opinion

Trying to Stop Web Fraud Before It Happens

Trying to Stop Web Fraud Before It Happens

You may have read or heard by now that one of the nation’s three major credit reporting agencies was the target of a malicious and illegal breach of security earlier this year.

Equifax has stated that the breach lasted from mid-May through July and the scope of information accessed includes Social Security numbers, birth dates, addresses, credit card numbers, and driver’s license numbers. It has been reported that individuals in Canada and the U.K. have also been affected by this breach.

The best advice we can offer when confronted with a spear-phishing scam is to assume the communication being received is suspect.

Equifax has created a website to help consumers protect their identity, but there’s a wait and the timeframe allotted to enroll is limited. Visit EquifaxSecurity2017.com to check if your personal information may be affected by the breach and be sure to visit soon because the enrollment period ends on Tuesday, Nov. 21.

In addition to placing a freeze and fraud alert on your credit report, there are a few other things you can do to be proactive in protecting your identity.

Placing a fraud alert and credit freeze on your credit profiles will make it more difficult, but not impossible, for someone to establish a credit account in your name without your knowledge or permission. Please note, you’ll need to repeat the process with each credit bureau as not all creditors and lenders use the same reporting agencies.

Check with the other major credit bureaus, Experian and TransUnion and monitor your credit report closely for unauthorized and unrecognized entries. You can check your credit reports at each reporting agency for free once per year at AnnualCreditReport.com. If you find accounts or activity you don’t recognize, visit IdentityTheft.com to take appropriate steps to report and rectify your situation.

Another tip is to file your taxes early, as soon as you have all the documents you need. A common practice of identity thieves is to use stolen Social Security numbers to gain employment, file tax returns fraudulently, and collect the refund owing to you from the federal government.

In the aftermath of the breach, several new trends have emerged within the criminal element, taking advantage of the breach. As if the breach itself isn’t bad enough on its own, this new practice dubbed, “spear-phishing,” is on the rise.

Most are familiar with the practice of phishing, when the intended victim is the recipient of an email from a well-established brand or bank claiming that access credentials have been compromised and a simple password reset will prevent any unauthorized access; all that needs to be done is click the link in the email and the recipient is directed to the password reset page.

Typically, the password reset page is a remarkably good facsimile of the legitimate business, bank, or brokerage and the user is prompted to enter their existing user name and password in order to confirm the new password — except what the user is likely unaware of is that they’ve just sent their perfectly valid and secure credentials to a criminal.

These types of phishing scams are easy to identify, usually due to poor grammar and poor formatting of the email but the new wave of spear-phishing is a little more sophisticated because it includes real and personal details illicitly acquired as a result of the most recent breach. Information such as your Social Security number may be included in the body of an email that has an attachment claiming to be from your bank or broker.

The email may prompt the recipient to click a link or download an attachment to confirm a transaction however, once that action is taken, the recipient of the email may be unknowingly downloading malicious software onto their computer, compromising the operating system, making it vulnerable to hijacking or recording keystrokes and sending them to unintended recipients.

“When you have a sophisticated criminal that has real information about you, it’s far more difficult to spot the fraud,” said Martin Walsh, a financial adviser with the Denver planning firm of Brown & Tedstrom.

The best advice we can offer when confronted with a spear-phishing scam is to assume the communication being received is suspect.

If an email is received from your bank, credit card issuer, or broker and you believe it to be legitimate, visit the company’s website directly or call the toll-free customer service number. Do not, under any circumstance, click the link or download the attachment.

Another, less-original practice of imposter scams, is seeing a resurgence owing to the Equifax data breach. The Federal Trade Commission has warned the public that it expects an increase of imposter scams, with individuals posing as representatives of Equifax “calling to verify your account information.”

Equifax is providing free credit monitoring and credit freezes as a result of the breach so the call may sound legitimate, but don’t ever provide confidential and private information over the phone to an inbound caller.

The purpose of this method is to get the recipient of the phone call, or sometimes e-mail, to disclose additional personal information to the imposter which they can either sell or use to establish new lines of credit fraudulently.

