Tuesday, June 30, 2009
June News & Views Published Below
Need A Speaker For Your Next Conference?
Bringing your conference program to life. Call for information, references, smiles and education. Check out the video at: http://www.youtube.com/watch?v=InWRkiag4yg
Rory Rowland
14401 Covington Rd.
Independence, MO 64055
816-478-3249
roryrowland@yahoo.com
(No, that's Mr. Bean, above. Rory is below. Click on photos to enlarge.)
Monday, June 29, 2009
Several CUs report more scams
The scams have involved:
> Brewer (Maine) FCU, which is warning its members about attempts to fleece their accounts. Scam artists are sending checks to credit union members for items bought on Craigslist and other Internet sites that are "in excess of the purchase price with a request to return the excess," said a Brewer FCU press release. Or, scammers send checks to members and ask that the checks be cashed for the scammers. "Inevitably these checks are returned either for insufficient funds or because they are fraudulent altogether," the $39.1 million-asset credit union said (Bangor Daily News June 23).
> The $6.2 million-asset, Sugar Land (Texas) Employees FCU, whose members have been targeted by text messages sent by scammers posing as the credit union. The messages claim that members' debit cards had to be deactivated for security reasons, and that members should call an 800 number and give out personal information to reactivate their cards, according to the Texas attorney general's office (The Fort Worth Star-Telegram June 21).
> New Dimensions FCU, Waterville, Maine, which is advising members to ignore pre-recorded phone calls that tells members--for instance--that their Visa card has been restricted for supermarket use only, and that they must call a specific phone number to contact Visa security and a press "1" to speak to someone. The $5.8 million-asset credit union and local police are advising members that the calls are a scam and to ignore them.
Sunday, June 28, 2009
2009 CU Security Conference Photos
Here are a few photos taken at the conference.
Friday, June 26, 2009
Cell phone in the toilet bowl? Here’s how to fix it
Your cell phone, pager or iPod has fallen into the toilet bowl, swimming pool or kitchen sink full of water. You fish it out. After you've washed your hands -- depending on the circumstance -- what can you do?
Here's five techniques for restoring the gadget to life. Here's a short description (don't try this without reading his entire post):
1. Remove the battery -- immediately. Then take off the battery cover and other compartments, he says.
2. Submerge the device in a container filled with the alcohol for five minutes.
3. Let the device dry for an hour or so. "The alcohol will evaporate very quickly but be sure it's really dry," "FiscalGeek" says.
4. If that doesn't work after several tries, move on to the other options:
5. Store the phone overnight in a sealed bag of dry rice. The rice acts as a desiccant. (We'll save you the trouble of looking that up. It means "a drying agent.")
Use a Dri-Z-Air dehumidifier.
Finally, maybe a hair blower will work.
It's worth a try to salvage the phone or other gadget. Otherwise, you're left with his final suggestion:
Smash it with a hammer and buy a new device. This one works every time.
Tuesday, June 23, 2009
Top 10 Worst People in Anyone's Life
Of all the people you count on weekly to help you get through life, here are the top ten worst choices by area of relationship and/or service:
10. Your hotel innkeeper is Norman Bates.
9. Your limo driver is Evel Knievel.
8. Your primary care physician is Dr. Edward Scissorhands.
7. Your international travel agent is Mr. Phineas T. Fogg.
6. Your personal tailor is Bozo the Clown.
5. Your personal trainer is Ozzy Osbourne.
4. Your barber is Sweeney Todd.
3. Your spiritual advisor is Charles Manson.
2. Your investment manager is Charles Ponzi.
1. And finally .... or fatally .... and on a much more personal note, your "significant other" is either Ann Coulter, Nancy Pelosi, Nancy Grace, Rush Limbaugh, Larry King, Al Franken, Lizzie Borden, Bill O'Reilly, Hillary Clinton, Jerry Springer, Barney Frank, Madonna, or Rosie O'Donnell.
Friday, June 19, 2009
How good is Microsoft's free antivirus software?
The public beta will be limited to 75,000 downloads, Microsoft says, and the targets are global. The initial beta release is limited to the United States, Israel (where a core development team is based), and Brazil. Next month, the beta will open up for users in China. It’s no coincidence that Microsoft is rolling out early in Brazil and China, which are large-scale vectors of malware infections because of the sheer number of Windows users running without antivirus protection. According to Microsoft, barriers to adoption of paid security software are especially high in developing markets, where internet access is slower and credit cards are unavailable to a large percentage of the population.
