21 Ways Identity Thieves Get Your Information

Identity thieves typically obtain and exploit personally identifiable information or various credentials about individuals to authenticate themselves in order to impersonate that person.

Examples include:

  • id identity theft on the riseRummaging through garbage for personal information – also known as dumpster diving
  • Retrieving personal data from redundant IT equipment and storage media including PCs, servers, PDAs, mobile phones, USB memory sticks and hard drives that have been disposed of carelessly at public dump sites, given away or sold without having been properly sanitized
  • Using public records about individual citizens, published in official registers such as electoral rolls
  • Stealing bank or credit cards, identification cards, passports, authentication tokens … typically by pick pocketing, home invasion or snail mail theft
  • Common-knowledge questioning schemes that offer account verification and compromise: “What’s your mother’s maiden name?”, “What was your first car model?”, or “What was your first pet’s name?”, etc.
  • Explore top-notch service to protect your identity here
  • Skimming information from bank or credit cards using compromised or hand-held card readers, and creating clone cards
  • Using ‘contactless’ credit card readers to acquire data wirelessly from RFID-enabled passports and credit/debit cards
  • Shoulder-Surfing, involves an individual who discreetly watches or hears others providing valuable personal information. This is particularly done in crowded places because it is relatively easy to observe someone as they fill out forms, enter PIN numbers on ATM’s or even type passwords on smartphones.
  • Stealing personal information from computers using breaches in browser security or malware such as Trojan horse keystroke logging programs or other forms of spyware
  • Hacking computer networks, systems and databases to obtain personal data, often in large quantities
  • Exploiting breaches that result in the publication or more limited disclosure of personal information such as names, addresses, Social Security number or credit card numbers
  • Advertising bogus job offers in order to accumulate resumes and applications typically disclosing applicants’ names, home and email addresses, telephone numbers and sometimes their banking details
  • Explore top-notch service to protect your identity here
  • Exploiting insider access and abusing the rights of privileged IT users to access personal data on their employers’ systems
  • Infiltrating organizations that store and process large amounts or particularly valuable personal information
  • Impersonating trusted organizations in emails, text messages, phone calls or other forms of communication in order to dupe victims into disclosing their personal information or login credentials, typically on a fake corporate website or data collection form – also known as phishing
  • Brute-force attacking weak passwords and using inspired guesswork to compromise weak password reset questions
  • Obtaining castings of fingers for falsifying fingerprint identification
  • Browsing social networking websites for personal details published by users, often using this information to appear more credible in subsequent social engineering activities
  • Diverting victims’ email or snail mail in order to obtain personal information and credentials such as credit cards, billing and bank/credit card statements, or to delay the discovery of new accounts and credit agreements opened by the identity thieves in the victims’ names
  • Explore top-notch service to protect your identity here
  • Using false pretenses to trick individuals, customer service representatives and help desk workers into disclosing personal information and login details or changing user passwords/access rights – also known as pretexting
  • Stealing checks to acquire banking information, including account numbers and bank routing numbers or sort code
  • Guessing Social Security numbers by using information found on Internet social networks such as Facebook and Twitter
  • Low security/privacy protection on photos that are easily clickable and downloaded on social networking sites
  • Befriending strangers on social networks and taking advantage of their trust until private information is given
  • Explore top-notch service to protect your identity here

Source: Wikipedia


Like it? Plz Share It...

Want More? Follow Us...
Follow Us by email - here