Everything You Need To Know About Identity Theft

<p>With our increasing dependence on the World Wide Web&comma; identity theft is now more than ever a threat to all of us&period; There are no guarantees that we will not become the next victim of this crime&period; This is why the more we know about identity theft&comma; the more equipped we will be to protect ourselves against in&period;<&sol;p>&NewLine;<h2>The History of Identity Theft<&sol;h2>&NewLine;<div class&equals;"mh-content-ad"><script async src&equals;"https&colon;&sol;&sol;pagead2&period;googlesyndication&period;com&sol;pagead&sol;js&sol;adsbygoogle&period;js&quest;client&equals;ca-pub-9162800720558968"&NewLine; crossorigin&equals;"anonymous"><&sol;script>&NewLine;<ins class&equals;"adsbygoogle"&NewLine; style&equals;"display&colon;block&semi; text-align&colon;center&semi;"&NewLine; data-ad-layout&equals;"in-article"&NewLine; data-ad-format&equals;"fluid"&NewLine; data-ad-client&equals;"ca-pub-9162800720558968"&NewLine; data-ad-slot&equals;"1081854981"><&sol;ins>&NewLine;<script>&NewLine; &lpar;adsbygoogle &equals; window&period;adsbygoogle &vert;&vert; &lbrack;&rsqb;&rpar;&period;push&lpar;&lbrace;&rcub;&rpar;&semi;&NewLine;<&sol;script><&sol;div>&NewLine;<p>While identity theft is not a new crime&comma; it has mutated over time to respond to the ever evolving technology and most importantly the World Wide Web&comma; credit cards and ATMs&period;<&sol;p>&NewLine;<p>Before the popularization of credit cards in the 1950s&comma; stealing someone&&num;8217&semi;s identity meant getting their passport&comma; driver&&num;8217&semi;s license or Social Security number&period; However&comma; what made identity theft far less common in those days was the fact that a person had to be physically present at a bank branch in order to open a credit card&period;<&sol;p>&NewLine;<p>Everything changed in the 1980s when the Fair Isaac Corporation invented the FICO system of credit scoring&period; This system rates a person&&num;8217&semi;s credibility in a report which also contains other personal and <a class&equals;"wpil&lowbar;keyword&lowbar;link" href&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;tag&sol;financial-fraud&sol;amp&sol;" title&equals;"financial" data-wpil-keyword-link&equals;"linked" data-wpil-monitor-id&equals;"542">financial<&sol;a> information&period; When an identity thief gets a hold of that information&comma; they are likely going to be able to access other banking and financial information&period; Unfortunately&comma; with the automation of transactions and the ever more common online banking&comma; stealing one&&num;8217&semi;s identity has become easier than ever&period; Fortunately though&comma; this ever increasing threat is recognized and today your maximum liability under federal law for unauthorized use of your credit card is &dollar;50&period;<&sol;p>&NewLine;<h2>Identity Theft Scams<&sol;h2>&NewLine;<p>The criminals specializing in identity theft are very skilled in the &&num;8220&semi;craft&&num;8221&semi; and constantly come up with new and improved ways to scam people just like you and I&period; No one is really protected because the schemes are getting more and more believable and sophisticated&period; The best way to find out about identity theft scams is to check out the resources on the website of the Federal Trade Commissions&comma; the FBI&comma; and the websites of your local Better Business Bureau or Chamber of Commerce&period;<&sol;p>&NewLine;<h2>Types of Identity Theft<&sol;h2>&NewLine;<p>Although there are many ways to steal an identity&comma; below are the three more common types that everyone concerned about identity theft should know about&period;<&sol;p>&NewLine;<p>Application Fraud &lpar;or True Name Identity Theft&rpar; &&num;8211&semi; In this case the thief will use your personal information to open new accounts or purchase large items on credit&period; Most common forms