Identity Theft Sitemap - Page 1 2016-09-26

The Mail You Should Shred to Prevent Identity Theft
Your mail is one of the most common sources of personal information for identity theives. Learn what mail puts you at risk and how to reduce it.

Identity Theft - Do I Really Need a Lawyer?
Victims of identity theft seldom use an attorney, but in many situations, you'll need an identity theft lawyer to navigate the red tape.

Let’s go on a Phishing Expedition Pt. I
Phishers can work in solitude or as part of complex rings, usually from Russia. Phishing is incredibly easy to pull off.

Who Steals Identities: Anyone, Sane or Not
It could be an immediate family member, a stranger in a foreign land and anyone and everyone in between.

What is Account Takeover Fraud?
When people think of “identity theft” they often think credit card fraud which is just one form of Account Takeover Fraud

Getting an Identity Theft Police Report
Recovering from identity theft? There are some specific issues you want to be aware of when you are trying to get an identity theft police report.

How to Report Identity Theft and File an FTC Fraud Affidavit
The biggest milestones to recovery are reporting the identity theft to the Federal Trade Commission (FTC) and filing a FTC fraud affidavit.

How to Report Identity Theft to the IRS
Discovered you are a victim of ID theft after filing taxes? File Form 14039 to warn the IRS to flag your account for possible problems in the future.

GPS and Your Privacy
A SCOTUS decision involving GPS privacy ruled in favor of the defendant, but opinion gives license to the law when it comes to your cell phone.

Identity Theft Restoration Programs
Identity theft restoration programs are among the high-end of identity protection when it comes to price, but victims who have a restoration program almost always say it was well worth the investment.

Prevent Identity Theft - What Is Your Risk?
The best way to determine your risk of identity theft requires you to know what information you need to protect to keep yourself safe.

Identity Theft and Cell Phone Safety
We don’t often think about our cell phones related to id theft. Here's how to prevent yourself from becoming a victim of cell phone identity theft.

Is Your Personal Information Safe in the Cloud?
Cloud computing is an inexpensive online data storage solution. But data security is a concern when storing your personal information.

Social Security Number Protection Act of 2010
The Social Security Number Protection Act of 2010 is designed to protect your SSN from misuse by Federal, state and local governments.

Identity Theft and Assumption Deterrence Act
The Identity Theft and Assumption Deterrence Act (ITADA or ITAD Act) was the first of many Federal laws targeting identity thieves. Learn about it here.

The Many Types of Identity Theft
When we hear about identity theft, most of us think about credit cards and bank accounts. But there are several affected areas, not just our wallet.

How to Stay Safe from College Identity Theft
College students are at high risk for identity theft. To protect themselves, they need to understand what identity theft is, where they are at risk, and what steps to take if they suspect identity theft. All of that information is included in this article. Page 2.

Keeping Your Wallet or Purse Safe From Identity Thieves
A stolen wallet or purse can mean more than just losing your cash and credit cards. It can also mean that your identity is at risk. Learn how to protect belongings and prevent identity theft

Biometric Identification and Identity Theft
Some experts call biometrics the answer to identity theft. Although biometric identification can be useful, it can also instill a false sense of security.

How Identity Theft Happens - Low-Tech Methods
How identity theft happens may include a combination of low and high tech methods, from simple phone scams to data breach.

Identity Theft - How It Happens
When you get your personal information to a company or business, your safety depends almost entirely on their policies and procedures. Page 2.

ATM Card vs. Credit Card - Identity Theft Precautions
Knowing the difference between your ATM card and credit card can save you a lot of headaches if you become a victim of ATM identity theft.

College Identity Theft: A Growing Problem
College students are at high risk for identity theft. To protect themselves, they need to understand what identity theft is, where they are at risk, and what steps to take if they suspect identity theft. All of that information is included in this article.

Five Tips for Online Shopping Safety
Internet shopping can put you at risk for identity theft. Learn online shopping safety tips to help protect your identity and your credit.

What to Do After Your Wallet or Purse Is Stolen
Many cases of identity theft start with a lost wallet or purse. Taking the right actions can help protect you from that. Find out what you can do.

Identity Theft Employment Scams
Unemployment rates keep rising. But identity thieves don't care if you're out of work. They'll take advantage of you anyway with employment scams designed to steal your personal information. Learn how to protect yourself from identity theft employment scams.