The MSE download is impressively lightweight. The x64 copy I installed on Windows 7 was 3.8 MB in size; x86 copies are 4.8 MB for Vista/Windows 7 and 7.7 MB for Windows XP. Installation (including the most recent definition updates) took less than four minutes and, as promised, the initial setup didn’t require any personal information or registration. After I accepted the license agreement, the software informed me that it needed to update its virus definitions and then proceeded to get the most recent updates on its own.
You can bet that the beta release will be seriously tested by independent labs and especially by Microsoft’s for-profit competitors in the coming weeks. If it has any weaknesses, expect to see them heavily publicized. Meanwhile, I’m sufficiently impressed by MSE in operation to give it a more in-depth workout on multiple systems here.
ATM fraud ring arrests made, stole from Florida CUs
Ophel Day, Tony Fudge and Jacob Dunn were arrested for depositing bad checks into ATMs and then making withdrawals or purchases before the checks bounced, according to federal investigators (WJXT Jacksonville June 17).
The fraud has cost local credit unions from $300,000 to $500,000, police said. Affected credit unions include Jacksonville-based Vystar CU and Mulberry, Fla.-based Community First CU.
More arrests will be made, Paul Elliot of the Secret Service said
The scam begins when account holders sell their ATM cards and personal identification numbers for up to $500 to a "recruiter" in the ring, authorities said. The recruiter then passes the information on to the scam's ringleader. Individuals giving up their card then report the card as stolen.
Recruiters deposit checks that are counterfeit, stolen or from closed accounts into ATMs. The active accounts allow a percentage of the money deposited to be immediately withdrawn, with subsequent withdrawals and purchases from businesses conducted before the check is returned, authorities said.
Account holders often report that their cards are stolen or lost after the thefts occur. Many are reimbursed for losses they claim--which results in a double whammy to the financial institutions involved, authorities added.
Newest report shows fraud trends
These include:
> Muling--the evolution of recruitment scams directed towards unsuspecting individuals to aid in the monetization of stolen goods;
> Evolving supply chains, including fraud-as-a-service, which helps online criminals commit fraud;
> Significant increase in attacks against the enterprise;
Evolution in crimeware and attack vectors including: a rise in use of the latest crimeware delivery method; fast-flux botnets (a network of compromised computers); improvements in both Trojan functionality and infrastructure; and consolidation of "traditional" phishing and malware attacks.
The number of phishing attacks in April dropped 7% from March attacks, the report said.
In the next 12 to 18 months, RSA said it expects to see an increase in enterprise fraud in which online criminals can gain access to sensitive corporate data such as intellectual property and business plans.
To stay ahead of the fraudsters, RSA recommends that companies deploy a layered approach to security, which has three core elements:
> Understand the threat landscape--Organizations must understand the threats that are targeting their business and the relative risks they pose. By doing so, organizations can mitigate the risks of online fraud or even prevent it from occurring at all.
> Use multi-factor authentication to protect the login--Username and password authentication is not enough to protect access to sensitive data today. Multi-factor authentication--including two-factor and risk-based authentication--are critical to preventing unauthorized access to a user's sensitive and personal data.
Monitor transactions and activities that occur post-login--Going beyond authentication solutions that can challenge users to assure their identity login, organizations should consider implementing a transaction-monitoring solution that analyzes and challenges high-risk transactions after login has occurred. Transaction monitoring can help identify suspicious post-login activities and mark them for further review.
Friday, June 12, 2009
Reach a human when you call customer service
This is an amazing concept: A Web site called gethuman.com ("get human")gives instructions for avoiding the interminable voice menus used by companies and government agencies -- and reaching a real customer-service person. We're bookmarking this baby. If the company you need to contact isn't listed, a tips page tells you how to find the phone number and gives some suggestions for reaching a person, like punching the zero on your phone repeatedly, mumbling when the machine tells you to speak, or asking for "account collections," which generally is quick to answer the phone.
"When you do finally find a human, ask them how to connect directly the next time (in case your call gets disconnected, etc.), and be sure to tell us so we can then list their number here," the site says.
