Identity Theft Sitemap - Page 3 2014-04-18
5 Way to Respond to a Data Breach
More than 167 data breaches were disclosed during the first quarter of 2008. Learn how to respond if your data is compromised by a company or agency.
Identity Theft Basics
Understanding the basics of identity theft, how it happens, and how to protect yourself
Knowing Which Mail to Shred
Postal mail is one of the most used methods of identity theft. Learn what mail puts you at risk, and then reduce the risk by shredding it.
How to Protect your Identity: 8 Methods of Identity Theft Protection
Identity theft is a common crime that affects everyone. Learn how to protect yourself from mortgage scams, mail fraud, credit fraud, and other identity crimes.
Preventing Identity Theft
It is impossible to prevent identity theft. However, you can take some precautions to make yourself less likely to be a victim. Protecting yourself and family from identity theft may mean taking an extra minute or two at a restaurant or asking a couple of questions when you're buying something at a store, but avoiding the problem from the start has always proven easier than trying to recover once something has gone wrong.
Four Little Known Identity Theft Methods
Identity theft starts in many different places. Some of those places are completely obvious, like your mail box and online, but there are other identity theft risks that you might not be so familiar with. Learn more about little known identity theft risks in this article.
Definition of Credit Freeze
A credit freeze, or credit report freeze, locks down a consumer's credit report so no new credit accounts can be activated without the proper authorization from the consumer.
Definition of Email Spoofing
Email spoofing is a technique that hackers use to send fraudulent emails and is often used as a tool to collect information need for identity theft activities.
Definition of Fraud Alert
A fraud alert is used to alert potential lenders that your identity may have been compromised by identity theft.
Definition of Identity Theft Enforcement and Restitution Act
The Identity Theft Enforcement and Restitution Act can help consumers recoup the costs associated with having their identity stolen. Currently, this act is still pending approval of the President.
Definition of Nigerian Letter Scam
The Nigerian Letter Scam is one that's been around for a while. The advent of the Internet has changed the way the Nigerian Letter Scam is delivered, but it's still the same scam.
Definition of Synthetic Identity Fraud
Synthetic identity fraud occurs when an identity thief alters your personal information for the purpose of using it to gain access to information or money based on your credit history.
Definition of Gray Market Goods
Gray market goods are items that are purchased by identity thieves, usually using fraudulent credit accounts, and then resold for a profit.
Identity Theft Restoration Programs
Glossary: Identity Theft Restoration Program
Identity Theft Resolution Service
Glossary: Identity Theft Resolution Service
Identity Theft Monitoring Service
Glossary: Identity Theft Monitoring Service
Identity Theft Reimbursement Programs
Glossary: Identity Theft Reimbursement Program
Identity Theft Performance Guarantee
Glossary: Identity Theft Performance Guarantee
Identity Theft - Consumer Reporting Agency
Glossary: Consumer Reporting Agency
Identity Theft - Data Breach Notification Laws
Glossary: Data Breach Notification Laws
Definition of Web Page Spoofing
Web page spoofing is just one type of deception that hackers use to trick people into providing personal information that can be used for the purposes of identity theft.
Recognize Identity Theft Scams - Spotting a Phishing Email
It's estimated that 75-100 million phishing emails are sent out each day. These emails are designed to capture your personal and financial information so that criminals can steal your identity. Learn how spot a phishing emails so that you can protect yourself from this threat.
Definition of Social Engineering
The practice of deceiving someone, either in person, over the phone, or using a computer, with the express intent of breaching some level of security either personal or professional.
Identity Theft Legal Help
Glossary: Identity Theft Legal Help
Reader Stories: Been There, Done That
Knowledge is power. If you've been a victim of identity theft, share your insights with us.
Definition of Spoofing
Spoofing is a broad-ranging term that essentially means to pretend to be something or someone that you're not. It is, however, much more complicated.
Definition of Vishing
Vishing uses social engineering and phishing techniques to steal people's identities using Voice over Internet Protocol (VoIP) phone lines.
Identity Theft Issues for 2011
Protecting yourself from identity theft will be harder and harder as technology moves forward. Some issues will need to be addressed to protect us in 2011.
Blog March 2006 Archive