104

101 Ways Your Identity Can Be Stolen

  • Upload
    acuant

  • View
    28

  • Download
    3

Embed Size (px)

Citation preview

Presented by Acuant a leading provider of identity solutions &credential management

There are so many ways to get access to your privateinformation these days. Even corporate giants have been

hacked and had private information leaked.

After reading our list of 101 Ways Your Identity Can BeStolen, you may feel a little helpless and vulnerable. But by taking

correct security measures and monitoring your credit score andfinancial accounts you should be able to identify any suspicious

activity before it can harm you.

1

Using your social

security number

to get insurance

2

Stealing identifying

information from

your license

3

Identity fraud for

property purchase

4

Creating a new

identity

5

Using a child’s

identity

6

Stealing from

your mailbox

7

Phishing emails

8

Nigerian letter

scheme, or 419

fraud

9

Telemarketing

calls

10

Sharing your

vacation pictures

while you’re

away

11

Sharing sensitive

information on

social media

12

Stolen cellular

phones

13

Using your debit

card for online

shopping

14

Going through

your trash

15

Changing your

mailing address

16

Illegally tapping

into your

computer

17

Having weak

wireless security

18

Using public

Wi-Fi

19

Weak

passwords

20

Keeping your

social security

card in your

wallet

21

Credit card

skimming

22

Responding to or

downloading

attachments from

spam

23

Never checking

your credit

24

Accessing fake

credit card sites

25

Going on fake

financial or utility

websites

26

ATM watchers

27

ATM overlays

28

Grocery store PIN

thieves

29

Downloading

torrents

30

Falling for “free”

offers, like

vacations, gifts,

and prizes

31

Soliciting credit

card information

by phone

32

Overusing your

SSN for medical

identification

33

Sharing of private

data on hacker

networks

34

Bulk gathering of

IDs via black

market

35

Failing to destroy

old hard drives and

computers

36

Stealing your

electricity

37

Job thieving

38

Social engineering

39

Vishing, or “voice

fishing”

40

Baiting by

pretexting

41

Man-in-the-middle

attack

42

Pharming

43

Malware-based

phishing

44

Corporate data

breaches

45

Keystroke logging

46

Rootkits

47

Scam texting

—SMiShing

48

Viruses and worms

49

False claims for

refunds from the

IRS

50

Passport thieves

51

Publicly listing

your hobbies,

memberships, and

employer

52

Driver’s license

theft

53

Using your

mother’s maiden

name

54

Defrauding banks

55

Impersonating

missing children

56

Fake being a

financial adviser

for the famous

57

Stealing the

identity of a

missing person

58

Faking one’s own

death

59

Synthetic identity

theft

60

Having a publicly

listed number

61

Keeping credit cards,

checks, and bank

statements in your

car

62

Not using a safe at

home

63

Not using a security

service

64

Not freezing your

credit card accounts

65

Leaving receipts

behind

66

Not writing “check ID

or license” on the

back of your cards

67

Failing to consider

one-off credit cards

68

Shopping on un-

trusted websites

69

Not having anti-virus

software on your PC

70

Using the same

passwords online

71

Never changing your

passwords

72

Logging into accounts

on public computers

73

Putting checks in the

mail

74

Leaving bills at your

mailbox for pick-up

75

Moving out

76

Not opting out of

credit card offers

77

Not using online

billing options

78

Using unsafe

mailboxes

79

Forgetting to check

links online

80

Accepting strange

friend requests

81

Not wiping your

phone

82

Using one email

account for

everything

83

Thinking Macs are

impenetrable

84

Storing credit card

information for later

use

85

Not using two-step

verification if

available

86

Not changing your

home locks and using

a “do not duplicate”

label on your keys

87

Not using a lock on

your phone or tablet

88

Using camera phones

89

Pickpocketing

90

Ordering

unauthorized

credit reports by

posing as a

landlord

91

RFID scanners

92

Using your place

of birth as a

security

question

93

Obtaining

information for

use as revenge or

blackmail

94

Stealing

information

from doctor’s

office

95

Filling out car

loan applications

96

Clicking on pop-

ups

97

Thieves going

through

pharmacy waste

baskets

98

Mortgage ID

theft

99

Opening cyber

greeting cards

100

Installing

electronic

surveillance

101

Payroll data

breach

We hope you enjoyed our comprehensive list,

and you're feeling a little safer knowing how you

can avoid these risky situations.

To read our full blog post, 101 Ways Your

Identity Can Be Stolen And Exploited, follow

the link below:

bit.ly/101idtheft