MONROE, La (KNOE) - Did you know that with a few easy steps someone could steal your phone number and phone service?
Courtesy: MGN Online
A new type of scam has been happening across the country and is a new way for scammers to steal your hard earned money, and even your identity. The scariest part is that this type of scam, called porting or port-out scamming, is that it can help scammers get past added security measures on personal and financial accounts and logins.
To put it another way, think of how many times you have set up an email address, social networking, or logged onto your bank account online or had to change your password.
How many times did you have to verify your identity by being sent a code via text message?
Now what if you weren't the only one who was reading that message?
This new type of scam absolutely could bypass that layer of security and has a huge potential for your identity to be stolen faster than you think. Luckily you can protect yourself and your Better Business Bureau® is here to help you identify and protect yourself.
What is a cell phone porting or port-out scam?
A scammer finds out your name and phone number and then attempts to gather as much personal identifiable information (PII) as possible about you. PII includes name, address, Social Security number, date of birth, and other information that can be used for identity theft. They then will contact your mobile provider, impersonating you, and inform them that your phone was stolen and request the number be "ported" with another provider and device.
(In some cases, if they were really brave and in a retail location and/or online, they might even try to buy a new phone which could make a sales representative incentivized to quickly fulfill their request and forgo some formal verification procedures.)
The scariest part? Once they have your number ported to a new device they can then start accessing and gaining entry to accounts that require additional authorization in terms of a code texted directly to your phone for security verification. Those added security measures are usually in place on accounts provided by email providers, social networks, tax preparation software, and even financial institutions
offers these tips to help protect yourself from this specific type of scam:
• Inquire with your wireless provider about port-out authorization. Every major wireless has some sort of additional security for accounts or for port-out authorization that customers can set up, like a unique pin, or add verification question, which will make it more difficult for someone to port-out your phone. Contact your mobile provider and speak to them specifically about porting and/or port out security on your account.
• Watch out for unexpected "Emergency Calls Only" status. Call your mobile phone company if your phone suddenly switches to "emergency call service only" or something similar. That's what happens when your phone number has been transferred to another phone.
• Be vigilant in about communications you receive. Watch out for phishing attempts, alert messages from financial institutions, texts in response to two-factor authorization requests.
• Be careful with your personal information. Treat your personal information like the valuable commodity it is. Make sure you shred any documents that have your bank account information, Social Security, or other personal information. These include credit card applications, insurance forms, financial statements, health forms and billing statements from utilities and phone service. Cut up expired credit and debit cards, making sure to cut through the numbers, before you dispose of them.
• Secure personal documents at home. If you have roommates, employ outside help or have contractors in your home, make sure personal documents are in a safe place – preferably under lock and key – and not lying out in plain sight. Minimize personal information on checks. You don't need to include your Social Security number, driver's license or phone number.
• Be alert to phishing attempts. Scammers are sophisticated and their phishing attempts may come via email, text, social media message, even phone calls. Be suspicious of any unsolicited communication asking you for personal information. Whether it's a supposed tech support call, an offer for a free cruise, or a charity plea, they may really be after your personal information. Click here for BBB's tips on Phishing and on Tech Support Scams .
• Shred outdated documents with personal information. While you should keep your tax returns forever, you should shred supporting documents for your tax returns after seven years. After one year, shred bank statements, pay stubs, and medical bills (unless you have an unresolved insurance dispute). Shred utility bills a month after they have been paid.
If you've fallen victim to this type of scam, alert your mobile provider, financial institutions and take the standard steps to combat identity theft. Also, BBB encourages you to file a report on BBB ScamTracker and be a hero to your community by warning others.