Identity Theft Sitemap - Page 3 2013-12-08
The Red Flags Rule
The Red Flags Rule is an addition to FACTA that applies to companies which use credit reports, give information to credit reporting agencies, or accept payments from customers. This law requires companies to watch out for your identity, and to tell you if they see something wrong.
HIPAA - the Health Information Portability and Accountability Act
For medical identity theft, HIPAA is the principle law geared to protect consumers. This law is focused on your health information, who has access to it, and how it can be used.
Identity Theft: What to Do After a Zombie Steals Your Wallet or Purse
If zombies steal your wallet or purse, you may have bigger worries than getting eaten. They may decide they want to be you instead…
Trusted Advisors – Who Do You Trust?
Recent developments at AUL bring our trusted advisors back into the spotlight - who do you trust?
Medicare and Medical Identity Theft
Centers for Medicare and Medicaid Services (CMS) know having your SSN on your Medicare card is a threat to your identity. Now they are looking at a fix...
Identity Theft and the 2012 Election
Phone scams like vote by phone or vote by text
HIPAA Loopholes Expose Your Medical Information
The move towards digitizing medical information is a natural extension of the information age that we live in today. Many politicians (as well as consumers) are unaware of the risks involved.
Getting an Identity Theft Police Report
Reporting identity theft to the police is the first step in recovering if you are a victim. There are some specific issues you want to be aware of when you are trying to get an identity theft police report, though.
Identity Theft – What to Do if You’re a Victim of Identity Theft
Statistics the past few years say that the chances of being a victim of identity theft are rapidly on the rise. It’s just as important to know what to do when if happens to you as it is to know how to prevent identity theft, or at least reduce your risk of being a victim.
Responding to Identity Theft - Hoosier Attorney General Steps Up
Indiana's Attorney General has set up an identity theft response site specifically designed to help victims quickly respond when the worst happens to them.
The Need for Cash - Prepping or Identity Theft
Identity Theft - Do I Really Need a Lawyer?
Victims of identity theft seldom use an attorney, but in many situations, you'll need a lawyer to nafigate the red tape and minefields.
The Federal Trade Commission – Help for Identity Theft Victims
If you are an identity theft victim, you will end up talking with someone in the FTC. But they do more than collect information – they help consumers fight back against identity theft.
Links Lead You Astray
All phishing emails have one thing in common: links that don’t lead where they appear to. Check all links in suspicious emails to make sure they're legitimate. Page 4.
Regular Maintenance Claims
A very common tactic that phishers use is telling email recipients that ‘regular maintenance’ turned up an account error of some type. Don’t fall for this. Page 5.
Protecting Your Identity When You Are Traveling
When you are away from home, your risk of personally compromising your identity is far greater. The reason for this is simple: when you’re traveling you meet more people than when you are at home. Here are some key points to help you protect your identity when you’re traveling.
Passwords are the “key” to our digital information – we use them to lock our email, websites we log into, even our smartphones and home security systems. Safe password practices can go a long way to protecting our personal information, and helping protect us from identity theft.
Protecting Your Identity at Home
Our risks of identity theft are smallest at home, but shredding our personal information and protecting ourselves from family and friends has become a necessity in today’s society.
National Protect Your Identity Week
The National Foundation for Credit Counseling (NFCC) is having their 4th annual National Protect Your Identity Week from October 16th through the 22nd. In the spirit of consumer education program, your Guide is pleased to present this short series of articles designed to bring you up to speed quickly on the state of identity theft today.
Tips for Facebook and Other Social Media
Social media sites like Facebook are a great place to stay connected with friends and family, but they are also a tool identity thieves (and other criminals) use to find out all sorts of information about potential victims.
Monitoring Your Credit
Monitoring your credit is the easiest way to stay on top of your identity. It's easy enough to get your free credit report, but there are many companies that try to trick you into enrolling in a credit monitoring program by saying they will give you one.
