CONSUMER ALERT: ‘CAN YOU HEAR ME’ SCAMS…one little word…YES

Phone Scams Costing Victims, All Over One Word

Consumer Complaints: Online: https://consumercomplaints.fcc.gov Phone: (888) 225-5322 TTY: (888) 835-5322 Videophone: 1-844-432-2275 Media Contact: Will Wiquist, (202) 418-0509 will.wiquist@fcc.gov

CONSUMER ALERT: ‘CAN YOU HEAR ME’ SCAMS

Phone Fraudsters Recording Consumers’ Voice Responses WASHINGTON, March 27, 2017 – The Federal Communications Commission is alerting consumers to be on the lookout for scam callers seeking to get victims to say the word “yes” during a call and later use a recording of the response to authorize unwanted charges on the victim’s utility or credit card account. According to complaints the FCC has received and public news reports, the fraudulent callers impersonate representatives from organizations that provide a service and may be familiar to the person receiving the call, such as a mortgage lender or utility, to establish a legitimate reason for trying to reach the consumer. The scam begins when a consumer answers a call and the person at the end of the line asks, “Can you hear me?” The caller then records the consumer’s “Yes” response and thus obtains a voice signature. This signature can later be used by the scammers to pretend to be the consumer and authorize fraudulent charges via telephone. If you receive this type of call, immediately hang up. If you have already responded to this type of call, review all of your statements such as those from your bank, credit card lender, or telephone company for unauthorized charges. If you notice unauthorized charges on these and other types of statements, you have likely been a victim of “cramming”. Anyone who believes they have been targeted by this scam should immediately report the incident to the Better Business Bureau’s Scam Tracker and to the FCC Consumer Help Center. Consumers should always be on alert for telephone scams. The following tips can help ward off unwanted calls and scams: · Don’t answer calls from unknown numbers. Let them go to voicemail.

  • If you answer and the caller (often a recording) asks you to hit a button to stop receiving calls, just hang up. Scammers often use these tricks to identify, and then target, live respondents.
  • If you receive a scam call, write down the number and file a complaint with the FCC so we can help identify and take appropriate action to help consumers targeted by illegal callers.
  • Ask your phone service provider if it offers a robocall blocking service. If not, encourage your provider to offer one. You can also visit the FCC’s website for information and resources on available robocall blocking tools to help reduce unwanted calls.
  • Consider registering all of your telephone numbers in the National Do Not Call Registry. As the Agency that implements and enforces the Telephone Consumer Protection Act, the FCC reviews all consumer complaints. The Agency will continue, when appropriate, to issue consumer alerts based on those complaints and other public information related to possible scams and frauds in hopes of informing and empowering consumers. ### Office of Media Relations: (202) 418-0500 TTY: (888) 835-5322 Twitter: @FCC www.fcc.gov/office-media-relations

Protect yourself…

http://www.lendingcapital.net

Advertisements

Before you apply for a loan-READ THIS

Tired of being turned down? We are tired of turning you down – we want to approve everybody – however below is why (generally) businesses never get loans approved. 

Check your credit, make any repairs or statements of explanation for any negative items the items below are what you will need, be prepared, don’t try and cheat with false information or omissions, lenders do not like surprises. The more information you provide increases the likelihood of approval.

  • Apply for credit repair if not so hot (we offer these services)
    DO NOT apply to several banks at once, or reapply if turned down until after you have corrected why they turned you down.
  • Get your FICO/SBSS score (small business scoring service). You can get this at Nav.com free
  • SBA requires a minimum score of 140, most lenders will NOT provide a loan if SBSS score is under 160. The range is 0-300
  • Personal FICO score-0-840 most lenders want 650 or above-CreditKarma.com-free

 

  • Get a D-U-N-N-S number (Dun and Bradstreet-100 as the highest a score of 80 is good-free

 

Let us do the work-we have thousands of lenders to choose from-we can submit to many lenders without re-pulling your credit & know where to go-even if you were turned down, we have the paperwork to resubmit without pulling credit again.

