Internet of Things – Smart Technology


As smart home trends progress and more devices connect to the internet in a growing Internet of Things (IoT), it’s now a concern that your thermostat, lights or baby monitor could be hacked. Recently, CloudPets kids’ toys were breached, leaking 2.2 million voice recordings between parents and their children.

Even if you swear off all smart home technology, you probably still have everyday devices in your home that are susceptible to hacking. These can include:

• Digital video recorders (DVRs)
• Printers
• Security cameras
• Smart Televisions
• Tablets
• Smart Phones
• Routers
• Webcams

In October 2016, these types of devices were all used in a massive attack on internet servers. Hackers infected IoT devices with malware instructing them to ping the servers of Reddit, Spotify, The New York Times and other websites until they crashed from overuse. This type of incident is called a distributed denial of service (DDoS) attack.

Once they have control of your device, perpetrators have the freedom to do whatever they want – whether that’s turning on and recording via your security camera, changing passwords to lock you out or even printing something on your printer ‒ as one hacker did in early February 2017 to 150,000 printers.

Luckily, there are plenty of steps you can take to arm your devices and greatly reduce the chances of them being compromised

1. Update login credentials. Some devices like cameras and routers with weaker security come pre-loaded with default usernames and passwords. No matter what these preset credentials are, make sure you change them immediately if you haven’t done so already. When unprotected, smart home devices are some of the easiest devices for internet crawlers to get into – after all, they don’t even need to guess your login information!

2. Have a strong password. Lengthy passwords are the way to go. We even recommend using sentences at least 12 characters long. While it might be tempting, don’t reuse passwords across accounts. That way, if someone figures out your Facebook password, at least they can’t use the same password to log into your smart lock, unlock your door and stroll right in. Have unique passwords for all of your accounts. Write down your passwords and keep the list in a safe place separate from your computer – or consider using a password manager to help you set and store your strong, unique passwords.


3. Shop around for secure gadgets. Some companies put in the extra resources and efforts to secure their gadgets, while others do not prioritize it at all. The key is to research and ask yourself: what security measures does this company have in place for keeping my information safe? Look beyond just a username and password. Additional protection might include https connection, two-factor authentication, third-party penetration testing and AES 128-bit encryption.

Right now, there are thousands of routers and devices using generic logins. Hackers can deploy a simple internet crawler to discover these devices – it’s low-hanging fruit for them. As long as you protect your network and devices with strong, unique passwords, you are much less likely to have problems with suspicious activity.

Stolen ID


A man who assumed the identity of a baby who died in 1972 was arrested on charges of Social Security fraud and aggravated identity theft after the child’s aunt discovered the ruse through Ancestry.com.

Prosecutors said Jon Vincent stole Nathan Laskoski’s identity after escaping from a halfway house in March 1996 and used his new name to start another life. Vincent had been convicted of indecency with a child. The real Nathan Laskoski died at age 2 months in 1972.

Authorities said Vincent first obtained a Social Security card as Laskoski in 1996. He held jobs, received a driver’s license and married and divorced as Laskoski. When Nathan’s aunt did a search on Ancestry.com, a genealogy website, his name came up as a “green” leaf on the website, meaning public records showed he was alive.

The aunt told Nathan’s mother, who did more research and learned that someone had obtained a Social Security card under her son’s name. Nathan’s mother also found public marriage and divorce records, and filed an identity theft complaint with the Social Security Administration.

Traveling with Electronic Devices

Times are changing for people choosing to travel with electronic devices; not so much within the US but certainly international flights.

Electronic devices are not longer just laptops, now they are cellular phones, tablets, readers, and gamers.

When you approach the boarding gate you may be informed that your electronic device MUST be checked that it is no longer permissible to carry the device on board. You will be given a baggage claim check and instructed to collect it along with all other luggage at the baggage carousel.

The question posed, how safe is your data that is on the electronic device, how secure is the collection process - will photo id be required, who has access to the device, do you have data stored that may not be secure. What kind of personal or confidential information have you stored on your cellular phone, computer, or tablet?

Always check with the airlines to find out what their policy is concerning the transport of electronic devices, both domestically and internationally. Ask about security in handling and in retrieving.

Medicare Cards and Social Security Numbers

Many consumers complain that while they remove their Social Security cards from their wallets, the Social Security number is still on their Medicare cards.