Identity Theft and Your Federal Tax ID Number
Since tax ID numbers are public record, corporate identity theft is a very real concern, whether you are a mega corporation or a home-based business.

Fixing Your Credit Report After Identity Theft
If you've been victimized by identity theft, you want to clean the mess up quickly. Here's how to fix identity theft, and your credit report.

Social Security Fraud and Identity Theft
A big area of concern is stolen social security numbers, used for social security identity theft (usually just called Social Security Fraud.)

Identity Theft and Electronic Funds Transfer Act (EFTA)
The Electronic Funds Transfer Act (EFTA) protects you against bank account identity fraud loss, but you must report unauthorized debits immediately.

How to Recover Your Identity After Identity Theft
Identity theft is scary. Learn how to immediately begin recovery from identity theft and prevent future theft with these resources and tips.

ATM Skimming: It’s About To Get Worse
Automatic teller machine skimming occurs when a criminal places a small device over the card slot on an ATM. This device looks like the original card slot

Beware of These 11 Facebook Scams
The following activities are prevalent on Facebook and other social network sites, so keep your eyes open for them:

Cybercrime 101: Just what Is This?
Cybercrime and cyber criminals—the hottest words of this century, and for good reason!

Identity Theft: 15 Signs Yours Was Stolen
Identity theft is a sneaky crime that can take over your life long before you know it—unless you know the early warning signs.

Be careful what You post in Social Media
It is social media time: Do you know what you are posting? It is amazing how much detail about people’s private lives they post on social media.

Restaurant Workers fueling Identity Theft
Wonder who some of the identity thieves out there are? They’re not necessarily crooks or “bad guys” in the way we think of bad people

7 Critical Components of Effective Laptop Security
There’s not one single thing you can do to protect your laptop’s security; there’s seven

Account Takeover Fraud: Detection and Protection
In this series of posts we’ve discussed Account Takeover Fraud in its many forms, how it happens and how criminals are winning the war on cybercrime

Multiple Layers of Identity Theft Protection
What options do consumers have once they learn that there’s been a data breach involving their credit cards, medical records or whatever?

Social Media and Identity Theft Risks
Cyber fraudsters take advantage of the three major search engines in that they can sneak in their malware.

Hackers getting in through the Front Door using Social Media
The good guys, a.k.a. white hat hackers, are hired by CIOs of companies to infiltrate the company’s system to identify weaknesses.

Identity Theft 101 and Beyond
A person finally realizes they’ve been the victim of identity theft, doesn’t mean that the authorities can now track down the criminal and get him.

3 More Types of Identity Theft
In a previous post we discussed identity theft and identity fraud are terms used to refer to all types of crimes.

What are Ghost ATMs and Dummy ATMs
Ghost ATMs; this ATM is created and built from scratch. It may incorporate a hybrid of parts from junked ATMs but is essentially a hand crafted ATM.

What are Ram Raids, PIN Hacking and SMS attacks
Ram Raids; ATMs built into a wall or stand alone are being rammed by a truck and/or wrapped with chain and pulled out then loaded onto a truck.

The First 3 Types of Identity Theft
Identity theft and identity fraud are terms used to refer to all types of crimes in which someone wrongfully obtains and uses another person's data

What are Skimming devices and Cloned cards
In this post we discuss cloned cards, what they are and how they work and various types of ATM skimming hardware and how to protect yourself.

What are Point of Sale Skimming Attacks And PCI
Point of Sale (POS) skim; there are 3 kinds of POS skims they are Clerk skim, POS swaps advanced skim and POS malware the most sophisticated POS skim.

New Chip and PIN to Reduce ATM Skimming
We’re getting closer: Before we know it, chip and PIN technology will be the standard card payment system in the U.S.

Name One Reason Identity Thieves Would Ignore You
When the Social Security Number was created in the 1930s to track income for SS benefits, nobody could have foreseen that decades later.

The Cancerous Nature of Identity Theft
New account fraud is a form of identity theft, and this crime can happen to anyone alive or dead, including a newborn soon after the infant gets a SSN

How Has Hacking Evolved with Technological Advances?
Unfortunately, the bad hackers are evolving faster than the good guys trying to stop them.

Fake Social Accounts lead to Fraud
Ever peruse Facebook to look for high school or grade school classmates? Have you come upon any who had like 4,000 friends?

What is ATM Skimming
Criminals place a device on the face of an ATM, which appears to be a part of the machine. It’s almost impossible for civilians to know the difference.

