Most news articles on consumer law are needlessly confusing. Attorney Mike Cardoza takes a straight, no-nonsense approach on the current issues facing consumers today. Our blog provides an insider’s view on consumer rights, and explores topics such as threats to privacy and unfair credit reporting. Be sure to check back for regular updates.
- Page 1
-
How It Happens: What “Chip Verified” MeansIt does not convert hardware communication into human consent.
-
How It Happens: Credit Application ManipulationIf enough of the data points match existing records, the system flags the application as low risk.
-
How It Happens: Data Breaches & Credential ReuseSoftware takes leaked email-and-password combinations and tests them across thousands of websites
-
How It Happens: Synthetic IdentityIt blends real information with fabricated information to create someone who does not fully exist — but looks real to automated systems.
-
How It Happens: Massive Data Aggregation & SSN ExposureOver the last decade, massive data breaches have exposed billions of records. When a breach happens, the information doesn’t evaporate.
-
How It Happens: Shimming & Chip Reader CompromiseInstead of attaching to the outside of a machine, ultra-thin electronic devices are inserted deep inside ATM or point-of-sale card slots to intercept information as the EMV chip communicates with the terminal.
-
How It Happens: Mail InterceptionOne of the most common — and most misunderstood — entry points is the mail.
-
HOW IT HAPPENS: IDENTITY THEFTIt happens because there are systems — mailing systems, credit systems, data systems — and those systems have vulnerabilities. This section explains, in plain English, how identity theft actually happens.
-
Why Synthetic Identities StickIdentity Theft Lawyer Mike Cardoza explains why Synthetic Identities stick around and are so hard to extinguish
-
The Synthetic Identity That Isn’t YouID Theft attorney Mike Cardoza explains what a "Synthetic Identity" is and how it can affect anyone.
