Author Information
Joy Mali has 43 Published Articles

United States of America,
Not Required,
Not Required,
Not Required,
Not Required



How Identity Theft Happens?

Posted On : Mar-30-2011 | seen (853) times | Article Word Count : 473 |

To prevent identity theft, the first step would be to understand how it happens. The article encompasses some of the major strategies and vulnerabilities for fighting back or to protect your identity from hackers.
While new internet users are still asking “what is identity theft?” the crooks are operating in high gear!

Identity thieves steal your personal data because they want others to think that they are you, and the motive may be as simple as being able to buy something without paying for it. Your Social Security Number, personal information and bank account numbers are all a thief needs to commit identity theft. Hence, it wouldn't come as any surprise to find out that someone that you know has become a victim of identity theft as the issue is actually pretty widespread. To prevent identity theft, the first step would be to understand how it happens. Here are some of the major strategies and vulnerabilities for fighting back, because a theft happens every 2 seconds!

1.Inbox Identity Theft

Known as one of the easier pickings, an Inbox identity theft is the most common way to get personal information because an inbox often contains nearly every bit personal information, such as financial statements or bills, even before it gets into your hands. If you are in business, involved in online banking or shopping or have an account in social networking sites, your email address is going to be forged by spammers.

2.Social Networking Websites

We all are aware of the creeps and perverts that hang around the social networking sites like Facebook, Twitter, MySpace or Hi5. While the sites increase your friends circle, they may also increase your exposure to people who have less than friendly intentions. Too much information shared on a social networking site such as your address, phone number and full name can allow a stranger to stalk you, steal your identity or hack your computer.

3.Phishing Attack

A term that has become the talk of the internet world, “phishing” is an illegitimate e-mail made by the crooks that looks exactly like it is from a government agency or your bank. The e-mail claims that your bank or government agency needs to verify your account information “for your own protection.” If you receive such emails, it could be the identity thieves’ phishing for your identity. Do not click on links in emails; you’re suspicious, type the website URL directly into your web browser.

As the internet quickly grows and so does its users, it is important to be on the safe side. Sign up with an identity theft protection service to get complete protection from identity theft. These services monitor identity theft and provide enhanced protection from criminal identity theft by sending you alerts if too much information is public about you through Public Database Scanning, Social Security Number Scanning, Credit Card Scanning, Name & Address Scanning, Bank Account Number Scanning and every other activity that will protect your identity online.

Article Source : http://www.articleseen.com/Article_How Identity Theft Happens?_57664.aspx

Author Resource :
Keep a regular check for identity theft with MyID and get alerts when your online identity is at risk. MyID helps in identity theft protection in real time so that you can protect your financial privacy against any theft or fraud easily. Sign up now and protect your privacy instantly.

Keywords : Identity theft, identity theft protection, monitor identity theft, protect your privacy, protect financial privacy, protectio,

Category : Internet Business : Security

Bookmark and Share Print this Article Send to Friend