The ITRC would like to make the following recommendation. This simple tip could keep an identity thief from getting your Social Security number and protect yourself from becoming a victim of identity theft.

• Photocopy your Medicare card, front and back.
• Put your original card in a safe, locked area. Only carry it with you on the days you know you will need it.
• Using scissors, cut the photocopies of your Medicare card down to wallet size, cutting off the last four (4) numbers of your Social Security Number.
• Staple these two business card size papers together, adding a third blank paper to the packet.

On this blank sheet, write down following:
• Emergency contact with the name and phone number of a person who can be reached in the event of an emergency. Your emergency contact person should have a sheet of paper with the last 4 numbers of your Social Security number and the following:
1. Your pertinent medical history
2. The name of your doctors
3. A list of all the prescriptions you take, including over-the-counter pills.

What happened to "drinking and driving"?


Are you ready to believe this? A drive up bar/social club! I came across this in Slidell, MS.

Diabetes Supply Scam

A database containing personal information of 918,000 seniors seeking discounts on diabetes supplies was revealed to be exposing its contents for months freely online.

The seniors provided their personal financial and health information to a program promising them discounts on diabetes supplies. But, according to a report on Naked Security, a Sophos blog, the database on which the information was stored ended up exposed for months after a software developer in the employ of a telemarketing firm uploaded a backup copy to the internet.

The database was found by a Twitter user, calling himself Flash Gordon, on an Amazon Web Services (AWS) instance at an IP address. He is said to have used Shodan, a search engine for connected devices that "crawls the internet, connecting to likely services, logging what comes back, and creating a searchable index of the results," according to the blog post.

Flash Gordon notified DataBreaches.net – a data security site run by a health care professional – about his discovery. At that point, DataBreaches.net reached out to security researchers for help. They found that the database was not from an entity liable under HIPAA laws, such as a health care provider. Rather, they discerned it was from a telemarketer as the data included scripted comments to use when engaging with patients.

The database included names, addresses, dates of birth, telephone numbers, email addresses, taxpayer IDs, health insurance carrier, policy numbers, and information about what types of health problems the individuals had.

The database has since been taken down.

The Sophos researchers advised that when called by a telemarketer offering great deals on diabetes supplies, be wary of providing personal information as there's no way to know whether the caller is legitimate. Additionally, any information a caller provides might get duplicated for use in other telemarketing campaigns.

How to Recognize Fake Homeless People From Real

"Are they really in need or just scamming me"?

While most people love to give to those in need, there are those people who panhandle as a method of income.

1. Their Gratitude or Attitude

One thing that helps to see if a person is truly in need is their attitude. While many people are leery of giving money, offer to buy them a sandwich or something to drink or even a days work for pay.

If they refuse the food, then they must not be in need.

Many alcoholics and drug dealers find that begging is one of the best ways to get the money they need for their next fix with meth, heroin or their drug of choice. Anyone that is truly down on their luck will gladly take any food that is offered to them, even if they just ate.

2. Their Appearance

If someone is homeless, you don’t expect them to be sitting there in nice clothes. Look for things that might tip you off that they are faking. Things like piercings, nice clothes, and even tennis shoes can be an indication of a fake. However, that doesn’t mean that people haven’t donated to them either. If they are a homeless person, they probably will need a good bath and may have an odor to prove it.

Also, a good indication of someone in real need is what they have with them. Someone in real need is going to have a bag or two, sometimes a sleeping bag with them. Think all their worldly possessions in a couple of bags. They are not going to put their stuff out of eye sight. People that are scamming you will NOT have these items so be on the lookout.

3. Observe the Surroundings

If the person is running a scam, they could be part of a larger group in operation. They may have a cell phone on them, or they may have a car parked close by for a quick getaway. Look for any abandoned cars or a bike close to them. If this is a group operation, the individuals may communicate via cellphone so they know where to relocate or when to make a quick get-away.

4. You See the Same Person Over and Over

People who panhandle on a daily basis are often habitual and play off the sympathy of others. It’s possible that they are doing it as a job not out of need. And yes, there are a lot of the same people that frequent the same areas.



Two reports from HUD, roughly 60% of people panhandling are actually not in need, leaving roughly 4 in 10 people either homeless, penniless or simply in need of work.