  • Let us do the work-we have thousands of lenders to choose from-we can submit to many lenders without re-pulling your credit & know where to go
  • Most lenders want to see profit, what they really look at is good cash flow
  • Debt service, can you cover your debt with current cash flow with adequate reserves
  • Annual sales volume, where does your revenue come from, the more customers the less risk to the lender-explain how are you different than your competition
  • Most lenders will lend around 20% of your annual sales volume, less for credit lines
  • One of the important things is a financial statement
  • Initial Borrower Documents Need for all individual who own 20% or more of Ownership
  • Current Personal Financial Statement (All Borrowers)
  • Personal Tax Returns (Last 3 Years)
  • Current Credit Report w/scores (annualcreditreport.com) CreditKarma, etc.
  • Initial Business Documents Brief Overview of Ownership / Entities and Loan Requested
  • Business Tax Returns (Last 3 Years)
  • Current Balance Sheet YTD
  • Profit and Loss Statement
  • For commercial mortgages:
  • Old Appraisal (if available/applicable)
  • Current Rent Rolls (if applicable)

Get busy… http://www.lendingcapital.net

I met with a few business clients recently…

It was a 2-hour lunch that started my journey to find a better solution for my friends.

What was the beef? They all had small business loans and were very tired of paying daily and a few weekly ACH payments at high rates and short terms. Most of them were 3 months to 21 month paybacks. Ouch!

I couldn’t help them as I offered similar funding for their credit requirements. So, like most of the services we offer I started my journey to find the best terms, best rates, and monthly payments.

The other problem was two were startups, good luck with that. So, that started the second part of my journey-finding reasonable money and terms for startups, of which most have limited or no business credit to offer.

Generally, businesses need to be in business for at least 6 months to qualify for any type of finance, even our SBA packages eliminate most business funding under 2 years. Banks require 2 years at least with positive credit and profitable business. Let alone the paperwork, fees, waiting…waiting…waiting

And like most small business (any business) make the same mistake. They apply at one bank, get turned down, then apply to another, and another. Well, they see you shopping, and every time someone pulls your credit it gives you a “ding” of which I wrote in a previous blog about entering the “ding” zone. So, don’t be a “dinger”, do your homework, check your credit, fix your credit, explain anything not so nice, BEFORE you apply for any loan.

The other problem is what do have to offer? What can you really afford? And how long will it take me to pay it back?

First step: We created on our web, calculators and a financial statement. This lets everyone know what you have to offer (including yourself). Nobody likes surprises, especially lenders.

Second step: created applications with our lending partners that our easy and do not pull your credit (soft pull) to see what you can qualify for, I call it the “free DING zone”.  You could take months to find what we can do in minutes.

Final step: Find the lenders who can actually do these things.

So we did…Our goal is always to help business and individuals obtain the best financial services available.

Frank J. Eberhart, CEP® RFC® Author

http://www.lendingcapital.net

Scary Stuff…

 Read and heed…

 

Report: 2016 saw 8.5 million mobile malware attacks, ransomware and IoT threats on the rise

In 2016, the number of malicious installation packages hit more than 8.5 million-three times more than the year before, according to a report on mobile malware evolution from Kaspersky Lab, released on Tuesday. The firm registered nearly 40 million attacks by malicious mobile software over the course of the year as well.

http://www.techrepublic.com/article/report-2016-saw-8-5-million-mobile-malware-attacks-ransomware-and-iot-threats-on-the-rise/

Most hackers claim they can break target systems in under 12 hours

The majority of hackers claim they can break through cybersecurity defenses and infiltrate their target’s systems within hours, according to new research.

While most reports only state stats and figures, the Nuix Black report attempts to separate itself by approaching security from the view of researchers as well as penetration testers. The report, released on February 23, says that more than three-quarters of hackers — 88 percent in total — who responded to the Nuix survey believe most network defenses can be breached within 12 hours.

In total, roughly a third said that their activities were never noticed by their victims — and 17 percent of hackers claimed it would take them no longer than two hours to breach a target.

http://www.zdnet.com/article/most-hackers-claim-they-can-break-enterprise-system

Creepy IoT teddy bear leaks >2 million parents’ and kids’ voice messages

A maker of Internet-connected stuffed animal toys has exposed more than 2 million voice recordings of children and parents, as well as e-mail addresses and password data for more than 800,000 accounts.