of application fraud are a thief opening a credit card in your name or cell phone service&period; The biggest issue with this type of fraud is that it may take a while for it to be noticed&period; Very often people do not even realize that they have become victims of identity theft until they order a credit report and see consumer credit account that they do not recognize&period;<&sol;p>&NewLine;<p>Account Takeover &&num;8211&semi; in this case the thief uses your existing accounts to make purchases or withdrawals&period; This type of fraud is easier to notice and with the protection mechanisms many financial institutions currently have about identity theft&comma; it is usually caught relatively efficiently&period; Many credit card issuers&comma; for example&comma; have protection mechanisms in place&comma; such that in an event that a transaction meets their suspicion criteria&comma; a call is generated to the credit card holder to verify the transaction was legitimate&period;<&sol;p>&NewLine;<p>Criminal Identity Theft &&num;8211&semi; possibly the most devastating type of identity theft&comma; this is where the thief uses your identity and presents a counterfeit ID assuming your identity to law enforcement when questioned concerning a crime&period; This may seem an unlikely scenario to you but it is a form of identity theft that you should guard against&period;<&sol;p>&NewLine;<h2>What Identity Thieves are After<&sol;h2>&NewLine;<ul>&NewLine;<li><strong>Social Security<&sol;strong> &&num;8211&semi; a gateway to all your personal information<&sol;li>&NewLine;<li><strong>Date of Birth<&sol;strong> &&num;8211&semi; to verify identity and confirm most transactions<&sol;li>&NewLine;<li><strong>Account Numbers<&sol;strong> &&num;8211&semi; to with draw money or make purchases online<&sol;li>&NewLine;<li><strong>Mother&&num;8217&semi;s Maiden Name<&sol;strong> &&num;8211&semi; the ultimate identity verifier<&sol;li>&NewLine;<li><strong>Pins and passwords<&sol;strong> &&num;8211&semi; to access various accounts<&sol;li>&NewLine;<li><strong>Driver&&num;8217&semi;s license<&sol;strong> &&num;8211&semi; to obtain fraudulent identification<&sol;li>&NewLine;<&sol;ul>&NewLine;<h2>How Is Your Identity Stolen<&sol;h2>&NewLine;<h3>Identity Theft Online<&sol;h3>&NewLine;<p><strong>Spyware<&sol;strong> &&num;8211&semi; is type malicious software that collects information about your online activity&period; Spyware can come in the form of backdoor entry &&num;8211&semi; which gives thieves access to your computer or keystroke logging when thieves get a log of everything you type online including passwords and account numbers&period; The presence of spyware is typically difficult to detect&period;<&sol;p>&NewLine;<p><strong>Phishing<&sol;strong> &&num;8211&semi; is when you receive emails which seem to be coming from a reputable institution&comma; your bank from example&comma; asking you to update personal information&period; This way thieves can obtain your account numbers and other personal information<&sol;p>&NewLine;<p><strong>Fraudulent Sites Online<&sol;strong> &&num;8211&semi; are fraudulent e-commerce sites offering various goods and services through spam or online price comparison sites&period; Therefore&comma; when your purchase something online&comma; the thieves gain access to your personal information&period;<&sol;p>&NewLine;<p>Wireless Snooping &&num;8211&semi; occurs when the thieves access directly your unsecured wireless network and steal your private financial information directly from your computer&period;<&sol;p>&NewLine;<h3>Identity Theft At Home<&sol;h3>&NewLine;<p>Mail &&num;8211&semi; stealing your mail can give thieves access to bank statements&comma; credit carsd information&comma; auto loans etc&period; Make sure your mailbox is locked or opt for paperless statements from your financial institution&period;<&sol;p>&NewLine;<ul>&NewLine;<li><strong>Trash<&sol;strong> &&num;8211&semi; all