Is it good to help others, yes indeed! BUT helping a scammer doesn't help truly needed people.

However, if you REALLY WANT TO HELP, then donate to a local organization that works with the homeless, those in need of food and clothes and organizations that help place families in housing too. You can find a list of them here.

Hospital – Medical Breaches

Teaching hospitals are affiliated with medical schools, which use the facilities to help train future doctors. Teaching hospitals may offer more cutting edge technology and thinking, but also are typically more susceptible to patient data breaches. More people have access to patient data, increasing the risk and likelihood of personal information being left secure resulting in medical identify fraud in which someone else obtains medical care in your name and leaves you with bills and falsified medical records.

Data breaches affect health insurers, doctors' offices, hospital, laboratories, and other types of medical facilities. Reports must be submitted to the Department of Health and Human Services and to the media whenever the personal information of 500 or more people is breached.

Between 2009 and the end of 2016 141 hospitals reported breaches in patient information. The hospitals that reported data breaches were more likely to be major teaching hospitals than smaller teaching hospitals or nonteaching hospitals.

Limit the personal information you provide. Think twice before allowing the hospital to photocopy your driver's license or state ID, and if you permit this, make sure paper copies are shredded after they are scanned into a computer. Requests for SSNs are relics from the days when the number was necessary to bill you for services. Consider refusing and explain that you are concerned about security.

Travel – Boarding Passes

The seemingly innocent act of sharing a pic of your pass on social media could have serious repercussions.

According to KrebsonSecurity, websites exist that can read the barcode on your boarding pass and then hack your personal information, like your phone number, frequent flyer number, and info about all future flights you book through the same number.

That means they can then change your seat on your flight, cancel future flights, and even reset your account PIN entirely.

Click Control

Think before you click.

Bad guys often use shock headlines or pictures to catch your attention. These links could lead you to malicious website links, viruses or Trojans.

Credit Card Fraud – Account Takeover

According to research firm ‘Javelin’, identity fraud was up 16 percent to a record high 15.4 million new victims in 2016. Though so-called ‘chip cards’ were introduced as a safe way to use credit, they can still be used at less-secure ‘swipe’ card machines. Adding to the problem, a device called a ‘shimmer’ can steal card-user information just like the skimmers often found in the past designed to target swipe cards.

Crooks are simply finding other ways to steal personal information. The most common is account takeover, up 61 percent in 2016.

By simply changing someone’s address through the Post Office, your identity can be stolen and all your personal accounts compromised. With the stolen information, the fraudster can then signed up for new credit cards.

You may get a change of address letter of confirmation from the Post Office but by then, the damage is done

ATM Shimmers – Skimmers

An ATM skimming device that can be inserted into the mouth of the cash machine’s card acceptance slot and used to read data directly off of chip-enabled credit or debit cards.

The “shimmer,” so named because it acts a shim that sits between the chip on the card and the chip reader in the ATM — recording the data on the chip as it is read by the ATM.

Cards equipped with a computer chip are more secure than cards which rely solely on magnetic stripes to store account data. Although the data that is typically stored on a card’s magnetic stripe is replicated inside the chip on chip-enabled cards, the chip contains an additional security components not found on a magnetic stripe.

One of those is a component known as an integrated circuit card verification value or “iCVV” for short. The iCVV differs from the card verification value (CVV) stored on the physical magnetic stripe, and protects against the copying of magnetic-stripe data from the chip and using that data to create counterfeit magnetic stripe cards.

Banks can run a simple check to see if any card inserted into an ATM is a counterfeit magnetic stripe card that is encoded with data stolen from a chip card. But there may be some instances in which banks are doing this checking incorrectly or not at all during some periods, and experts say the thieves have figured out which ATMs will accept magnetic stripe cards that are cloned from chip cards.

The bad guys have also learned which retailers are using the old card readers that do not yet accept the chip credit cards.

Investment – Financial Services

What security measures are available through the investment house you use?

Scottrade Bank, a subsidiary of Scottrade Financial Services, Inc., recently secured a MSSQL database containing sensitive information on at least 20,000 customers that was inadvertently left exposed to the public.

The exposed database had no encryption and included 48,000 lessee credit profile rows and 11,000 guarantor rows, Vickery explained. Each row contained information such as Social Security Numbers, names, addresses, phone numbers, and other information that one would expect a bank to possess.

