Tips for Dealing with Dangerous Tax Scams

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Tips for Dealing with Dangerous Tax Scams-4 Next

Tax Refund Theft

Another type of tax fraud that is rampant is tax refund theft. Scammers apply for an Electronic Filing Identification Number (EFIN) then, together with stolen Social Security numbers, apply for income tax refunds in other people's names. The GAO estimated that the IRS paid out $5.8 billion in fraudulent refunds related to identity theft in 2013. To guard yourself, protect your Social Security number. Never provide your Social Security number unless it is to a trusted authority, and don't submit it online unless it is over SSL (HTTPS). Some also advise that you should file your tax return early in the tax season before identity thieves have the opportunity to do so.

Cyber criminals and scammers view tax season as a prime opportunity. There are many ways that you can fall victim to their attacks and scams. The IRS has issued numerous consumer warnings about the fraudulent use of the IRS name or logo by scammers that are trying to trick consumers into providing their personal information (identity theft) in order to steal their financial assets or commit fraud. In addition, tax preparers and tax software vendors are often impersonated. Scammers use email, the web, postal mail, telephone and fax to set up their victims.

In this slideshow, Marie White, CEO of Security Mentor, a security awareness provider, discusses some of the serious tax scams and tax fraud, and offer ways to help you avoid them.


Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

More Slideshows

Social14-190x128.jpg 10 Ways to Improve Your Social Media Security Policy and Posture

When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ...  More >>

Security120-290x195 5 DDoS Myths Debunked

Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ...  More >>

Security119-190x128 8 Tips for Ensuring Employee Security Compliance

IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.