The account data was left in a publicly available database that wasn’t protected by a password or placed behind a firewall

https://arstechnica.com/security/2017/02/creepy-iot-teddy-bear-leaks-2-million-parents-and-kids-voice-messages/

 

Hack city- 43% targeted small business

Watch this video: https://vimeo.com/185391179

We are a corporate and individual agency for LifeLock Agency # C1A464

For more information and applications visit our website: http://www.lendingcapital.net

In 2015, there were over 1 million web attacks against people a day. Out of that staggering number, 43% targeted small businesses. With larger companies beefing up their cybersecurity measures, small businesses have become attractive targets for hackers. Owners should be concerned the average cost of a data breach for a small business merchant is between $36,000 and $100,000.

Common-sense solutions and general awareness of cybercrime techniques can greatly reduce your business’s vulnerability to cyberattacks.

  • Install Antivirus Software
    The best ways to steer clear of viruses and malware are to use an industry-leading anti-virus software solution. There are many options out there, do not install multiple anti-virus software as they can counter react and defeat the purpose. If you already have good antivirus software, make sure the auto-update and firewall options are turned on.
  • Back Up Your Files
    Symantec reports that ransomware—a method of using encryption to hold critical data hostage for money—increased 35% in 2015. Updating your web applications can help prevent an attack, but it’s important to regularly back-up important files just in case.
    To minimize the impact of a ransomware attack is to immediately disconnect the infected machine(s) from the network, reinstall the operating system and restore from your last good backup copy.
  • Email & Downloads
    Email scams are becoming ever more sophisticated. Spear phishing, for example, is an email that appears to be from an individual or business you know, designed to trick you into revealing personal info.
    It’s important for you and your employees to be wary of anything coming into your inbox. “Never click a link or open an attachment that you did not expect to receive. If you’re not expecting something or must think twice about the contents, don’t open it. Second step is to call and confirm from the sender
  • Install Software & Operating System Updates
    Pop-up reminders to update your web browser or operating system (like Windows or OS) may seem annoying, but don’t ignore them. “Ensure operating systems and applications are always fully patched with the latest security fixes. Updates will help protect you from cyberattacks.
  • Use Strong Passwords                                                                                                                            Weak passwords are an invitation for hackers. Don’t make the mistake of using         simple passwords, using the same password for multiple accounts. And you should change your passwords every 60 to 90 days.Businesses should invest in complex password policies for all their employees. These do not have to be too complex, but they should include a minimum of 10 characters, upper case letter, lower case letter, number and symbol. In addition, all businesses should incorporate some sort of identity theft software for their employees as well, this protects everybody.
  • Use Secure Encrypted Systems to Accept Card Payments
    Never photocopy, hand write, electronically key-in to a terminal, or manually copy credit card information. This is a common practice for orders over the phone, consider a secure online payment system like PayPal to accept transactions. If your systems are compromised, keystroke loggers and other hacking tools can scrape the manually entered information for later attacks.
    In addition, make sure you’ve upgraded to the latest point-of-sale equipment for in-person purchases, many of the POS systems today are using older technology and operating systems like Windows XP that are no longer supported, this leaves you completely vulnerable to attacks.
  • Don’t Bank Over Unsecured Wi-Fi
    Wi-Fi connections at coffee shops, airports and other public places are convenient, but they aren’t secure. Never log into your online banking profile on an unsecured network—it’s all too easy for someone to steal your information that way. Look for little devices with generally 2 antennas sitting next to someone’s laptop or computer, this is called a pineapple, be aware.
    If you are a road warrior and are using public Wi-Fi, invest in a VPN service to secure your transmissions
  • Secure Physical Devices Storing Sensitive Data
    Don’t forget that sensitive data can be physically stolen as well. Computers and drives with private business or customer information should be protected. Assume somebody will steal them and plan accordingly. So, no leaving your computer in the front seat of your car, desk, or anywhere that is accessible to the public, employees who do not have proper clearance, and ALWAYS password protect all your devices, cell phones, laptops, computers, Ipad’s.
  • Train Employees & Yourself
    When it comes to cybersecurity, your actions are more important than any technology. If you have employees, hold regular training to make sure they’re aware of company IT policies, and how to avoid email scams and other types of cyberattacks. Practice what you preach, if you don’t it could put you out of business!

http://www.lendingcapital.net

 

Cyber Security Update…be aware

 

 

A rash of invisible, fileless malware is infecting banks around the globe
According to research Kaspersky Lab plans to publish Wednesday, networks belonging to at least 140 banks and other enterprises have been infected by malware that relies on the same in-memory design to remain nearly invisible. Because infections are so hard to spot, the actual number is likely much higher.

