101 Ways Your Identity Can Be Stolen - Acuant #identitytheft

Preview:

Citation preview

Presented by Acuant a leading provider of identity solutions & credential management

There are so many ways to get access to your private information these days. Even corporate

giants have been hacked and had private information leaked.

After reading our list of 101 Ways Your Identity Can Be Stolen, you may feel a little helpless and vulnerable. But by

taking correct security measures and monitoring your credit score and financial accounts you should be able to identify

any suspicious activity before it can harm you.

1

Using your social security number to get insurance

Stealing identifying

information from your license

2

Identity fraud for property purchase

3

Creating a new identity

4

Using a child’s identity

5

Stealing from your mailbox

6

Phishing emails

7

Nigerian letter

scheme, or 419 fraud

8

Telemarketing calls

9

Sharing your vacation

pictures while you’re away

10

Sharing sensitive

information on social media

11

Stolen cellular phones

12

Using your debit card for

online shopping

13

Going through

your trash

14

Changing your mailing

address

15

Illegally tapping into

your computer

16

Having weak wireless security

17

Using public Wi-

Fi

18

Weak passwords

19

Keeping your social

security card in your

wallet

20

Credit card

skimming

21

Responding to or downloading

attachments from spam

22

Never checking

your credit

23

Accessing fake credit card sites

24

Going on fake financial or

utility websites

25

ATM watchers

26

ATM overlays

27

Grocery store PIN thieves

28

Downloading torrents

29

Falling for “free” offers,

like vacations, gifts, and prizes

30

Soliciting credit card

information by phone

31

Overusing your SSN for

medical identification

32

Sharing of private data on

hacker networks

33

Bulk gathering of IDs via black

market

34

Failing to destroy old hard drives and computers

35

Stealing your

electricity

36

Job thieving

37

Social engineering

38

Vishing, or “voice fishing”

39

Baiting by pretexting

40

Man-in-the-middle attack

41

Pharming

42

Malware-based

phishing

43

Corporate data

breaches

44

Keystroke logging

45

Rootkits

46

Scam texting

—SMiShing

47

Viruses and worms

48

False claims for refunds from

the IRS

49

Passport thieves

50

Publicly listing your hobbies, memberships, and employer

51

Driver’s license theft

52

Using your mother’s

maiden name

53

Defrauding banks

54

Impersonating missing children

55

Fake being a financial

adviser for the famous

56

Stealing the identity of a

missing person

57

Faking one’s own death

58

Synthetic identity theft

59

Having a publicly listed

number

60

Keeping credit cards, checks, and bank statements

in your car

61

Not using a safe at home

62

Not using a security service

63

Not freezing your credit card accounts

64

Leaving receipts behind

65

Not writing “check ID or license” on the back of your cards

66

Failing to consider one-off

credit cards

67

Shopping on un-trusted websites

68

Not having anti-virus software on

your PC

69

Using the same

passwords online

70

Never changing your passwords

71

Logging into accounts on

public computers

72

Putting checks in the mail

73

Leaving bills at your mailbox for

pick-up

74

Moving out

75

Not opting out of credit card

offers

76

Not using online billing

options

77

Using unsafe

mailboxes

78

Forgetting to check links

online

79

Accepting strange friend

requests

80

Not wiping your phone

81

Using one email

account for everything

82

Thinking Macs are

impenetrable

83

Storing credit card

information for later use

84

Not using two-step verification

if available

85

Not changing your home locks and using a “do not

duplicate” label on your keys

86

Not using a lock on your phone or

tablet

87

Using camera phones

88

Pickpocketing

89

Ordering unauthorized

credit reports by posing as a

landlord

90

RFID scanners

91

Using your place of birth as a security

question

92

Obtaining information for use as revenge

or blackmail

93

Stealing information

from doctor’s office

94

Filling out car loan

applications

95

Clicking on pop-ups

96

Thieves going through

pharmacy waste baskets

97

Mortgage ID theft

98

Opening cyber

greeting cards

99

Installing electronic

surveillance

100

Payroll data

breach

101

We hope you enjoyed our comprehensive list, and you're feeling a little safer knowing how you can avoid these risky situations.

To read our full blog post, 101 Ways Your Identity Can Be Stolen And Exploited,

follow the link below:

bit.ly/101idtheft

Recommended