Criminals Identify Deceased ID as Easy Target

 

Physical theft remains the quickest way to steal from an individual, but criminals now recognise the opportunities around information and identity theft, with 79 per cent saying ID fraud is easier than benefit fraud or burglary.

A survey among 53 ex-offenders carried out by Unlock on behalf of Wilmington Millennium found strong evidence that criminals are turning towards data-driven crimes over other options.
 
“We felt running this survey with the ex-offenders charity would give us some valuable insights into the issue of identity theft, but we were not quite prepared for what we found,” admits Karen Pritchard, product director, Halo, at Wilmington Millennium. “We expected that stealing wallets and credit cards would come out fairly high, but the fact that deceased identity fraud came second was a shock.”

As the top ten forms of identity theft reveal, a combination of physical, direct and data-driven approaches are now being adopted. While several of these rely on old-school confidence trickery, such as phishing, bogus texts or calls, or physical removal of mail or discarded documents, it is the harvesting of information to build a full profile and hijack accounts or identities, which is troubling.

“Companies should be using the resources that are in place. We capture deceased daily data and output our file weekly, so clients are getting information on deaths that have happened during that week,” says Pritchard. “So perhaps there is a problem with the processes at the clients’ end.”
CIFAS estimates that identity fraud has a £3.3 billion annual cost. “Criminals are very clever and see deceased identity fraud as an easy option. We know it is avoidable,” says Pritchard.

The ten top forms of identity theft are: stolen wallets/handbags, deceased identity fraud, mail theft, SMSishing, Dumpster diving, Phishing, Skimming and overlays, phone fraud, online fraud and change of address fraud.
DataIQ: http://bit.ly/1SscFHO

« Industrial Control Systems Vulnerable
US Agencies Freak Out Over Juniper Backdoor »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

authen2cate

authen2cate

Authen2cate offers a simple way to provide application access with our Identity and Access Management (IAM) solutions for enterprise, small business, and individual customers alike.

ExaGrid Systems

ExaGrid Systems

ExaGrid provides Tiered Backup Storage with a unique disk-cache Landing Zone, long-term retention repository, and scale-out architecture.

JumpCloud

JumpCloud

JumpCloud's Directory-as-a-Service (DaaS) is the single point of authority to authenticate, authorize, and manage the identities of a business’s employees and the systems and IT resources they need.

Charlton Networks

Charlton Networks

Charlton Networks provide a complete range of IT infrastructure, network and security solutions aimed at SME companies.

Axial

Axial

Axial Systems is one of the UK’s leading solution providers and systems integrators in network, security and services.

Brit

Brit

Brit PLC is a market-leading global specialty insurer and reinsurer, focused on underwriting complex risks including cyber, privacy and technology.

Digital Guardian

Digital Guardian

Digital Guardian is a next generation data protection platform designed to stop data theft.

ElcomSoft

ElcomSoft

ElcomSoft is a global leader in computer and mobile forensics, IT security and forensic data recovery.

Neoteric Networks

Neoteric Networks

We deliver a no nonsense procedure to implementing technology. The technology selection process ensures that all customers enjoy an engineered methodology implementing technology.

Cyberport

Cyberport

Cyberport is focused on facilitating the growth of major technology trends such as FinTech and cybersecurity as well as the emerging technologies of AI, big data and blockchain.

HacWare

HacWare

HacWare is a data driven cybersecurity awareness product that leverages machine learning and behavior analytics help IT professionals combat phishing.

Onclave Networks

Onclave Networks

Onclave Networks is a global cybersecurity leader, transforming the future of securing all IT/OT devices and systems.

Flat6Labs

Flat6Labs

Flat6Labs is the MENA region’s leading seed and early stage venture capital firm, currently running the most renowned startup programs in the region.

Quantum eMotion (QeM)

Quantum eMotion (QeM)

Quantum eMotion is a Montreal-based advanced developer leading the way towards a new generation of quantum-safe encryption for the quantum computing age.

Windstream

Windstream

Windstream is a leading provider of advanced network communications and technology solutions for consumers, small businesses, enterprise organizations and carrier partners across the US.

RedLattice

RedLattice

RedLattice are at the cutting edge of tool development and AI-assisted vulnerability research in cybersecurity.