Medicare Benefits Scam

People submitting medicare claims for services not provided.

Always check any benefits statement you get to assure you actually received the benefits reported.

This is a typical scam used to report benefits or services provided to children or the elderly.

Mortgage Foreclosure Scam

Scammers are targeting people having trouble paying their mortgages. These so-called foreclosure rescue companies promise to stop foreclosure. But they're out to make a quick buck, and can turn a homeowners distress into disaster.
Well, I had been going through a dry spell – I had not traveled for three whole months, so Thursday evening I called my friend Debra Slone and asked how she felt about going on a road trip, starting the next morning. She thought about it for about 30 seconds and said sure. She had previously mentioned she would be interested in a road trip so, I now suggested we go to San Antonio.

Friday morning we hit the road and all was well. We spent the night in Slidell, LA and I had intended for our first stop to be New Orleans, however, in my usual ability to plan trips – that is a joke - I was without maps and had no idea how to find the French Quarter. Consequently, we – meaning me – managed to simply drive through New Orleans, missing the French Quarter all together. Who would have thought they would not have a sign on the interstate pointing out the direction to the French Quarter! Before I knew it, we were driving through Baton Rouge.Thought you might enjoy seeing the current capitol building and the old capitol building.


Between a morning rain shower and a marathon that was being run, streets and businesses were closed. We generally we were not impressed so decided we would just head west – toward Galveston, TX. Again, being the ingenious person that I am, and traveling without maps, I decided to take a road other than the interstate.

Driving along the Gulf of Mexico coastline we saw some interesting architecture. Debbie is now convinced I had lost my mind – if I ever had one – because I was taking pix left and right. It is a good thing there were very few other vehicles on the road we were on.

If you have never seen a library on stilts – don’t feel bad, neither had I. I also have no explanation as to how they handle handicap access. This caught my attention – warped as it is. The clearance for “book drops” is 9’6”.The was a gorgeous sculpture at the front of the library building.


The churches were also on stilts – as well as the police department and all the other government buildings.I do not know how they accommodate handicapped persons.Did you ever see a Catholic church with gargoyles?


Of course, I guess you have to appreciate the rationale of putting a double wide mobile home on stilts.How about a single-wide on stilts? These appeared to be raised at least 20’.Even the electrical service is on stilts.Whole subdivisions were built as what appeared to be year round homes and summer homes.


I could not guess why this farmer had all these porta- potties lined up across his yard.

That actually was sort of fun until we ran out or road. The road ended at a line of cars, boarding a ferry so we got in line with everyone else. The fellow directing the loading was really very nice, but didn’t quite know what to say when I asked where we were going.

When we got off the ferry we were greeted by a rather large billboard that “welcomed” us to Texas.

So far, two things were very clear to us and both things contradicted what should have been. Every town or city we had driven through was very hazy and it was extremely windy. It boggles the mind how it can be windy and still hazy. The beaches along the Gulf were certainly not inviting. The beaches were trashed and the water was rough and swelling. The Gulf Coast really should be named the “land of bridges” because we must have crossed over a 100 bridges, causeways and overpasses as we traveled through southern Louisiana and Texas.

One of many bridges and note how thick the haze is.You want to see pipeline, you should see all the pipe running above ground across Louisiana and Texas.


Again, as luck would have it, we ran out of road and ended in line to board another ferry. On the first ferry there were only about nine vehicles, but, on the second ferry there were probably, at least, 100 vehicles – and it was free and landed us in Galveston.
The background is as clear as it is going to get – that is haze you are seeing and the pipeline runs down the middle of the beach for literally miles.

The thing I love about Galveston is the architecture. If you want to see beautiful homes from the 1800s go there! But, the haze is overwhelming and the wind will beat you senseless.
This is a lift seat for a handicap person so they can get into the pool. This was installed at our hotel and the first I had seen such a device.
I had to sneak this pix of a police officer from the University of Texas campus. The interesting thing is, all the way around her back and front waist, she has weapons of some type. There is no spot that was not used. Both her leg pockets were also full. Do you wonder what is happening on the UT campus?

There are tree sculptures scattered all over Galveston. We saw a few, but I kept getting distracted looking at the houses.

This is a Sacred Heart hospital.