What is New Account Fraud
In this article it is important to flesh out New Account Fraud and its impact on consumers and their credit lines

Account Takeover Fraud: Hacking and Scams
In this series of posts we are discussing Account Takeover Fraud; how it happens and how criminals are winning the war on cybercrime

How to Prevent New Account Fraud
In a previous post we discussed What is New Account Fraud. In this post we’ll flesh out how to protect yourself from New Account Fraud

Account Takeover Fraud: Phone, Check and Mortgage Fraud
In this series of posts we are discussing Account Takeover Fraud; how it happens and how criminals are winning the war on cybercrime.

Hi, I'm Robert Siciliano, Personal Security and Identity Theft Expert
One of the greatest inventions ever is that of the Internet, and many thieves would agree, as it makes it so much easier to commit crimes and get away with them.

IRS Form 5071C - Information to Verify Identity
IRS Form 5071C can be one way you find out you're a victim of social security identity theft and can help you work with IRS to clear issues up.

Your 2015 Taxes and Identity Theft
Fraudulent returns filed under your name can rob you of your tax refund. Here are some tips to keep you ahead of the curve this tax season.

- By Category
An index of categories in the

How Do Cybercriminals Steal a Person’s Identity?
There are many ways that cybercriminals can steal an identity, and one is by compromising a database that contains personal information.

IRS Now Helping Identity Theft Victims
The Internal Revenue Service now has a toll-free hotline for identity theft victims.

Keeping Your Devices Secure Against These 2016 Threats
The cybercrime landscape is constantly changing and growing as hackers seek out ways to take money from their victims.

How You Can Protect Yourself from Malware
There are a number of ways that you can protect yourself from malware, and several of these are explained below:

The Fundamentals of Protecting Yourself Online
A botnet is a term for a robot network; a group of Internet-connection personal computers, which have all been affected by malicious software.

Fraud Alerts and Protection Freezes: Preventing Identity Theft
An important part of personal security is identity theft protection. Just as you might take certain measures to protect your family, life, home or property

Keep Your Identity Safe When Shopping Online
Here are some ideas and tips on making sure that you keep your info safe when shopping or banking online:

Internet Scams You Should Be Aware Of
When most people think of fishing, they think of tossing a hook into the water, and then waiting for a fish to take the bait.

How Identity Thieves Use Your Mail to Profit
Most people think about identity theft as an issue that only happens when a criminal accesses personal information, and then takes over the checking account

Beware of These Common Telephone Scams
Social engineering is the act of manipulating others into performing a specific action or giving away confidential info.

Protecting Your Children from Identity Theft
Stealing children’s identity is a growing issue. The Federal Trade Commission has estimated that there are more than 500,000 new victims.

Computer Security: Phishing, Scareware and Zombies, Oh My!
Each browser has set security features that require the attention of the user, and these may or may not be enabled by default

Computer Viruses: Identifying and Eradicating Them
You know about computer viruses, but do you really know what they can do to your computer?

A Parent's Glossary to Basic Online Terms
The Internet has certainly brought us a number of new opportunities and technology, and with these things also come new terms.

Should You Be Afraid of the NSA?
After 9/11, most of the anti-government spying issues of the past fell to the wayside because many people were fine with giving up a little privacy.

The Role of Organized Crime in Identity Theft
In days of old, organized crime was all about the muscle. It consisted of gambling, loan sharking, prostitution and drugs.

How Cyber Criminals Can Steal Your Identity
The most common ways for cybercriminals to steal your identity is by compromising a database that contains your personal information.

How Does a Cybercriminal Target Me?
Our personal information is stored within hundreds, possibly thousands, of databases. These include corporations and government agencies and even our own computers.

Parents are Under Appreciating Child Online Security
As parents, we all want to offer our children the best opportunities to become healthy, happy, educated and responsible citizens.

Beware of Frauds That Target Senior Citizens
Senior citizens are very likely to have a

Update and Upgrade Your Digital Technology and Protect Your Identity
The start of the new year is the perfect time to start cleaning up, cleaning out, for upgrading and updating.

Keeping Your Kids Safe: A Parent's Glossary to Online Terms: Part 2
I recently posted a glossary for parents who are trying to learn more about Internet vocabulary and keeping their kids for that matter safe when online.

How to Protect Yourself from a Key-Catcher
A key-catcher is a hardware device plugged into the back of a PC that records all the keystrokes on a desktops keyboard.