Protect Your Identity Week
Each year, Protect Your Identity Week rolls out across the country, amid free shredding parties at office buildings and seminars across the land. This is a good time to review what has been at the top of the stack for the past year.
Identity Theft Misinformation - What You Don’t Know About Identity Theft
Sometimes thinking you know something you don’t can have a big impact on your life. This is usually the case when it comes to identity theft, because there has been a lot of misinformation circulated over the past several years.
Identity Theft Protection Programs
If you’re considering an identity theft protection program like many consumers today, it’s probably more important to know what it won’t do, than what it will.
Protect Your Rights - Asking the Right Questions
If you’re interested in protecting your rights as a customer or client, it’s important to know the right questions to ask. Businesses are usually glad to make sure they address your concerns.
Once bit.ly, Twice Shy
URL shortening services have quickly become a real problem for Facebook users. You never know what might happen if you just click a link…
Protecting Yourself with Your Smartphone – 3G, 4G and Identity Theft
Now that the cell phone companies are marketing 3G and 4G capable “smartphones” like the Droid, Blackberry and iPhone, identity thieves are targeting these more heavily.
World of Warcraft, Authenticators, and Identity Theft
It’s easy enough to protect a video game from hackers, subscribers to World of Warcraft (WoW) use an authenticator to keep their account safe. Why isn’t this technology being used to protect our bank accounts?
Who Commits Identity Theft – Trusted Advisors
We have trusted advisors to guide us through life’s complications, but what can we expect if it is one of our trusted advisors who commits identity theft?
Identity Theft and Cell Phone Safety
Social media like Facebook and Twitter are just a couple of places you must think about when looking at your cell phone security. But cell phone safety doesn’t end with social networking…
Identity Theft – Taxes and Your Identity
Tax time is big money for tax preparation services, like H&R Block. But the IRS will not give you a tax refund if they have already processed one this year in your name. And sometime, the culprit is an identity thief working for the tax service…
Tips for e-Filing your Taxes– Identity Theft and e-Filing
Filing tax returns electronically (“e-filing”) can get your tax refund back to you in a matter of a couple of weeks. But there are some things you will want to know before you e-file your taxes.
Cell Phones - Finsphere’s PinPoint Verifies Your Identity by Cell
Finsphere takes a common-sense approach with existing technology to offer “instant” notification for your credit cards, debit cards… all of your finances.
Understanding Data Breaches
You've heard the term weekly for the past few years - some company has a data breach and has lost a gazillion records. But what, exactly, is a data breach? How does it happen, and what does it mean to you when you are concerned about identity theft?
Who Commits Identity Theft
If you want to prevent identity theft, it’s important to know how identity theft happens, what information to protect, and who commits identity theft. Our friends, family, and trusted advisors are often more dangerous than identity theft rings.
Types of Identity Theft: Part II
Criminal identity theft can be one of the most difficult problems to take care of for an identity theft victim. And there are even special considerations when it comes to our children’s identity, or if we have a business which are rarely if ever talked about.
Types of Identity Theft: Part I
Although most of us think about money when we hear the words “identity theft”, financial identity theft is less of a concern than social security identity theft – and medical identity theft is often playing with your life… literally.
A Brief History of Identity Theft
The history of identity theft goes back quite some time, there is even an account of it in the Bible. But the more recent history of identity theft can be very telling about where we are heading.
The "New" Type of Identity Theft - Insurance Identity Theft
Insurance identity theft can create issues in healthcare and finances. For many victims, the problem only starts there - the real impact is in future insurability.
How We Think About Identity Theft
About.com Guides try to keep their information as updated as possible, and sometimes that means changing information. For the purposes of the identity theft pages, identifying a new type of identity theft means changes in how we think about identity theft, and how it impacts our lives.
Public Sharing You Probably Don't Know About
From RFID chips in your credit cards, to social networking sites, information you make public can be used in ways you never even considered.
Collusion: Who's Creating Your Digital Profile?
One piece of the online privacy puzzle is focused on the digital profile created by companies that track you for marketing purposes. But this can also determine what information you see.