Typical victorian architectural. This “social, or garden, club” was built in 1876 by a group of German businessmen. Only Germans or German speakers could hold stock in the club.

After Galveston we finally made it to San Antonio, where we did the Hop-On Hop-Off tour to gather an overview of the history of the area. Right off the bat the tour guide said something that confused me and I could not immediately reason out the facts. The guide said that the “Alamo” was not and never was a fort but was always a church. Well, the statement forced me to do a little research.

The Alamo and was founded in the 18th century as a Roman Catholic mission and fortress compound for the purpose of educating area American Indians after their conversion to Christianity.

The mission was secularized in 1793 and then abandoned.

Ten years later, it became a fortress housing the Second Flying Company of San Carlos de Parras military unit, who likely gave the mission the name Alamo. During the Texas Revolution, Mexican General Martin Perfecto de Cos surrendered the fort to the Texian Army in December 1835, following the Siege of Béxar. A relatively small number of Texian soldiers then occupied the compound for several months. They were wiped out at the Battle of the Alamo on March 6, 1836. When the Mexican army retreated from Texas several months later, they tore down many of the Alamo walls and burned some of the buildings.

So, by my research, I would say while it was not called “Fort Alamo”, it served as a fort and suffered through battles, therefore, it was a fort.

Welcome to the Buckhorn Restaurant and Museum where you can find over 500 different stuffed animals on display.

Apparently, the use of cell phones in the schools is not a problem.

The is a mural on the side of the Goodwill store across from the Market Square.

This is where the locals, and tourist, hang out - at “The Friendly Place”.
You can always take a carriage ride, but the gagas just don’t seem the perfect fit in “old town” San Antonio.

Of course we visited Riverwalk at ate at “Dick’s Last Resort”. I had eaten there before; the food was good, but not as good the second time around. You probably have to be a party animal and half soused to appreciate the atmosphere.

The Market Square hasn’t changed since I was there – it still has many beautiful items, but as with everywhere else, it is not all made locally or in Mexico.



Like Galveston you have to enjoy the architecture of San Antonio.

After San Antonio we headed back to New Orleans, determined not to miss a visit to the French Quarter.

We got a late start and had to wait out a thunderstorm, but finally made it to the French Quarter. After driving around for a while, or I should say sitting around in traffic, just absorbing the atmosphere, we finally made our way to the Welcome Center and joined the Hop-On Hop-Off tour so we could learn a little history.

New Orleans was founded in 1718 by Jean-Baptiste Le Moyne de Bienville. The city developed around a central square. That square, the oldest part of the city, became known as the French Quarter. The architecture is a mish mash of styles from the creole cottages, shotgun houses, and American town houses which have multi-levels built with brick or stucco and have a balcony. The Creole town houses are also built with brick or stucco, but have cast iron balconies and courtyards. The shotgun houses are only 12’ wide and one story. There are the double gallery (looks like a balcony, but is not called a balcony) – homes built with columns that supported the galleries and they have side gable roofs. The California bungalow was spread out rather than tall and has a concrete porch with a roof overhang. The construction styles were originally heavily influenced by the Spanish, Greek and French. By the 19th century the influence was American and French.

The Spanish influence was never strictly Spanish. It was Creole, which is a mixture of the French and Spanish with a dab of Carribbean for good measure.

Many buildings and homes have the cast iron and wrought iron railings and banisters.

Here are two samples of how they have painted scenes on their buildings.


Maintaining the architectural style, the facades are left intact and everything else is removed. The new construction is then attached to the old façade.

Want to know what is happening everyday at the Little Gem Saloon, just read the board posted outside the Saloon.

This is not a heavy traffic day – yeah right! Before the hurricane damage, we were told, 1.5M people lived in New Orleans; now only about 350,000. So, they say today, it is not crowded.

It is a festive past time to see who can land strings of necklaces in trees or on balconies.

Architectural styles


Bridge over the Mississippi River.

Here is an interesting fact for you. New Orleans has the oldest continuously operating street railway system in the world.

The warehouse district is not really warehouses any more. It is now the arts district and includes a new convention center that runs one mile in length.

The garden district is not a garden – it was named that because the homes each contained a garden.

We went by where the television program NCIS New Orleans is shot, as well as many other television programs and movies. There was a glimpse of where all the Mardi Gras floats are made and stored. I did see the new WWII museum and wish we had time to visit. The tour bus drove by the French Market and Flea Market but we opted to call it a day. We had seen all we wanted to see by that time.