How Does a Virus Infect a Computer?
When you see a pop-up on your computer coming from your antivirus software that says “virus,” you know that there is some type of issue.

The Rise of Cybercrimes and Identity Theft
A recent 2015 study found that in 2014, more than $16 billion was stolen from more than 12 million U.S. consumers.

Securing and Managing Your Cloud Data
When storing data on a computer, it is all kept ‘together in one place. Data on a cloud, however, is spread out across the world, often redundantly.

Is it Safe to Store Passwords in the Cloud?
Data that is stored on a computer is saved in a nice, controlled place. Data that is stored in a cloud, however, is spread out throughout the world.

Protecting Yourself from Affinity Fraud
Affinity fraud is a reference to investment scams that prey upon people who are part of a specific group, such as an ethnic or religious group.

Financial Identity Theft - What Is It?
Have you heard of financial identity theft and wondered what it is? The Federal Trade Commission offers a definition that is explained below

Why Would a Criminal Steal My Identity?
Many of us who have had a credit card compromised believe that we have been a victim of identity theft.

Beware of These Cybersquatting Scams
Cybersquatting will always be an issue, and it makes sense to those who have a brand, or even a name, to claim these domains now.

Tax Scams Can Happen All Year Long
There are about 230-ish million tax forms filed each year, and all of these forms contain a lot of information. This makes it a perfect opportunity for scammers

8 ways to protect from Scareware Scams
Have you heard of scareware? If you haven't heard the term, you may have seen the scam. Here's how it goes: you are innocently browsing the Internet.

Who is Stealing Identities and How?
As more and more people are becoming victims of identity theft, they wonder...who is stealing my identity and how are they doing it?

What is Scareware?
Scareware is a type of software that appears as a pop-up window on a computer. This software disguises itself as a warning message

Beware of Check Fraud Scams
Check fraud is not something that should be taken lightly, and it is a problem that costs businesses and consumers over a billion dollars.

The Worst and Most Common Telemarketing Scams
Telemarketing scammers are creative, and they come up with new tricks all of the time. These people prey on any person who answers the telephone.

Grandparent Scams Hit the Elderly Hard
Telephone scams have been around for years, and even now in a world where Caller ID is prevalent, it is still common to scam people via telephone.

Social Engineering Scams: What are They?
As an alternative to the traditional action of hacking, social engineering is the act of manipulating someone into doing certain actions.

What is Caller ID Spoofing?
Most people don't look at their phones and think they pose a danger, but these days, your phone can cause a security issue.

Beware of These Craigslist Scams
Most people love the convenience of Craigslist. You can find great deals, make extra money, or even find a job and place to live.

Child Identity Theft a Growing Problem
According to the Federal Trade Commission, there are approximately a half a million victims of child identity theft each year, ruining credit.

Telemarketing and Scamming: Seniors Are the Focus
It should be no real surprise that the elderly are the favorite targets of scammers. This isn't because seniors are more or less intelligent than the rest of us

Online Dating Scams
Two decades ago, online dating didn't exist, and ten years ago, those who participated in online dating were considered

Protecting Yourself Against Spear Phishing Scams
Spear phishing is a type of cyber attack that focuses on a subset of people, such as employees of a business or users of a website to undermine the group.

Safety, Security and GPS Geolocation
If you have smartphone, such an iPhone or Android device, you probably know that they have geolocation features.

Criminal Hacking: A History of Identity Theft
Criminal hacking cam into its own in the late 1990s and early 2000s, as the Internet age really came to fruition.

Charity and Disaster Scams: Don't Let Criminals Pull Your Heart Strings
As with retailers, cyber criminals often follow a seasonal calendar, and the holidays are just as important for them as they are for retailers

Child Identity Theft and the Moment of Discovery
You have probably seen all of the ads and commercials about identity theft, and in these ads, usually the victim of the crime is an adult.

Is Mobile Banking Safer Than Computer E-Commerce?
Mobile banking has been on the rise for the past few years for many reasons. This practice is convenient, but it is also more secure than banking online.

Beware of Mortgage Fraud Scams
Mortgage fraud is prevalent, and this type of fraud helps scammers earn very high profits through illegal means, while taking on a very low risk

The Signs of a Telemarketing Scam
Telemarketing scams are becoming more prevalent than ever before, and the following are some of the most common scams that are investigated by the FBI

Are You Ready for These Threats in 2016?
Attackers from across the world are focusing on utilities that support life such as power grids and water companies.

