Most news articles on consumer law are needlessly confusing. Attorney Mike Cardoza takes a straight, no-nonsense approach on the current issues facing consumers today. Our blog provides an insider’s view on consumer rights, and explores topics such as threats to privacy and unfair credit reporting. Be sure to check back for regular updates.
- Page 1
-
How a Credit Bureau Can Mistakenly Report You as DeceasedWhat lenders and other institutions see is a profile that is assembled from multiple data sources. Those sources can include information reported by creditors, public records, and large databases that track identity and financial activity.
-
I Found Out I Was “Dead” When I Tried to Buy a CarIn many cases, the finance manager doesn’t have the ability to override it. Even if he believes you, he’s still working inside a process that depends on the same underlying data.
-
How It Happens: What “Chip Verified” MeansIt does not convert hardware communication into human consent.
-
How It Happens: Credit Application ManipulationIf enough of the data points match existing records, the system flags the application as low risk.
-
How It Happens: Data Breaches & Credential ReuseSoftware takes leaked email-and-password combinations and tests them across thousands of websites
-
How It Happens: Synthetic IdentityIt blends real information with fabricated information to create someone who does not fully exist — but looks real to automated systems.
-
How It Happens: Massive Data Aggregation & SSN ExposureOver the last decade, massive data breaches have exposed billions of records. When a breach happens, the information doesn’t evaporate.
-
How It Happens: Shimming & Chip Reader CompromiseInstead of attaching to the outside of a machine, ultra-thin electronic devices are inserted deep inside ATM or point-of-sale card slots to intercept information as the EMV chip communicates with the terminal.
-
How It Happens: Mail InterceptionOne of the most common — and most misunderstood — entry points is the mail.
-
HOW IT HAPPENS: IDENTITY THEFTIt happens because there are systems — mailing systems, credit systems, data systems — and those systems have vulnerabilities. This section explains, in plain English, how identity theft actually happens.
