The American Bankers Association, the Federal Trade Commission and the Identity Theft Aid Organization provide helpful information with the following links.
How is it stolen:
Data Breaches
A data breach is unauthorized access and retrieval of sensitive information by an individual, group, or software system
Malware Activity
Malware stands for “malicious software” – an umbrella term for software being used by cybercriminals to spy on you and steal your information.
Ransomware
Is a form of malware used by cyber criminals to freeze your computer or mobile device, steal your data and demand a “ransom” to be paid – typically anywhere from a couple of hundreds to thousands of dollars.
Phishing
Is attacks using ‘spoofed’ emails and fraudulent websites designed to fool recipients into divulging personal financial data.
Web and Internet Activity
The internet’s accessibility opens our world to a variety of products and services, information and entertainment. On the other hand, it provides opportunities for scammers, hackers, and identity thieves. The Federal Trade Commission and American Bankers Association offer valuable information on how to protect your computer, your information and your online files. Security measures should be installed and followed, and software updated routinely to avoid issues with the compromise of your data.
Mail theft and Dumpster Diving
ID Theft victims report that 88% of all the sensitive information illegally collected by ID thieves was taken from the victim’s trash without their knowledge.
ATM Readers
Watch for card skimmers when you begin to use your card at an ATM.
Mobile phone theft
If your phone is stolen, you could become a victim of Identity Theft since your mobile device has valuable personal information.
Protect Your Card:
Using An ATM:
Spear phishing is a small, focused attack via email on a particular person or organization. The goal is to penetrate the target’s defenses.
Social media can be a wonderful source of valuable information for hackers. Posting personal information can provide information to fraudsters for use in performing social engineering which can be used to trick your coworkers or your friends into doing things they wouldn’t typically do, like sending money to help you out because you lost your wallet that included all your identification while on vacation.
Read: Kent Lewis, How Social Media Networks Facilitate Identity Theft and Fraud
Online Dating
Online Dating is compromised by fraudsters frequently. The information from these 2 websites are valuable in identifying potential problems.
Phishing Attempts and Internet Scams
While email is convenient and has a good business use, it can also be misused by criminals for scams and various other fraudulent purposes. Phishing is one of the forms of fraud.
Nanny and Caregiving Job Scams
Finding a new job can be challenging, and using the internet might seem like the logical place to start searching. However, beware of scammers who could turn the promising job into a loss of money or worse. Read more…
Carol Kando-Pineda 2018, Staying away from nanny and caregiving job scams, FTC Consumer Information, https://www.consumer.ftc.gov/blog/2018/07/staying-away-nanny-and-caregiving-job-scams
Fake Checks:
Fake checks continue to be one of the most common instruments used to commit fraud against consumers.
Donate with Honor, not to a Sham Charity:
Just because a charity has “Veteran” in the title or refers to “helping the Veterans” does not mean that the Veterans will see any of the money. More scam artists are using this worthwhile charity to steal money from donors.