“What’s interesting here is that these attacks are ongoing globally against banks themselves,” Kaspersky Lab expert Kurt Baumgartner told Ars. “The banks have not been adequately prepared in many cases to deal with this.” He went on to say that people behind the attacks are “pushing money out of the banks from within the banks,” by targeting computers that run automatic teller machines.

https://arstechnica.com/security/2017/02/a-rash-of-invisible-fileless-malware-is-infecting-banks-around-the-globe/

Experts predict a flood of denial-of-service attacks

As Internet of Things (IoT) goes mainstream Mirai-style denial-of-service botnet attacks are escalating, and hackers are targeting health care companies, financial services, and the government.

The hottest trend in cyberattacks is an archaic and simplistic hacker tool. Propelled by the rise of IoT, the popularity of denial-of-service attacks rebounded in late 2016 and early 2017. Accompanying the rapid acceleration of the IoT and connected device market, warn cybersecurity experts, will be a zombie botnet swarm of network-crippling attacks.

Denial-of-service attacks are simple but effective weapons that bring down websites and services by flooding networks with junk traffic from commandeered botnets. Digital fallout will often cripple the target and ripple across the web to knock out unaffiliated but connected services and sites. “After an attack [clients] often feel angry and violated,” said Matthew Prince, CEO of denial-of-service mitigation service CloudFlare in an interview with TechRepublic. “A distributed denial-of-service (DDoS) attack is not a sophisticated attack. It’s the functional equivalent of a caveman with a club. But a caveman with a club can do a lot of damage.”

http://www.techrepublic.com/article/everything-old-is-new-again-experts-predict-a-flood-of-denial-of-service-attacks/

Security flaws in Pentagon systems ‘easily’ exploited by hackers

Hackers are likely exploiting the easy-to-find vulnerabilities, according to the security researcher who warned the Pentagon of the flaws months ago. Several misconfigured servers run by the US Department of Defense (DOD) could allow hackers easy access to internal government systems, a security researcher has warned.

The vulnerable systems could allow hackers or foreign actors to launch cyberattacks through the department’s systems to make it look as though it originated from US networks. Dan Tentler, founder of cybersecurity firm Phobos Group, who discovered the vulnerable hosts, warned the flaws are so easy to find that he believes he was probably not the first person to find them.

“It’s very likely that these servers are being exploited in the wild,” he told me on the phone.

While the Pentagon is said to be aware of the vulnerable servers, it has yet to implement any fixes — more than eight months after the department was alerted.

http://www.zdnet.com/article/pentagon-system-flaws-likely-under-attack-by-foreign-hackers/

InterContinental Hotels Group admits data breach

IHG says that payment card systems at 12 hotels are involved in the security incident.

InterContinental Hotels Group (IHG) has admitted to falling prey to cyberattackers who were able to compromise payment systems at hotels in the US and the Caribbean.

IHG is the parent company of hotel chains including Crowne Plaza, Holiday Inn, Candlewood Suites and Kimpton Hotels and Resorts, with thousands of locations worldwide. According to the conglomerate, the data breach was discovered on 28 December after an undisclosed number of clients reported unauthorized, fraudulent charges on cards previously used at a number of US hotels owned by the hotel giant.

http://www.zdnet.com/article/intercontinental-hotels-group-admits-data-breach/

Take heed, get protection, pay attention, check your statements, get links and alerts for your credit cards and lower the amount of alerts to $1 on credit cards. Get Identity theft protection!

We now offer both corporate and individual Lifelock which is now part of Norton Security Systems, we will have special discounts for the as well.

Frank

www.Lendingcapital.net