personal information from above can be found in your trash&period; The solution is simple &&num;8211&semi; get a shredder&period;<&sol;li>&NewLine;<li><strong>Phone Fraud<&sol;strong> &&num;8211&semi; if you receive a call from your &&num;8220&semi;financial institution&&num;8221&semi; notifying you that there has been fraud suspected on your account and need you to verify your personal information&comma; suspect that it may be a fraudulent call&period;<&sol;li>&NewLine;<li><strong>Identity Theft From Third parties<&sol;strong> &&num;8211&semi; Sometimes thieves can access your information from a third party such as accessing your credit report illegally or hacking in the records of a business that has your information &lpar;stores&comma; restaurants etc&period;&rpar;<&sol;li>&NewLine;<&sol;ul>&NewLine;<h3>How Identity Thieves Can Use Your Information<&sol;h3>&NewLine;<ul>&NewLine;<li>Make purchases &&num;8211&semi; usually large ticket items that can later be resold for cash<&sol;li>&NewLine;<li>Make withdrawals &&num;8211&semi; can be done from both credit and debit cards<&sol;li>&NewLine;<li>Change your address &&num;8211&semi; so it delays you discovering the fraudulent activity on your accounts<&sol;li>&NewLine;<li>Open new accounts &&num;8211&semi; using your Social security&comma; a thief can open new credit cards and&sol;or new auto <a class&equals;"wpil&lowbar;keyword&lowbar;link" href&equals;"https&colon;&sol;&sol;www&period;fraudswatch&period;com&sol;category&sol;loans&sol;amp&sol;" title&equals;"loan" data-wpil-keyword-link&equals;"linked" data-wpil-monitor-id&equals;"194">loan<&sol;a> or other loan accounts&period;<&sol;li>&NewLine;<li>Get employment &&num;8211&semi; it may sound strange but it happens often than you may think&period; Your identity may be used to secure employment&period;<&sol;li>&NewLine;<li>Receive Social Security payments&period;<&sol;li>&NewLine;<li>To prevent identity theft online you could take these measures&colon;<&sol;li>&NewLine;<li>Ensure your Operating System is up to date<&sol;li>&NewLine;<li>Make sure your Browser is up to date<&sol;li>&NewLine;<li>Get good antivirus software<&sol;li>&NewLine;<li>Get anti spyware software<&sol;li>&NewLine;<li>Do not click on pop ups<&sol;li>&NewLine;<li>Be careful what you download<&sol;li>&NewLine;<&sol;ul>&NewLine;<p><strong>When using email you could take the following measures&colon;<&sol;strong><&sol;p>&NewLine;<p>To protect yourself from phishing scams&comma; do not respond to emails asking you to verity your personal information&period; Beware that thieves are very skilled and unfortunately they have succeeded at making those emails appear legitimate&period; Always use caution and suspect fraud&period; Keep in mind that it is highly unlikely that your financial institution will ask you for such verification via email<&sol;p>&NewLine;<p><strong>Make sure your antivirus software scans incoming emails&period;<&sol;strong><&sol;p>&NewLine;<p><strong>Do not open attachments from people your do not know&period;<&sol;strong><&sol;p>&NewLine;<p>To open links that friends have sent always copy and paste the URL directly into your browser&period; Remember that sometimes fraudulent emails appear to come from people you know&period; This happens when their email accounts have been hacked&period;<&sol;p>&NewLine;<p>Consider investing in encryption software to use each time you need to send personal information via email&period;<&sol;p>&NewLine;<p><strong>Follow these suggestions to protect your wireless network&colon;<&sol;strong><&sol;p>&NewLine;<ul>&NewLine;<li>Enable 128-bit encryption<&sol;li>&NewLine;<li>Change the routers default user ID and password<&sol;li>&NewLine;<li>Change the default Service Set Identifier &lpar;SSID&rpar;<&sol;li>&NewLine;<li>Disable SSID broadcasting<&sol;li>&NewLine;<&sol;ul>&NewLine;<p>&nbsp&semi;<&sol;p>&NewLine;

AboutEverythingIdentityIdentity TheftTheft