Criminal Identity Theft – How Criminal Identity Theft can Take Your Livelihood
Criminal identity theft happens when someone commits crimes in your name. Often, the victim’s life is utterly ruined, especially when child porn is found on his computer.
Warning: Identity Thieves Want Your Home
Identity thieves are interested in your identity for what they can gain from it. When they can access your mortgage or the deed to your home, that can be literally the roof over your head. Your learn what the top mortgage scams are so that you can protect yourself from criminals that would use your information to steal your home.
Identity Theft Glossary
The crimes, protection and recovery methods, and prevention strategies of identity theft often come with some hard to decipher terms. Don't get lost in the jargon. Use these glossary items to demystify the terminology surrounding identity theft.
Identity Theft: Real Life Stories
Identity theft happens to real people. Here are real life stories from people who have been victimized by this crime.
Identity Theft 101
Everyone needs to understand the basics of identity theft. Identity Theft 101 contains articles that explain the 'who, what, when, and why' of stolen identities. Use this information to increase your understanding of threats presented by identity theft.
Legislative ID Theft Considerations
Laws protect you if your identity is stolen. But there is also legislation that lays some responsibility for protecting your identity at your own feet. Know the legislative considerations that help you protect your identity or recover it if it's stolen.
Identity Theft Prevention Practices
Protecting your identity is a full-time job. Learn how to secure your personal information and lock down your personal identity. Prevention practices include securing your personal and financial information and knowing when you need identity theft insurance.
Recovering Your Identity
Even if you've been diligent about protecting your identity sometimes the unthinkable happens. When it does, you need to know how to recover your good name. Follow the theft trail, reclaim your personal and financial information, repair damages to your reputation, and even deal with the emotional consequences of identity theft using the information here.
Once your identity has been stolen, you run the risk of it happening over and over again, by the same criminal. Learn how to recognize and protect against recurring impersonation. And if you've already been victimized, learn how to stop recurrent identity theft from happening again.
Reporting Identity Theft
When you're recovering your identity, it's hard to know what to do first. Contacting the right agencies, as quickly as possible makes all the difference when it comes to stopping criminals. Learn who to contact and how to reach the people and agencies that can help you recover your identity.
Identity Theft Resources
Protecting or recovering your identity is no easy task. It requires keeping track of information, following up with all the right agencies if your identity is stolen. Tracking your personal information and staying on top of the risks requires diligent work and keeping up with the latest in magazines, books, worksheets, products, and online resources. These resources help you protect yourself.
Identity Theft Methods
Identity theft happens when you least expect it. Learn how identities are stolen online and in the physical world. Once you can spot the risks to your personal information, it's much easier to protect your identity.
Identity Theft Guest Authors
Identity Theft Guest Authors
- By Category
An index of categories in the
Identity Theft - What You Need to Know to Protect Yourself from Identity Theft
Free expert insight into your risk of identity theft. Learn how to protect yourself from identity theft, and get advice on how to fix the problem if it happens to you.Moderated forum available for your questions.
Identity Theft "Baseline"
Glossary: Identity Baseline. Identity Theft.
Recent (and upcoming) laws look toward protecting your personal information to help fight identity theft. A
Look at the Email Address
The email address of a phishing email won't match who the sender is supposed to be. Page 2.
Beware the Urgent Ploy
Phishers use any means necessary to get you to respond, and that includes marking email messages Urgent. Page 3.
The Protection Claim
Another trick that phishers use is to play on your sense of vulnerability by requesting account confirmation to prevent crimes from happening. Confirming your account means providing all of the identifying information that a criminal needs to gain control of the count. Just don't do it. Call the creditor or bank instead. Page 6.
Can You Spell Criminal?
Phishing emails often contain misspellings and punctuation errors. Be on the lookout for these errors because they are sure indicators that an amateur is trying to steal your identity. Page 7.