Let’s Go on a Phishing Expedition Pt. 2
A phishing e-mail that impersonates a big, reputable company such as PayPal, eBay, Amazon, etc., can look very convincing.

How to protect Yourself from Sextortionist
Michael Martinez, 26, is a cyberperv. He was arrested and charged with cyberstalking, child exploitation and sextortion of two women and one girl.

The Nigerian 419s
Those scam e-mails claiming you’re the recipient of a ton of money may have originated from Nigeria. A 419 Nigerian code made these e-mails illegal.

IRS changes up Process to protect Victims
A report says that recently, the IRS announced that it plans on changing its policy regarding the disclosure of ID theft tax returns.

How could Phishing possibly work?
Is phishing such a successful scam because there are so many brilliant crooks out there? Or is it because there are so many not-so-bright people there

Social Media and Identity Theft Risks also affect Business
Facebook has about 1.44 billion users. Twitter has 235 million. Of course, many of the Facebook and Twitter accounts are fraudulent.

Who are Phishers?
Phishing is a type of crime. Thieves cast out the bait and hope the targeted victims will latch onto it, and once they’re hooked, they’re reeled in for the kill

What are the Telltale Signs of a Phishing Attack?
Phishing e-mails come in many shapes, sizes and forms, in that there’s a colorful variety of ways that the thief-sender could structure the message.

How to protect Yourself from Swatters
For all the tech smarts that Zachary Lee Morgenstern had, he was dumb enough to get caught. The Texan 19-year-old uses Twitter to make bomb threats

The Fair Credit Reporting Act of 1970
The Fair Credit Reporting Act (FCRA) gives identity theft victims specific rights when it comes to recovering from identity theft - rights that most businesses still try to take from the victim.

Who Commits Identity Theft – Friends and Family
We usually trust family and friends to look out for us, but what can we expect if it is someone close to us who commits identity theft?

Identity Theft and Organized Crime
Many identity thieves have a personal connection to victims, and they can even be family members, friends, employers or employees.

How Cyber Experts Protect themselves, vs. You
The number of security suggestions you can find by Googling is simply dizzying. Which work best? Which work best for you?

Effective Identification to Prevent Identity Theft
Identity theft is a big problem both online and off, and it all comes down to the scammers ability to pose as the victim.

High-Tech Identity Theft Protection
Identity theft has already touched the lives of 10% of the American population, and shows no signs of slowing. High-tech solutions are necessary

Child Identity Theft Victims Stifled
A child identity thief usually has many years between the time they do the crime until the time they are found out, if they ever are.

A Brief History of Identity Theft
The history of identity theft goes back quite some time; it continues to evolve with new technology and impacts many aspects of your life

Food Banks
When you’re down on your luck, getting something to eat may have a bigger pricetag than you expect…

Can You Spell Criminal?
Phishing emails often contain misspellings and punctuation errors. Be on the lookout for these errors because they are sure indicators that an amateur is trying to steal your identity.

Look at the Email Address
The email address of a phishing email won't match who the sender is supposed to be.

Beware the Urgent Ploy
Phishers use any means necessary to get you to respond, and that includes marking email messages Urgent.

Links Lead You Astray
All phishing emails have one thing in common: links that don’t lead where they appear to. Check all links in suspicious emails to make sure they're legitimate.

Regular Maintenance Claims
A very common tactic that phishers use is telling email recipients that ‘regular maintenance’ turned up an account error of some type. Don’t fall for this.

The Protection Claim
Another trick that phishers use is to play on your sense of vulnerability by requesting account confirmation to prevent crimes from happening. Confirming your account means providing all of the identifying information that a criminal needs to gain control of the count. Just don't do it. Call the creditor or bank instead.

How to Spot a Phishing Email
It's estimated that 75-100 million phishing emails are sent out each day, like the Capital One phishing scam below. Learn how to protect yourself.

Your Risky Mailbox: Identity Theft 101
The most common means of identity theft in the real world is mail theft and redirection. Find tips for protecting your mail and your identity.

Steps to Protect Your Mail
Your mailbox is one of the riskiest places for your identity. These tips help you to protect your mail from the thieves that would use it to steal your identity. Page 2.

verywell. Identity Theft.

Does Hi-Tech Help?
Some folks think technology offers the solution to identity theft.


Identity Theft Issues for 2011
Protecting yourself from identity theft will be harder and harder as technology moves forward. Some issues will need to be addressed to protect us in 2011.