The site, founded by consumer advocate Paul English, provides a message board and also rates companies' customer-service phone system performance against the gethuman standards. We don't need to tell you that the F's vastly outnumber the A's.
There's also a translation guide for what the voice menu really means. "Your call is important to us" means this, according to gethuman.com: "You are not important enough for us to have a human answer your call, but we think you are stupid enough to feel good when we say you are important."
Funny Money: Why Banks Want to be Our Friend
(Click on photo to enlarge)
You can see their website here, complete with braying donkey, outhouse for "personal bidness" and lots and lots of Flash animation tutorials and info. (Note: they're not a "bank", per se, they're an extension of Bank of the Wichitas).
Click here to visit: http://www.redneckbank.com/
Feds Hunting for $120 Million of CU Funds Missing From U.S. Mortgage
Customer Service Hall of Shame
MSN Money released its third annual Customer Service Hall of Shame survey results. The results revealed that financial intuitions and telecommunication services keep slipping in the minds of consumers when it comes to customer service and nine out of the 10 companies that made it to this year’s shame list are repeat offenders!
Once again, the coveted number one worst customer service spot was reserved for AOL. The rest of the shame awards go to:
#2 Comcast
#3 Sprint
#4 Capital One
#5 Time Warner Cable
#6 HSBC
#7 Qwest
#8 Abercrombie and Fitch
#9 Bank of America
#10 Citigroup
On the bright side, some companies are satisfying consumers, especially low-cost entertainment and bulk food companies that provide great value in this economic climate. The number one Hall of Fame spot is awarded to USAA and the second to Trader Joe’s.
To check out the entire Hall of Shame list, visit:
http://articles.moneycentral.msn.com/SmartSpending/ConsumerActionGuide/HowCompaniesWereRanked.aspx
Thursday, June 11, 2009
95% of Blogs Abandoned
Richard Jalichandra, chief executive of Technorati, said that at any given time there are 7 million to 10 million active blogs on the Internet, but it's probably between 50,000 and 100,000 blogs that are generating most of the page views.
"There's a joke within the blogging community that most blogs have an audience of one." Many people who think blogging is a fast path to financial independence also find themselves discouraged.
Tuesday, June 9, 2009
Employed women to outnumber men
Security video records ghostly vibes in CU
The moving blur is white and floats around the room to a chair, sits down and disappears. Sometimes there are two blurs. The local NBC affiliate, KFOR, has the sightings on a video. Use the resource link below to view it.
The sightings began last month after security guard Rob Colbert spotted movement out of the corner of his eye while working late. He checked the security tape. It had captured the movement.
The blurs always occur in the same office. The most recent visit was last Thursday morning.
The center's IT director, Mark Cunningham, checked the cameras and found nothing wrong. The credit union closed the blinds to avoid any reflections from outside. But the apparition showed up again--this time more clearly.
IT cleaned the camera lens and resealed the camera cover, but the image reappeared. It doesn't cause any trouble and the credit union has nicknamed it "Clair, for clairvoyant."
The new center was built on a former service station lot but no one know of any ghosts lurking about.
"If it is a ghost, maybe it's Casper the friendly ghost," Frances Parham, CEO of the $1.6 million asset credit union, told the television reporters.
Click here to view the ghost video:
http://www.kfor.com/news/local/kfor-news-south-carolina-ghost-story,0,4375330.story
ID thefts with victims' names on cards rise
Javelin attributed the increase to a credit card loan application process that requires less verified information and is easier than other types of loan applications. Also, credit cards provide the most financial gain for thieves, who often don't get caught (CardLine June 8).
The results, published by the Pleasanton, Calif.-based firm last week, are based on a survey conducted by the firm of 4,784 U.S. consumers last year.
Of those responding, 487 said they had been victims of identity theft. Of the identity theft victims, 146 indicated that a variety of fraudulent new accounts had been opened using their name.
Among the new-account fraud victims, one-third said criminals had opened new credit card accounts in their name, up from 26% from the previous year's survey.
Other findings:
> Twenty-six percent of the victims said fraudsters opened new store-branded credit cards in their names, down from 29% in 2007.
> Fifteen percent reported other types of fraudulent loans were in their names, down from 21%.