Vacation Time: Protecting Yourself From Identity Theft
Vacation should be a time to relax and enjoy yourself, but it can turn into an identity theft nightmare if you're not careful. Learn how to protect your identity while you're on vacation.. Page 2.
Leveling the Playing Field
The business perspective on RFID, identity theft, and data security laws. Page 2.
Product Review: TrustedID. Identity Theft.
Seniors: Protecting Yourself From Identity Theft
Seniors make attractive identity theft targets because they have life-long credit worthiness, retirements funds, and can be too trusting. If you're a senior, learn how to protect your identity before someone steals your life's work. Page 2.
Product Review: ITAC Sentinel. Identity Theft.
Product Review: IDWatchdog. Identity Theft.
Steps to Protect Your Mail
Your mailbox is one of the riskiest places for your identity. These tips help you to protect your mail from the thieves that would use it to steal your identity. Page 2.
Identity Theft - How It Happens
When you get your personal information to a company or business, your safety depends almost entirely on their policies and procedures. Page 2.
College Identity Theft: A Growing Problem
College students are at high risk for identity theft. To protect themselves, they need to understand what identity theft is, where they are at risk, and what steps to take if they suspect identity theft. All of that information is included in this article. Page 2.
Medical Identity Theft
Money is the least of your worries if you've had a medical identity theft. Getting the wrong alergies or blood-type in your medical record can yield deadly results. Information shared through the Medical Information Bureau (MIB) means once your medical information is digital, anyone can get it, and (worse) it can get the wrong information into the hands of your doctor. And fixing medical identity theft is never easy.
Dealing With Identity Theft
Recovering from identity theft is often a long, frustrating process. This section deals with what to do when it happens to you.
Recovering from Identity Theft: Consumers' Rights
It's frightening to realize that your identity has been stolen. But the sooner you realize it, you can begin to repair the damages. Before you even start the repair process, however, you need to understand your rights as a consumer. This article explains them.
Fixing Your Credit Report After Identity Theft
Identity theft usually hits victims where it hurts most: in the wallet. If you've been victimized by identity theft, you want to clean the mess up quickly. This article walks you through the basics of fixing your credit report after identity theft.
How to Recover Your Identity After Identity Theft
It's scary when identity theft happens. Your first instinct is to panic. But you shouldn't. Instead, begin immediately to put your identity back together following these steps.
Identity Theft: Dealing With Credit Card Companies
When identity theft strikes, it's not uncommon for the identity thief to get credit in the victim's name. It can be a slow process cleaning up the mess, often taking years. Find out what you can do, and how to start fixing the problem today.
EFTA - The Electronic Funds Transfer Act
When an identity thief gets your debit card of finds a way into your bank account, you will be fighting with the bank to get your hard-earned money back. The Electronic Funds Transfer Act is the law your bank will most follow as you try to get your cash back.
Asking the Right Questions
Identity theft has forced us to redefine how we think of
Identity Theft and Legal Help
Most people are a little intimidated by lawyers, but when you look to protecting yourself and your family from identity theft, having access to legal help can be a critical part of fixing your problems.
5 Way to Respond to a Data Breach
More than 167 data breaches were disclosed during the first quarter of 2008. Learn how to respond if your data is compromised by a company or agency.
Identity Theft - Proofpoint's Top Privacy Issues for 2011
Looking forward to the next year, Proofpoint fingers mobile GPS location information and social media sites such as Facebook to be bigger concerns.
Kroll Predictions for 2011
Brian Lapidus, Chief Operations Officer for Kroll, weighs in on data security trends for 2011.
Mac McMillian, CISM
Mac McMillan - Founder and President of CynergisTek
3 Lessons Regarding Medical Identity Theft
Guest author Mac McMillan gives us an insiders view of the problems surrounding medical identity theft, what it is, and how it needs to be handled. Companies that must comply with HIPAA and Red Flags will be especially interested in what he has to say.
DATA – Data Breach Notification Law Will Change Business Processes
HR 2221, the Data Accountability and Trust Act (DATA) is the hot-topic in identity theft law. Officially the law is a data breach, or data privacy law, but look for the FTC to put this in the same category.