So, what should you do now that this has happened? First, check to see if you were affected by visiting the Equifax website listed earlier in this article. Secondly, take advantage of the free credit monitoring.

When you check to see if you were affected, you’ll be assigned an enrollment date — it’s important to set a calendar reminder for that date because Equifax will not send you a reminder — and you won’t be able to enroll until after your assigned date. Thirdly, freeze your credit, at all three bureaus.

The free credit monitoring is helpful, but it will not prevent identity theft. A credit freeze locks your credit profile to new inquiries and establishing new credit accounts, which can at least slow down, if not prevent, the theft of your identity.

Jonathan Corona has more than a decade of experience in the electronic payments processing industry. As Mobius Payments Inc.’s vice president of compliance, Corona is primarily responsible for day-to-day operations as well as reviewing and advising merchants on a multitude of compliance standards set forth by the card associations. Mobius Payments specializes in high-risk merchant accounts in the U.S., E.U. and Asia.

Related:  

Copyright © 2025 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

profile

WIA Profile: Reba Rocket

As chief operating officer and chief marketing officer of Takedown Piracy, long at the forefront of intellectual property protection in adult entertainment, Rocket is dedicated to safeguarding the livelihoods of content creators and producers while fostering a more ethical and sustainable industry.

Women In Adult ·
opinion

Protecting Content Ownership Rights When Using AI

In today’s digital age, content producers have more tools at their disposal than ever before. Among these tools, artificial intelligence (AI) content generation has emerged as a game changer, enabling creators to produce high-quality content quickly and efficiently.

Corey D. Silverstein ·
opinion

How Payment Orchestration Can Help Your Business

An emerging payment solution is making waves in the merchant world: the payment orchestration platform (POP). It’s quickly gaining traction as a powerful tool for managing online payments — but questions abound.

Cathy Beardsley ·
opinion

Fine-Tuning Refund and Cancellation Policies

For adult websites, managing refunds and cancellations isn’t just about customer service. It’s a crucial factor in maintaining compliance with the regulations of payment processors and payment networks such as Visa and Mastercard.

Jonathan Corona ·
profile

WIA Profile: Laurel Bencomo

Born in Cambridge, England but raised in Spain, Laurel Bencomo initially chose to study business at the University of Barcelona simply because it felt familiar — both of her parents are entrepreneurs. She went on to earn a master’s degree in sales and marketing management at the EADA Business School, while working in events for a group of restaurants in Barcelona.

Women In Adult ·
profile

Gregory Dorcel on Building Upon His Brand's Signature Legacy

“Whether reflected in the storyline or the cast or even the locations, the entertainment we deliver is based on fantasy,” he elaborates. “Our business is not, and never has been, reality. People who are buying our content aren’t expecting reality, or direct contact with stars like you can have with OnlyFans,” he says.

Jeff Dana ·
opinion

How to Turn Card Brand Compliance Into Effective Marketing

In the adult sector, compliance is often treated as a gauntlet of mandatory checkboxes. While it’s true that those boxes need to be ticked and regulations must be followed, sites that view compliance strictly as a chore risk missing out on a bigger opportunity.

Jonathan Corona ·
opinion

A Look at the Latest AI Tools for Online Safety

One of the defining challenges for adult businesses is helping to combat the proliferation of illegal or nonconsensual content, as well as preventing minors from accessing inappropriate or harmful material — all the more so because companies or sites unable or unwilling to do so may expose themselves to significant penalties and put their users at risk.

Gavin Worrall ·
opinion

Know When to Drop Domains You Don't Need

Do you own too many domains? If so, you’re not alone. Like other things we accumulate, every registered domain means something to us. Sometimes a domain represents a dream project we have always wanted to do but have never quite gotten around to.

Juicy Jay ·
opinion

Understanding 'Indemnification' in Business Contracts

Clients frequently tell me that they didn’t understand — or sometimes, even read — certain portions of a contract because those sections appeared to be just “standard legalese.” They are referring, of course, to the specialized language used in legal documents, including contracts.

Corey D. Silverstein ·
Show More