credit card companies, and some use well known and tested software such as OpenVPN. 




TO REPORT AN INCIDENT OF IDENTITY THEFT:
U. S. Federal Trade Commission 877-382-4357 http://www.ftc.gov
Victim Support Hotline 888-771-0676 http://www.identitytheftcouncil.org
Elder Financial Protection Network http://www.bewiseonline.org
Social Security Administration Fraud Reporting 800-269-0271 http://www.ssa.gov



MORE INFORMATION ABOUT IDENTITY THEFT AND FRAUD:

http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/about-identity-theft.html
http://www.ftc.gov/os/2000/07/idtheft.htm

BOOKS:



LINKS:



ADD US: