Identity theft
Updated: 05/06/2024 by Computer Hope
Identity theft or online identity theft is illegally obtaining personal information about someone else. Thieves try to obtain items like another's full name, maiden name, address, date of birth, social security number, passwords, phone number, e-mail, and credit card numbers. They may then use this information to access a bank account, e-mail, smartphones, identify themselves as you, or sell your information.
Tips on preventing identity theft
- When entering personal information on the Internet, ensure the connection is encrypted. A connection encrypted with HTTPS is usually indicated by a small lock icon in the address bar. For further information, see: How to protect yourself while on the Internet.
- When making purchases on the Internet, do not store your credit card or personal information on a site unless you plan on shopping there frequently.
- Make sure to have active and up-to-date spyware and antivirus protection programs.
- Never send confidential information over e-mail, as this medium is not encrypted.
- If your computer is stolen, see: What can I do if my computer or laptop was lost or stolen?
- When selecting answers to the secret questions (used to reset passwords), don't enter anything that others can discover online. For example, a common security question is, "What is your pet's name?" because a stranger might not know the answer. However, if you're constantly discussing your dog Fluffy on Facebook, an attacker could use this information to guess the answer and break into your account.
- If someone claiming to be from your bank or credit card company calls you about suspected fraudulent activity, don't divulge personal information. Identity thieves try to make you panic or worry, causing you to give them information you would normally not provide. If they ask for details like your birthdate, driver's license number, and previous addresses where you lived, that is a red flag. End the call immediately, and call your bank or credit card company to determine if there is any fraudulent activity.
- Similarly, be aware of fake e-mails and phishing attempts, requesting personal information or login information.
Blagging, Computer crime, Data theft, Dumpster diving, Ghosting, Identity, Phishing, Privacy, Security terms, Spyware, Theft