Risk

4/20/2012
01:32 PM
50%
50%

Many Identity Theft Protection Services Promise The Impossible

Consumer Federation of America report warns about ID theft service providers that offer vague, misleading, or incomplete assurances about their services.

Identity theft protection service subscribers: Beware trial offers, as well as refund and cancellation policies, and always seek specifics about the exact type of assistance that will be provided.

Those warnings come from a new report into identity theft services. Released by the Consumer Federation of America (CFA), which counts 280 national, state, and local consumer rights groups as members, the 48-page study analyzes the practices of 20 identity theft services (which were not named in the report), as well as complaints made on the Internet about such services. It also details a series of best practices with which the CFA believes all identity theft service providers should comply.

"We found that most of the services' websites did a fair job of complying with the best practices, but there is need for improvement," said Susan Grant, CFA's director of consumer protection, in a statement.

[ Privacy groups are attacking the proposed Cyber Intelligence Sharing and Protection Act. Is CISPA Worth Saving? ]

One problem is marketing hype, as various services promise to "stop fraud before it starts" (Identity Hawk), "stop identity theft in its tracks" (Experian), or even to "prevent identity theft" (TransUnion). Compare that language with the Federal Trade Commission's guide to avoiding identity theft, which talks about how consumers can "deter, detect, defend, [and] avoid" ID theft.

Any identity theft service provider's promise to do more than that is hollow. "They can't prevent consumers' personal information from being stolen or detect identity theft in all instances ... [and] it's not always possible to stop identity theft, especially if someone's social security number has been compromised," according to the CFA's report.

Free trials are another offering that have seen their fair share of consumer complaints. "While many identity theft services are offered for free for a limited trial period, from the complaints that CFA found online it appears that the terms aren't always made clear," according to the report.

Plus, some identity theft service providers force consumers to jump through multiple hoops to cancel their trials. "Sometimes consumers can't get through to the company to cancel," according to the report. "Some consumers are charged even though they never agreed to try the service--usually because they gave their financial account information to that company or a partner of that company for something else."

Finally, not all identity theft service providers make clear exactly which services and features they're offering to provide. In many cases, researchers had to hunt through terms of service, FAQs, "and other less obvious places" to create a clear picture of what the service offered. "Some identity theft services act on behalf of customers if they become victims to resolve their problems, but most only provide advice and counseling," according to the report. In addition, the terminology related to services offered can be slippery. "For instance, if a credit score is provided, some services don't explain that it is an educational score, which is not the same score that lenders use," according to the report.

The CFA report findings may draw "truth in advertising" scrutiny from the FTC, as many services claim to be "#1" or "top-ranked," but provide no reference to back up that claim. Likewise, many of the identity theft statistics used by companies marketing ID theft services are outdated or inaccurate.

How could deficient identity theft service providers improve? For starters, the CFA has called on all such companies to cease sharing people's financial details with their affiliates, give consumers a warning when their free trials are ending, and detail the cost--should they continue after the free trial ends--as well as how they can easily and quickly cancel the service.

Put an end to insider theft and accidental data disclosure with network and host controls--and don't forget to keep employees on their toes. Also in the new, all-digital Stop Data Leaks issue of Dark Reading: Why security must be everyone's concern, and lessons learned from the Global Payments breach. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Railroader
50%
50%
Railroader,
User Rank: Apprentice
4/22/2012 | 8:20:22 PM
re: Many Identity Theft Protection Services Promise The Impossible
We must stop using SOC numbers as identification, and get those numbers off of the very places you mentioned such as Experian, TransUnion and other credit reporting agencies, there is not such thing as a secure computer, and until we do that, there will be no such thing a no identity theft.
More Than Half of Users Reuse Passwords
Curtis Franklin Jr., Senior Editor at Dark Reading,  5/24/2018
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11505
PUBLISHED: 2018-05-26
The Werewolf Online application 0.8.8 for Android allows attackers to discover the Firebase token by reading logcat output.
CVE-2018-6409
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. The module in charge of serving stored files gets the path from the database. Modifying the name of the file to serve on the corresponding ap_form table leads to a path traversal vulnerability via the download.php q parameter.
CVE-2018-6410
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. There is a download.php SQL injection via the q parameter.
CVE-2018-6411
PUBLISHED: 2018-05-26
An issue was discovered in Appnitro MachForm before 4.2.3. When the form is set to filter a blacklist, it automatically adds dangerous extensions to the filters. If the filter is set to a whitelist, the dangerous extensions can be bypassed through ap_form_elements SQL Injection.
CVE-2018-11500
PUBLISHED: 2018-05-26
An issue was discovered in PublicCMS V4.0.20180210. There is a CSRF vulnerability in "admin/sysUser/save.do?callbackType=closeCurrent&navTabId=sysUser/list" that can add an admin account.