Criminals Identify Deceased ID as Easy Target

 

Physical theft remains the quickest way to steal from an individual, but criminals now recognise the opportunities around information and identity theft, with 79 per cent saying ID fraud is easier than benefit fraud or burglary.

A survey among 53 ex-offenders carried out by Unlock on behalf of Wilmington Millennium found strong evidence that criminals are turning towards data-driven crimes over other options.
 
“We felt running this survey with the ex-offenders charity would give us some valuable insights into the issue of identity theft, but we were not quite prepared for what we found,” admits Karen Pritchard, product director, Halo, at Wilmington Millennium. “We expected that stealing wallets and credit cards would come out fairly high, but the fact that deceased identity fraud came second was a shock.”

As the top ten forms of identity theft reveal, a combination of physical, direct and data-driven approaches are now being adopted. While several of these rely on old-school confidence trickery, such as phishing, bogus texts or calls, or physical removal of mail or discarded documents, it is the harvesting of information to build a full profile and hijack accounts or identities, which is troubling.

“Companies should be using the resources that are in place. We capture deceased daily data and output our file weekly, so clients are getting information on deaths that have happened during that week,” says Pritchard. “So perhaps there is a problem with the processes at the clients’ end.”
CIFAS estimates that identity fraud has a £3.3 billion annual cost. “Criminals are very clever and see deceased identity fraud as an easy option. We know it is avoidable,” says Pritchard.

The ten top forms of identity theft are: stolen wallets/handbags, deceased identity fraud, mail theft, SMSishing, Dumpster diving, Phishing, Skimming and overlays, phone fraud, online fraud and change of address fraud.
DataIQ: http://bit.ly/1SscFHO

« Industrial Control Systems Vulnerable
US Agencies Freak Out Over Juniper Backdoor »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Ethio-CERT

Ethio-CERT

National Cyber Emergency Readiness and Response Team of Ethiopia.

Exida

Exida

Exida is a leading product certification and knowledge company specializing in industrial automation system safety, security, and availability.

Protection Group International (PGI)

Protection Group International (PGI)

PGI helps organisations and governments to manage digital risk. From cyber security services to business intelligence, we help reduce the risks to your finances, reputation, assets and people.

Secmentis

Secmentis

Secmentis is a cyber security consultancy specializing in penetration testing, threat intelligence, and proactive defense for your IT infrastructure.

AppSec Labs

AppSec Labs

AppSec Labs specialise in application security. Our mission is to raise awareness in the software development world to the importance of integrating software security across the development lifecycle.

Securicon

Securicon

Securicon provides expert consulting for application, system and network security.

Cyber Security Jobs

Cyber Security Jobs

Cyber Security Jobs was formed to help job seekers find jobs and recruiters fill cyber security job vacancies.

GK8

GK8

GK8 is a cyber security company that offers a high security custodian technology for managing and safeguarding digital assets. Secure, Compliant and Practical.

SimSpace

SimSpace

SimSpace is the visionary yet practical platform for measuring how your security system responds under actual, sustained attack.

Quantum Security

Quantum Security

Quantum's game-changing approach to cybersecurity brings you performance and peace-of-mind, with a raft of additional benefits: it's non-proprietary, comprehensive, scalable, and affordable.

Revere Technologies

Revere Technologies

Revere Technologies is a pure-play cyber security solutions and services provider in Sub-Saharan Africa.

Cegeka

Cegeka

Cegeka is a family-owned IT company providing end-to-end IT solutions, services & consultancy.

PA Consulting

PA Consulting

PA Consulting Group is a consultancy that specialises in strategy, technology and innovation. Our cyber security experts work with you to spot digital and technology security risks and reduce them.

TAFEcyber

TAFEcyber

TAFEcyber is an Australian based consortium focusing on the skilling of the fast-growing cyber security workforce through education and training.

Allot

Allot

Allot are a global provider of leading innovative network intelligence and security solutions for Service Providers and Enterprises worldwide.

Finlaw Associates

Finlaw Associates

Finlaw Associates is a trusted cybercrime law firm providing a wide range of taxation, legal, advisory and regulatory services to the financial, commercial and industrial communities.