Driving back through Mississippi the water was smooth as glass, the sun was shining, traffic was light, the homes along the Gulf Coast through Long Beach, Gulfport and Biloxi were breathtaking. There are still numerous vacant lots as a result of the hurricane damage, but the area is still a sight to behold.

Well, Debbie and I covered 2,350 miles during our eight day road trip to San Antonio. Now, it is good to be home.

That’s all for now - until next time.

ONLINE SHOPPING TIPS


• CONDUCT RESEARCH: When using a new website for purchases, read reviews and see if other consumers have
had a positive or negative experience with the website.

• WHEN IN DOUBT, THROW IT OUT: Links in emails, posts and texts are often the ways cybercriminals try to steal your information or infect your devices.

• PERSONAL INFORMATION IS LIKE MONEY: VALUE IT AND PROTECT IT: When making a purchase online, be
alert to the kinds of information being collected to complete the transaction. Make sure you think it is necessary for the vendor to request that information. Remember, you only need to fill out required fields at checkout.

• USE SAFE PAYMENT METHODS: Credit cards are generally the safest option because they allow buyers to seek
a credit from the issuer if the product isn’t delivered or isn’t what’s ordered.

• DON’T BE DISAPPOINTED: Read return and other policies so you know what to expect if the purchase doesn’t
go as planned

• PROTECT YOUR $$: When shopping, check to be sure the site is security enabled. Look for web addressed with https:// indicating extra measures to help secure you information. Being a safe and secure shopper starts with STOP. THINK. CONNECT.: take security precautions, think about the consequences of your actions online and enjoy the conveniences of technology with peace of mind while you shop online. Remember these tips during all online purchases.

SHOPPING ON THE GO
• NOW YOU SEE ME, NOW YOU DON’T: Some stores and other locations look for devices with Wi-Fi or
Bluetooth turned on to track your movements while you are within range. Disable Wi-Fi and Bluetooth when not in use.

• GET SAVVY ABOUT WI-FI HOTSPOTS: Limit the type of business you conduct over open public Wi-FI
connections, including logging on to key accounts, such as email and banking.

BASIC SAFETY AND SECURITY TIPS
• KEEP A CLEAN MACHINE: All web-connected devices – including PCs, smartphones and tablets – free from
malware and infections by running only the most current versions of software and apps.

• LOCK DOWN YOUR LOGIN: Fortify your online accounts by enabling the strongest authentication tools
available, such as biometrics, security keys or a unique one-time code through an app on your mobile device. Your usernames and passwords are not enough to protect key accounts like email, banking and social media.

• MAKE BETTER PASSWORDS: If your passwords are weak, improve them by adding capital letters, numbers and
symbols using different passwords for every account.

Medicare Card Changes Means Opportunities for Scams

Congress passed a law in 2015 that requires the Centers for Medicare and Medicaid
Services to remove Social Security numbers from all Medicare cards, which they will start
doing in April 2018. New beneficiaries will get the modernized cards first, and then new
cards will be issued to existing beneficiaries. This is an important change to help prevent
fraud and protect people’s identity, but with any new change, scammers are taking
advantage of potential confusion.

What You Should Know:

Medicare beneficiaries are getting calls claiming to be from Medicare asking for
payment to receive their new Medicare card, or asking them to verify their
Medicare number.

Medicare will NEVER call to verify your number because they already have it.
There is no cost to get your new card.

What You Should Do:

If you get a call like this, hang up immediately and report it to Senior Medicare
Patrol. Find the number to call for your state at www.smpresource.org.

Imposter – Spear Phishing


This is targeted phishing, where the attacker digs up your personal information, such as your family history, where you live, your mother’s maiden name, your social security number, or possibly, your mortgage or banking information.

The perpetrator will call, pretend to be your mortgage company, notifying you by email that your mortgage has been sold to another company and instructing you to now send payments to a new company name and address. A link will be provided in the email that will take you to a fake website.

Wiring Money


Unless it is your idea, and you initiated a call, never wire money.

Always verify the institution’s credentials and the recipient's identity.

Research all the who, what, why, when and where on the web before committing.