Identity Theft Issues for 2011
Protecting yourself from identity theft will be harder and harder as technology moves forward. Some issues will need to be addressed to protect us in 2011.
Social Security Identity Theft a Growing Concern – Consumer Sentinel Network Identity Theft Report for 2010
The Consumer Sentinel Network (CSN) Data Book was released in March. This contains the identity theft report that will shape the way the issue is addressed over the next year.
Medical Identity Theft - What Do the Experts Say
Providing medical information electronically creates a problem for health care providers. How do they make critical information available while keeping our private information safe? Experts recently sounded off about the risks, and what's being done to protect their patients from this threat.
Identity Theft - Stolen Social Security Numbers and Identity Theft
If someone uses a stolen social security number to work in the US illegally, guess who gets the tax bill? Even though you've told the Social Security Administration about the problem. The largest group of offenders are
Identity Theft Laws - HIPAA and FACTA
Recent (and upcoming) identity theft laws look toward protecting your personal information.
Industrial Printers and Identity Theft
Businesses scan, print, copy, and fax information all the time. Who would have suspected that the office printer they use is really an identity thief's Trojan horse?
What is Identity Theft?
This basic explanation of identity theft details why criminals steal identities, who those thieves are, and how the crime is committed. Readers are reminded to remain constantly vigilant about protecting their identities.
Your Risky Mailbox: Identity Theft 101
The most commonly used means of identity theft in the real world is mail theft and redirection. This article explains the crime and provides tips for protecting your mail and your identity.
Keycards and Identity Theft
One common question of identity theft experts has to do with how much information is stored on the keycards collected on vacation. Many believe there's even a connection between their hotel room keycard and their bank account. Is it true, or are we just being paranoid?
Criminal Identity Theft
You don't have to do something wrong to run afoul of the legal system. The Identity Theft Resource Center reported 56% of the identity theft victims they talked with reported the impostor used their information when they were arrested, booked, or arraigned. One third said there were criminal convictions in their name as a result of this, while still more found warrants in their name.
Financial Identity Theft
Identity theft can have deep and long-term effects on your life, but when someone digs into your wallet for your bank or credit card, it can send you in a tailspin.
Identity Theft - How Identity Theft Happens
How identity theft happens may include a combination of low and high tech methods, from simple phone scams to data breach.
ATM Cards – Your ATM Card and Identity Theft
Knowing the difference between your ATM card and credit card can save you a lot of headaches if you become a victim of identity theft. Although there are no guarantees, a few precautions can go a long way to help you protect your money from
Identity Theft and Phishing – Forwarding Email Can Help Phishing Efforts Lead to Identity Theft
Forwarding a series of pretty pictures or an inspirational message in the e-mail to your friends might lead to identity theft. Phishing
Identity Theft and Privacy – Protect Your Privacy by Protecting Personal Information
Identity theft relies on your personal information. How your personal information is handled, though, is a matter of law and how you protect your privacy.
Identity Theft – a Risk of Doing Business
Having customers creates special problems, from customer service, loss prevention. If your business is working with some sort of product or service, then it's a good idea to take a look at the different ways identity theft can impact your business.
Identity Theft Affects Small Businesses, Too
Small businesses often believe they're too small to interest identity thieves, but they're wrong. Identity thieves have an intense interest in small businesses as Jennifer and Rick learned when their small business identity was stolen by a check forgery ring dealing in gray market goods.
College Identity Theft: A Growing Problem
College students are at high risk for identity theft. To protect themselves, they need to understand what identity theft is, where they are at risk, and what steps to take if they suspect identity theft. All of that information is included in this article.
Reporting Identity Theft 101
Identity theft happens to even those who protect their identities closely. But when it happens, you want to report it as quickly as possible to limit your liability. Use these steps to quickly report suspected identity theft.
