Feeds

ID fraud conmen target TV comic Hill

What are the chances of that happening?

Securing Web Applications Made Simple and Scalable

Fraudsters siphoned £280,000 from the bank account of TV comic Harry Hill as part of a scam targeting wealthy people that netted an estimated £500,000. A court heard that an unnamed pair of crooks allegedly used threats to obtain answers to confidential security questions needed to control the bank accounts of prospective marks including Hill, 41.

These details allowed fraudsters to set up bogus bank accounts in their victims' names and transfer money to the fraudulent accounts, where large sums of money were subsequently extracted. Hill (real name Dr Matthew Hall) discovered he was one of five people targeted in the scam after querying a suspicious transaction at his bank, the Halifax. The bank has recovered £150,000 of the money stolen and refunded the remaining stolen cash to its clients.

Sharmane Dillon, 23, a Halifax customer adviser from Perivale, Middlesex, admits passing on customer details but denies fraud. In court, she claimed conmen behind the racket threatened her with violence, The Daily Mirror reports.

The case continues.®

Bootnote

Hill peddles his brand of surreal humour through shows such as Harry Hill's TV Burp. One of the running gags in early versions of his shows were attempts by Harry's wife, May Sung, to pinch his savings book.

The smart choice: opportunity from uncertainty

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.