1. Phishing
The Scam: You get an email purportedly from your bank, credit card provider or utility company. Often, it will say there’s some emergency or that there’s an issue with your account. The messages include a link that takes you to a fake version of the company’s website, with a login prompt that exists solely to capture your user name and password. With access to your account, a crook can peek inside and get your mailing address and any associated account numbers.
Avoid It By: If you get an urgent-sounding message from any company, especially a financial institution, that you do business with, don’t click on anything. Go to the company’s site directly and call or email to verify that the message is legit.

2. Pretexting

The Scam: This works exactly the same as phishing, but it’s done over the phone. “People pose as legitimate businesses to trick you into giving out information,” says John Everett, spokesman for the National White Collar Crime Center. The caller pretends to be from your bank, credit card company or even a government agency and tells you there’s some issue that can only be resolved if you provide account information, your Social Security number, login credentials or the like.
Avoid It By: Alarms should start ringing in your head if anybody calls you out of the blue and starts asking for this kind of info. Hang up on them and call wherever they were supposedly calling you from, both to establish that there is no problem with your account and to tip them off to the scam so they can warn other customers.

3. Fake Job Offers

The Scam: The Better Business Bureau of New York flagged this as number one on its roundup of the top scams of 2011. You respond to a job ad, often a “work from home” type of deal, and are told you’ve been hired after a phony phone interview. Some of these crooks go so far as to create a fake company website and other flourishes to make this look legitimate. Then they’ll ask for a Social Security number for a “credit check” or bank account information “to set up direct deposit,” which is just a ruse to steal your information.
Avoid It By: No matter how long or how grueling your job search is, do some due diligence online, over the phone and, when possible, in person on any employment offers.

4. Skimming

The Scam: A “skimmer” is a small, unobtrusive device that reads the information on a credit or debit card’s magnetic strip. In some cases, crooks install them in gas pumps or at ATMs, turning a routine transaction into an assault on your privacy. Skimming can also occur in retail situations, often restaurants, where a server will swipe your card through a handheld skimmer before running it through the establishment’s legitimate card reader. With the stolen data, identity thieves manufacture fake credit cards.
Avoid It By: Don’t swipe your card at any machine that looks tampered with or otherwise sketchy. If you’re eating out and are concerned about the risk of skimming by waitstaff, bring your card up to the register so it doesn’t leave your sight.

5. Dumpster Diving

The Scam: Like raccoons, crooks aren’t above rooting through garbage looking for goodies.”They rummage through trash looking for bills or other paper with your personal information on it,” the FTC warns in an online publication focusing on identity theft. This method of stealing information is old-school, but experts say criminals still use it because it still works.
Avoid It By: Shred personal documents and credit card offers before throwing them away, and wipe hard drives clean before you get rid of computers or smartphones.

6. Pickpocketing and Purse-Snatching

The Scam: This isn’t really a scam so much as old-fashioned robbery, but identity theft experts say it’s still one of the top ways people become victims.
Avoid It By: In addition to the usual personal safety precautions like being aware of your surroundings and observing suspicious behavior, you can cut down on the risk that your data will be used fraudulently. Keep a copy of the customer service numbers of your credit and debit cards someplace accessible so you can alert issuers to freeze your accounts. If you have a smartphone, install an application that lets you erase it remotely, so a thief can’t access any information stored there. And never, ever keep your Social Security number in your wallet. “If your wallet or purse is lost or stolen with your Social Security number and your driver’s license, that is a jackpot for a criminal that wants to steal your ID,” Everett says.

7. Malware and Spyware

The Scam: Clicking on a pop-up or a link in an email can unleash a program that sneaks into your computer and records your keystrokes: user names and passwords, account numbers, addresses — it captures everything and sends it back to the perpetrator, who now has everything he or she needs to steal your identity. Adam Levin, co-founder and CEO of Identity Theft 911, says cybercrooks are now creating similar tools to steal data via smartphone apps. “Fraudsters can gather data and intercept browsing sessions on your smartphone to gather information,” he says.
Avoid It By: Keep anti-virus, malware and spyware protection on your desktop or laptop up-to-date, and don’t click on pop-ups or links from unknown email senders. Protect your smartphone by only downloading apps that are part of that platform’s official marketplace.

8. Fake Tax Filing

The Scam: As if filing your taxes isn’t arduous enough, some people get an unpleasant surprise when they find out an identity thief has already claimed their refund. In some cases, cybercrooks use stolen personal information to file a fake return, then transfer “your” money onto a prepaid debit card. More rarely, scammers trick you into handing over your information. The Better Business Bureau issued a warning about this practice: Victims would get emails claiming that their tax information was incomplete. The emails would include a link that would take them to a fake IRS site that prompted them to enter their personal information.
Avoid It By: The IRS doesn’t contact taxpayers by email; any such solicitation is a fake. ”An IRS notice informing a taxpayer that more than one return was filed in the taxpayer’s name or that the taxpayer received wages from an unknown employer may be the first tip off the individual receives that he or she has been victimized,” the agency’s website says. If you get one, contact them right away.

9. Change of Address

The Scam: A criminal can get billing statements, bank account information and credit card offers by misdirecting your mail. ”They divert your billing statements to another location by completing a change of address form,” the FTC’s website says. Not only could you have your identity stolen, but you could also miss crucial payment deadlines and other mail.
Avoid It By: Shred mail — even junk mail — that might tempt a crook (such as credit card offers) and pay attention to what’s in your mailbox. If you get a notice informing you about a change of address and you haven’t moved, get in touch with the post office. If you suddenly stop getting statements from your bank or credit card company and you haven’t gone paperless, call them to make sure someone isn’t impersonating you via mail.

10. Data Breaches

The Scam: With the growing amount of information stored and transmitted digitally by banks, credit card companies and other third parties, there are more loopholes for a clever hacker to exploit. The recent Global Payments breach that affected Visa and MasterCard customers is just the most recent. In the past, banks, merchants and even online gaming platforms have been broken into. What’s more, with the rise of “hactivism” as a form of protest, personal data is collateral damage.
Avoid It By: Unfortunately, there’s not much most of us can do to prevent this. We depend on the companies with which we do business — and the companies they do business with — to keep our data safe. Since one item often stolen is passwords, create different passwords for your online banking, shopping and so on. This at least keeps a one-time breach from snowballing.

 

 

 

 

 


 


 

 

 



0 comments:

Post a Comment

I will like to hear your comments. Please leave a comment below

 
Top