Stolen Wallet or Purse - What to Do After Your Wallet or Purse Is Stolen
Many cases of identity theft start with a lost wallet or purse. Taking the right actions (and taking them quickly) can help protect you from that. Find out what you can do now.
Identity Theft Basics
Understanding the basics of identity theft, how it happens, and how to protect yourself
identity theft – business owner identity theft
Technically speaking, a business can't be the victim of identity theft. But if you own a business, you should know that an identity theft that happens to you can close your doors for good.
Business Identity Theft: Your Risks from Employees
Most business owners understand there are risks involved with hiring a new employee. The new landscape created by identity theft and the potential of data breach can be a minefield if proper steps are not taken early on.
Identity Theft and Your Federal Tax ID Number
The strangest thing about identity theft is that you don't have to be a person to have it happen. Corporate identity theft (or business identity theft) is a very real concern, whether you are a mega corporation, a mom-and-pop shop, or just run a home-based business.
Business Identity Theft - Overview
Statistics say that 90% of all businesses fail during the first five years. Of the 10% that survive, 90% of those fail during the next five years. This is most often because the business owner had not taken into consideration factors that could ruin public perception, or impact his company directly.
Identity Theft – Just Say Something
When consumers are aware of how their personal information is being handled, it can be easy enough to just say something to the right person and make changes.
Identity Theft and Your Kids
Watching out for your own identity can be tough, but when you think about your risks where your kids are concerned, there are a couple of things that need to be considered: what information they have, and who has their information.
Tax Time Identity Theft - How to Recognize a Tax Time Scam or Phishing Email
Tax time is a stressful time for most people. But identity theft can take stress to a new level. Tax time scams are common and growing in popularity. Learn how to spot a tax scam, and protect yourself from identity theft at tax time.
How to Get Your Free Online Credit Report
Internet sites like FreeCreditReport.com say they will let you look at your personal credit report free, but may only show you one credit report. If you want to get your credit report free from all three credit reporting agencies, the best site is AnnualCreditReport.com, the governments gateway to watching your credit reports.
Vacation Time: Protecting Yourself From Identity Theft
Vacation should be a time to relax and enjoy yourself, but it can turn into an identity theft nightmare if you're not careful. Learn how to protect your identity while you're on vacation.
What Personal Information Should You Protect?
You're told all the time to protect your personal information, but do you know what to protect? What information is it that identity thieves are after? And is some information more valuable than others? Find out what personal information thieves want most in this article.
Identity Theft - Protect Yourself from Identity Theft
Although it's nearly impossible to stop, there are things you can do to help protect yourself from identity theft. Here are some recommendations by experts in identity theft.
Biometric Identification and Identity Theft
Some experts are calling
Vacation Identity Theft
When we're going away on vacation we want to leave as much of
Passwords – Identity Theft and Your Passwords
We use the internet for everything - online shopping, email, even managing our bank account - and we use passwords for everything. One key to protecting yourself form identity theft is to have good passwords. Here's some tips to help make killer passwords that will stop identity thieves in their tracks.
Prepaid Debit Cards – Using a Prepaid Card to Protect Against Identity Theft
Prepaid (or reloadable) debit cards are a clever way to protect your money, and shop online securely, if you use them properly.
iWallet – Biometric Wallet Protects Your Information
The latest high-tech idea, the iWallet, combines Bluetooth technology and biometric identification to keep your personal information safe and sound.
IDTheft - High-Tech Identity Theft Protection
Identity theft has already touched the lives of 10% of the American population, and shows no signs of slowing. The high-tech markets are paying attention, and now offer several new solutions that may protect us through the 21st century.
Identity Theft – What Is Your Risk of Identity Theft
Knowing what information an identity thief is after can help you protect yourself from identity theft.
Who Commits Identity Theft – Friends and Family
We usually trust family and friends to look out for us, but what can we expect if it is someone close to us who commits identity theft?
Who Commits Identity Theft – Organized Identity Theft
Because of the random nature, organized identity theft can be the most difficult to prepare for, or respond to. If you are a victim of organized identity theft, or if it is an identity theft ring who commits identity theft affecting you, be ready for anything.
