There are no shortage of ways identity thieves have to scam you out of your credit, cash and identity. Here are 10 more ways criminals pounce on their victims:
- Mailbox raiding. Moments after the postal carrier drops off your mail, a crackhead comes by and steals it.
- Dumpster diving. You know that mortgage company that you did business with before it went out of business? Well, the head idiot tossed all your records and his other clients’ personal information into the dumpster.
- Trash collecting. While similar to dumpster diving, it is not—because you are in control. Ask yourself this: “If someone stole my trash, would I be upset because my identity could be stolen?” If you say yes, then you should shred all your discarded papers.
- Caller ID spoofing. Phone fraud is a big deal. When scammers call you and pretend to be someone else, they may spoof caller ID to make you believe the source is a legitimate entity like the police, government agency, bank or lottery.
- Email phishing. Getting an email from your bank to update your account or simply access your statement is dangerous. Just delete it. Access your account via your browser’s favorites or password manager.
- Nigerian 419 scam. When General Motumboo Bumbooby emails you because there’s a trunk of money waiting from a dead relative, delete.
- ATM skimming. Anytime you use an ATM, your bank card is at risk. Look for external skimming devices and cover up the keypad with your other hand as you type your PIN.
- Credit card skimming. Handing your card over to a store clerk or waiter puts your digits at risk. Don’t worry about it, but diligently check your statements, frequently.
- Spyware. Remember that stupid weather toolbar you downloaded that wreaked havoc on your PC with all those popups? There’s a good chance spyware was also installed, letting a bad guy watch your every move.
10. Hacking. Because you don’t update your antivirus, your PC is vulnerable to remote-access Trojans that allow a criminal backdoor access to your My Documents folder.
ROBERT SICILIANO, CEO of IDTheftSecurity.com is fiercely committed to informing, educating, and empowering Americans so they can be protected from violence and crime in the physical and virtual worlds. His "tell it like it is" style is sought after by major media outlets, executives in the C-Suite of leading corporations, meeting planners, and community leaders to get the straight talk they need to stay safe in a world in which physical and virtual crime is commonplace. Siciliano is accessible, real, professional, and ready to weigh in and comment at a moment's notice on breaking news.
- Tips to destroy and shred
You can’t be too neurotic about shredding sensitive documents to smithereens. For example, some people make a career out of “dumpster diving,” digging through trash in search of bank account information, credit card preapprovals, medical bills, mortgage statements, etc., and then they commit fraud, including creating new accounts with the found information—accounts in the victim’s
- Top 5 Vishing Techniques
“Vishing” occurs when criminals call victims on the phone and attempt to lure them into divulging personal information that can be used to commit identity theft. The name comes from “voice,” and “phishing,” which is, of course, the use of spoofed emails designed to trick targets into clicking malicious links. Instead of email, vishing generally relies
- Protect Yourself from Vishing
“Vishing” occurs when criminals cold-call victims and attempt to persuade them to divulge personal information over the phone. These scammers are generally after credit card numbers and personal identifying information, which can then be used to commit financial theft. Vishing can occur both on your landline phone or via your mobile phone. The term is a
- Top 3 Social Engineering Scams
Think about hackers breaking into accounts. If you think they need top-notch computer skills, you would be wrong. These days, instead of requiring skills behind a keyboard, hackers generally rely on strategy…specifically a strategy called social engineering. This means that hackers don’t have to be technical, but they DO have to be clever and crafty
- FTC: Tech Support Scams are baaaaack!
They’re back, and they’re scarier than fangy blood sucking ghosts: tech support scammers. They want to suck you dry of your last penny. A tech support scam may go as follows: You receive a call from someone informing you that your computer is infected with a really bad virus and needs prompt attention. The crook tells