Date post: | 08-Aug-2015 |
Category: |
Technology |
Upload: | acuant |
View: | 27 times |
Download: | 2 times |
Presented by Acuant a leading provider of identity solutions & credential management
There are so many ways to get access to your private information these days. Even corporate
giants have been hacked and had private information leaked.
After reading our list of 101 Ways Your Identity Can Be Stolen, you may feel a little helpless and vulnerable. But by
taking correct security measures and monitoring your credit score and financial accounts you should be able to identify
any suspicious activity before it can harm you.
1
Using your social security number to get insurance
Stealing identifying
information from your license
2
Identity fraud for property purchase
3
Creating a new identity
4
Using a child’s identity
5
Stealing from your mailbox
6
Phishing emails
7
Nigerian letter
scheme, or 419 fraud
8
Telemarketing calls
9
Sharing your vacation
pictures while you’re away
10
Sharing sensitive
information on social media
11
Stolen cellular phones
12
Using your debit card for
online shopping
13
Going through
your trash
14
Changing your mailing
address
15
Illegally tapping into
your computer
16
Having weak wireless security
17
Using public Wi-
Fi
18
Weak passwords
19
Keeping your social
security card in your
wallet
20
Credit card
skimming
21
Responding to or downloading
attachments from spam
22
Never checking
your credit
23
Accessing fake credit card sites
24
Going on fake financial or
utility websites
25
ATM watchers
26
ATM overlays
27
Grocery store PIN thieves
28
Downloading torrents
29
Falling for “free” offers,
like vacations, gifts, and prizes
30
Soliciting credit card
information by phone
31
Overusing your SSN for
medical identification
32
Sharing of private data on
hacker networks
33
Bulk gathering of IDs via black
market
34
Failing to destroy old hard drives and computers
35
Stealing your
electricity
36
Job thieving
37
Social engineering
38
Vishing, or “voice fishing”
39
Baiting by pretexting
40
Man-in-the-middle attack
41
Pharming
42
Malware-based
phishing
43
Corporate data
breaches
44
Keystroke logging
45
Rootkits
46
Scam texting
—SMiShing
47
Viruses and worms
48
False claims for refunds from
the IRS
49
Passport thieves
50
Publicly listing your hobbies, memberships, and employer
51
Driver’s license theft
52
Using your mother’s
maiden name
53
Defrauding banks
54
Impersonating missing children
55
Fake being a financial
adviser for the famous
56
Stealing the identity of a
missing person
57
Faking one’s own death
58
Synthetic identity theft
59
Having a publicly listed
number
60
Keeping credit cards, checks, and bank statements
in your car
61
Not using a safe at home
62
Not using a security service
63
Not freezing your credit card accounts
64
Leaving receipts behind
65
Not writing “check ID or license” on the back of your cards
66
Failing to consider one-off
credit cards
67
Shopping on un-trusted websites
68
Not having anti-virus software on
your PC
69
Using the same
passwords online
70
Never changing your passwords
71
Logging into accounts on
public computers
72
Putting checks in the mail
73
Leaving bills at your mailbox for
pick-up
74
Moving out
75
Not opting out of credit card
offers
76
Not using online billing
options
77
Using unsafe
mailboxes
78
Forgetting to check links
online
79
Accepting strange friend
requests
80
Not wiping your phone
81
Using one email
account for everything
82
Thinking Macs are
impenetrable
83
Storing credit card
information for later use
84
Not using two-step verification
if available
85
Not changing your home locks and using a “do not
duplicate” label on your keys
86
Not using a lock on your phone or
tablet
87
Using camera phones
88
Pickpocketing
89
Ordering unauthorized
credit reports by posing as a
landlord
90
RFID scanners
91
Using your place of birth as a security
question
92
Obtaining information for use as revenge
or blackmail
93
Stealing information
from doctor’s office
94
Filling out car loan
applications
95
Clicking on pop-ups
96
Thieves going through
pharmacy waste baskets
97
Mortgage ID theft
98
Opening cyber
greeting cards
99
Installing electronic
surveillance
100
Payroll data
breach
101
We hope you enjoyed our comprehensive list, and you're feeling a little safer knowing how you can avoid these risky situations.
To read our full blog post, 101 Ways Your Identity Can Be Stolen And Exploited,
follow the link below:
bit.ly/101idtheft