Identity Theft Insurance - Questions for Your Insurance Agent
Identity theft insurance is what many Americans have to protect themselves from identity theft. But they sometimes find that what their insurance agent tells them, and what they actually have are completely different things.
Credit Card Protection Basics
Credit card fraud and identity theft are not the same crimes. But you still need to protect yourself from credit card fraud. Learn how in this article.
Natural Disasters and Identity Theft - Protect Your Identity During a Natural Disaster
Identity thieves never take a break. They're always looking for the next opportunity and natural disasters, like hurricanes, tornadoes, and earthquakes offer lots of opportunity. Learn how to protect your identity in the wake of a natural disaster
Five Tips for Online Shopping Safety
The majority of identity theft takes place in the real world, away from the Internet. But the Internet is still a commonly used tool in identity theft, and Internet shopping is one area in which you are at risk. Learn online shopping safety tips to help protect your identity and your credit.
Protect Your Home from Identity Theft and Mortgage Fraud
Mortgage fraud is often one of the results of identity theft. Learn how to protect yourself from mortgage fraud and prevent criminals from stealing your home right out from under you.
Three Tips for Keeping Your Wallet or Purse Safe From Identity Thieves
A stolen wallet or purse can mean more than just losing your cash and credit cards. It can also mean that your identity is at risk. Learn how to protect belongings and prevent identity theft
Seniors: Protecting Yourself From Identity Theft
Seniors make attractive identity theft targets because they have life-long credit worthiness, retirements funds, and can be too trusting. If you're a senior, learn how to protect your identity before someone steals your life's work.
Protect Your Computer from Spyware
Spyware is one of the most prevalent methods that identity thieves use to collect the information needed to steal your identity. Learn how to recognize and protect your computer from spyware threats.
Credit Reports: How to Monitor Your Credit Report
Your credit report is center of your financial world. It's also the main target for identity theft. Learn how to monitor your credit report and keep your identity safe from identity theft.
Preventing Identity Theft
Identity theft happens to about 8 million people each year in the US. The best way to protect yourself is to know how identity theft happens. Learn what signs to look for and the best methods for preventing identity theft.
Knowing Which Mail to Shred
Postal mail is one of the most used methods of identity theft. Learn what mail puts you at risk, and then reduce the risk by shredding it.
How to Keep Your Identity Safe From Your Social Network
The phenomenon of social networks took the business world by surprise. But people are social by nature, so it's natural for them to want to participate in a social network. It's also natural for identity thieves to go where the information is, and people may be unknowingly placing themselves at risk with the information they include on social networking profiles. Learn what personal information not to include on your social networking profile in this article.
How to Protect your Identity: 8 Methods of Identity Theft Protection
Identity theft is a common crime that affects everyone. Learn how to protect yourself from mortgage scams, mail fraud, credit fraud, and other identity crimes.
Spear Phishing: Identity Theft’s New Black
Phishing is already a mainstay in identity theft attacks, but now a new method of attack is emerging. Spear phishing targets individuals and can be far more costly than its predecessor. Learn what spear phishing is and how to protect yourself.
Identity Theft - Identity Theft Protection Programs
Many companies make bold claims that they will
RFID to the Rescue
Radio Frequency IDentification (RFID) is making bold promises in the fight against identity theft.
Identity Theft Scams - Banking and Phishing
Phishing scams are identity theft scams that try to trick you out of your personal information - usually so they can create bank accounts or get credit cards in your name.
Preventing Identity Theft
It is impossible to prevent identity theft. However, you can take some precautions to make yourself less likely to be a victim. Protecting yourself and family from identity theft may mean taking an extra minute or two at a restaurant or asking a couple of questions when you're buying something at a store, but avoiding the problem from the start has always proven easier than trying to recover once something has gone wrong.