Bait and Switch Advertising


Businesses sometimes advertise a product or service at an irresistible price that is impossible to get. The business then uses a hard sell technique to up-sale or substitute the product. You end up purchasing something you did not want or need or never intended to purchase.

Dell Computers paid $4M in 2009 to settle a charge by NY state that it was deceiving customers by advertising low prices that weren’t available to most people.

COSTCO settled a lawsuit as well for advertising handbags at a very low price to lure customers when few if any were available to purchase.

Bogus Memberships

Be wary of online memberships or the tradition of purchasing something that results in ongoing purchases.

Emails may allude to a subscription or purchase you did not make, with links to cancel or contact the company. Once you click on the link, you expose sensitive information to scammers.

You may get an unsolicited offer to renew a favorite magazine or service for a rock-bottom price. It looks legitimate. You enter your personal and credit card information into a bogus website.

Gift Cards


The value you purchased may not be the value provided on the card because of shaved undisclosed terms, conditions and fees.

Scammers go to gift card displays and scan a card’s number. The unique digital number stores and keeps track of the balance on the card. After you purchase the card, the thief can call the issuer and check the balance to see if it is below the original value. If so, the crook knows the card has been activated and knows how much money is left to be stolen.

Returns


Ask about return policies and fees.

Some merchants will charge a large fee for the privilege which you may not catch. Check your credit card or debit card account to assure you received the proper amount or were not charged a return fee.

Credit Card Company – Bank Card Con


You receive a call from your bank or credit card company. The called indicates there is a problem with your account and asks you to verify your personal information and account number.

Hang up!

Travel


Do not wire money to a company without completing your research.

If you receive unsolicited email offering deals too good to believe, they probably are.

Check the cancellation policies before sending deposits.

If you lose your cell phone and a good Samaritan call, promising to mail your phone to you, it is probably a delay tactic.

While staying at a hotel, if you get a call asking to verify your form of payment, do not give them the information – go to the front desk.

Make sure the hotel or B&B even exist. The rate may be too good to believe because it does not exist.

If someone offers to take your pix, using your camera, it may be a ploy to steal your camera.

Do not use outside ATM’s – go inside the bank or place of business. Look over your shoulder, protect your input.

IRS – Debt Collectors

The IRS has contracted with four companies to go after people with lingering federal tax debt. The law was passed in late 2015 to capture some of the $400B in tax debt that eludes the IRS.

Private contractors will be assigned accounts. Those targeted will get a letter in the mail before anyone calls to alert them that their account has been transferred to a private agency.

The collectors will be allowed to identify themselves as IRS contractors. They won’t take money directly but they will lay out options for people to pay the US Treasury by check or electronically.

Buying a New or Used Car

You’re looking to buy a used car and want some peace of mind, so you choose a dealer that advertises rigorous, bumper-to-bumper safety inspections. You can drive off the lot with confidence, right? Not so fast.

Today the FTC announced that General Motors Company, Jim Koons Management Company, and Lithia Motors have agreed to settle charges they deceptively marketed their used cars when they made claims about their comprehensive inspections.

The issue? According to the FTC, many of the cars they advertised as having undergone thorough inspections still had open recalls for safety-related defects, including recalls for defective ignition switches — a fact they didn’t make clear to prospective buyers.

Dealers aren’t required to — and sometimes can’t — fix manufacturer recalls on the used cars they sell. But if they say they’ve done an extensive inspection on a car, the FTC says they also need to say whether there are still unrepaired recalls. That way, buyers know to get them fixed, or can decide to buy another car instead.

Under the settlement, the companies must stop making deceptive claims about their recall repair practices, and must notify recent customers who may have bought a used car subject to a recall. When you shop for a used car, keep in mind that federal law doesn’t require dealers to fix recalls.

So make sure you:
• Ask questions. Ask the dealer if the car you’re considering has a recall, and whether the dealer will fix it before you take the car home.
• Check for yourself. Take down the VIN number of a car, and enter it at the National Highway Traffic Safety Administration’s recall look-up website safercar.gov. You also can get information to help you follow up with a manufacturer or dealer about a recall.
• Check out the vehicle history report. The report will tell you about a car’s title, odometer, theft, or salvage history, and might also provide recall information. Ask your dealer — they’ll often provide them for free. For links to companies that sell the reports, go to vehiclehistory.gov.