Criminals Identify Deceased ID as Easy Target

 

Physical theft remains the quickest way to steal from an individual, but criminals now recognise the opportunities around information and identity theft, with 79 per cent saying ID fraud is easier than benefit fraud or burglary.

A survey among 53 ex-offenders carried out by Unlock on behalf of Wilmington Millennium found strong evidence that criminals are turning towards data-driven crimes over other options.
 
“We felt running this survey with the ex-offenders charity would give us some valuable insights into the issue of identity theft, but we were not quite prepared for what we found,” admits Karen Pritchard, product director, Halo, at Wilmington Millennium. “We expected that stealing wallets and credit cards would come out fairly high, but the fact that deceased identity fraud came second was a shock.”

As the top ten forms of identity theft reveal, a combination of physical, direct and data-driven approaches are now being adopted. While several of these rely on old-school confidence trickery, such as phishing, bogus texts or calls, or physical removal of mail or discarded documents, it is the harvesting of information to build a full profile and hijack accounts or identities, which is troubling.

“Companies should be using the resources that are in place. We capture deceased daily data and output our file weekly, so clients are getting information on deaths that have happened during that week,” says Pritchard. “So perhaps there is a problem with the processes at the clients’ end.”
CIFAS estimates that identity fraud has a £3.3 billion annual cost. “Criminals are very clever and see deceased identity fraud as an easy option. We know it is avoidable,” says Pritchard.

The ten top forms of identity theft are: stolen wallets/handbags, deceased identity fraud, mail theft, SMSishing, Dumpster diving, Phishing, Skimming and overlays, phone fraud, online fraud and change of address fraud.
DataIQ: http://bit.ly/1SscFHO

« Industrial Control Systems Vulnerable
US Agencies Freak Out Over Juniper Backdoor »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

European Internet Forum (EIF)

European Internet Forum (EIF)

EIF’s mission is to help provide European political leadership for the political, economic and social challenges of the worldwide digital transformation.

BackBox Software

BackBox Software

BackBox is a leading provider of solutions for automated backup and recovery software for security and network devices.

Wizlynx Group

Wizlynx Group

Wizlynx services cover the entire risk management lifecycle from security assessments and compliance to the implementation of security solutions and provision of Managed Security Services.

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID)

Cyber Army Indonesia (CyberArmyID) is the first platform in Indonesia to collect and validate reports from hackers (referred to as Bug Hunter) regarding vulnerabilities that exist in an organization.

Tutamantic

Tutamantic

Tutamantic develops software that reduces security risks and weaknesses during the architectural and design stages.

Cyber Command - Estonian Defence Forces

Cyber Command - Estonian Defence Forces

The main mission of the Cyber Command is to carry out operations in cyberspace in order to provide command support for Ministry of Defence’s area of responsibility.

Cyber Intelligence 4U

Cyber Intelligence 4U

Cyber Intelligence 4U is an educational services company that provides two levels of cybersecurity training programs: executive and technical.

Maven Security Consulting

Maven Security Consulting

Maven Security Consulting helps companies secure their information assets and digital infrastructure by providing a wide range of customized consulting and training services.

Allentis

Allentis

Allentis provide adapted solutions to ensure the security and performance of your information system.

Celcom

Celcom

Celcom is the oldest mobile telecommunications provider in Malaysia, providing solutions and services to consumers and businesses.

Adversa AI

Adversa AI

Adversa's mission is to build trust in AI and protect AI from cyber threats, privacy issues, and safety incidents.

Emerge Digital

Emerge Digital

Emerge Digital is a technology and digital innovation business and Managed Services Provider providing solutions to SMEs.

Scinary Cybersecurity

Scinary Cybersecurity

Scinary was founded in 2015 on the premise that cybersecurity should not be limited to just large corporations or large government entities.

FatPipe Networks

FatPipe Networks

FatPipe’s network optimization solutions along with robust native security and SASE-based protection provides organizations all they need for super network performance and security.

Datacom

Datacom

Datacom design, build and run IT systems and processes across operations, cybersecurity, cloud, digital platforms, payroll and enterprise applications.

Daylight Security

Daylight Security

Daylight Security is the leading provider of Managed Agentic Security Services, offering tailored MDR solutions that are delivered by Agentic AI and backed by elite human experts.