Identity Theft Employment Scams
Unemployment rates keep rising. But identity thieves don't care if you're out of work. They'll take advantage of you anyway with employment scams designed to steal your personal information. Learn how to protect yourself from identity theft employment scams.
Electronic Gadgets Lead to Identity Theft
Your cell phone, iPod, and GPS system might be putting you at risk for identity theft. These gadgets can be used by identity thieves to gain access to your personal information. Learn how to protect your identity by securing your personal gadgets.
Four Little Known Identity Theft Methods
Identity theft starts in many different places. Some of those places are completely obvious, like your mail box and online, but there are other identity theft risks that you might not be so familiar with. Learn more about little known identity theft risks in this article.
Definition of Credit Freeze
A credit freeze, or credit report freeze, locks down a consumer's credit report so no new credit accounts can be activated without the proper authorization from the consumer.
Definition of Email Spoofing
Email spoofing is a technique that hackers use to send fraudulent emails and is often used as a tool to collect information need for identity theft activities.
Definition of Fraud Alert
A fraud alert is used to alert potential lenders that your identity may have been compromised by identity theft.
Definition of Identity Theft Enforcement and Restitution Act
The Identity Theft Enforcement and Restitution Act can help consumers recoup the costs associated with having their identity stolen. Currently, this act is still pending approval of the President.
Definition of Nigerian Letter Scam
The Nigerian Letter Scam is one that's been around for a while. The advent of the Internet has changed the way the Nigerian Letter Scam is delivered, but it's still the same scam.
Definition of Synthetic Identity Fraud
Synthetic identity fraud occurs when an identity thief alters your personal information for the purpose of using it to gain access to information or money based on your credit history.
Definition of Gray Market Goods
Gray market goods are items that are purchased by identity thieves, usually using fraudulent credit accounts, and then resold for a profit.
Identity Theft Restoration Programs
Glossary: Identity Theft Restoration Program
Identity Theft Resolution Service
Glossary: Identity Theft Resolution Service
Identity Theft Monitoring Service
Glossary: Identity Theft Monitoring Service
Identity Theft Reimbursement Programs
Glossary: Identity Theft Reimbursement Program
Identity Theft Performance Guarantee
Glossary: Identity Theft Performance Guarantee
Identity Theft - Consumer Reporting Agency
Glossary: Consumer Reporting Agency
Identity Theft - Data Breach Notification Laws
Glossary: Data Breach Notification Laws
Definition of Web Page Spoofing
Web page spoofing is just one type of deception that hackers use to trick people into providing personal information that can be used for the purposes of identity theft.
Recognize Identity Theft Scams - Spotting a Phishing Email
It's estimated that 75-100 million phishing emails are sent out each day. These emails are designed to capture your personal and financial information so that criminals can steal your identity. Learn how spot a phishing emails so that you can protect yourself from this threat.
Definition of Social Engineering
The practice of deceiving someone, either in person, over the phone, or using a computer, with the express intent of breaching some level of security either personal or professional.
Common Identity Theft Scams
The risk of identity theft presents itself at every turn. Learn what some of the most common identity theft scams are, and how to prevent them.
Identity Theft Legal Help
Glossary: Identity Theft Legal Help
Contact Your State Bar Association
Links for all 50 state bar associations
Although not an exhaustive list of agencies, this article will give identity theft victims a launchpad to getting help with identity theft.
Reader Stories: Been There, Done That
Knowledge is power. If you've been a victim of identity theft, share your insights with us.
Definition of Spoofing
Spoofing is a broad-ranging term that essentially means to pretend to be something or someone that you're not. It is, however, much more complicated.
Definition of Vishing
Vishing uses social engineering and phishing techniques to steal people's identities using Voice over Internet Protocol (VoIP) phone lines.
Identity Theft Issues for 2011
Protecting yourself from identity theft will be harder and harder as technology moves forward. Some issues will need to be addressed to protect us in 2011.
Blog March 2006 Archive
Identity Theft, - StepBySteps
An index of StepBySteps for the Identity Theft guide site.