1. Identity theft in the internet
كتبي ضياء محمد :المتدرب اسم
العديني إبراهيم المهندس :المقرر مدرب
2. What Is online identity theft?
Identity theft affects millions of people every
year and occurs when a fraudster steals your
identity—by gaining access to your personally
identifiable information (PII)—to commit
fraud. While ID theft can happen a number of
ways, online ID theft occurs when someone
steals your digital PII using scams like
planting malicious software on your
computer—as opposed to the old, simple
technique of, say, stealing your purse.
3. How online ID theft happens and
what you can do
As we share our personal information online via social media and other digital
formats, we may be putting that info at risk of falling into the wrong hands.
Fraudsters use high-tech and other ways to steal digital PII. Knowing what
these tactics are may help you protect yourself:
Phishing occurs when cybercriminals send emails purporting to be
from a financial institution or other trusted organization, trying to trick
you into opening attachments or clicking on links and providing your
PII. Ignore unsolicited emails and online requests for information. If
you want to visit, say, your bank’s website to provide information, type
in the URL rather than clicking on an emailed link.
Pharming occurs when your browser, compromised by a virus, is
hijacked without your knowledge. You type a legitimate website URL
into the address bar, but you’re redirected to a fake site that looks
legitimate. There, cybercriminals are able to collect any PII you may
type into the website.
Malicious software. Fraudsters may try to trick you into downloading
“malware” that can attack your computer and, possibly, reveal your
PII. Consider purchasing online security software for your computer,
and keep it—and your computer operating system software—up to
date.
Unsecure websites. Avoid online shopping and other activities on
websites that aren’t secure, and be cautious about the apps you use.
Make sure you use only official, secure websites with the “https:”
prefix—not “http:”.
4. Weak passwords used for both social and financial accounts can
leave you vulnerable. Strive to use unique, long, and strong passwords
for each of your accounts. And when possible, activate multi-factor
authentication, which requires you to enter both your log-in
credentials and a secret code sent to your smartphone or other device
before giving you access to your account.
Discarded computers and mobile devices that haven’t been wiped
of your PII can be another point of access for a thief.
Targeting children online. Kids can give away personal information
online without realizing it. Help protect your children online; be vigilant
in monitoring the information they share when using an Internet-
connected device.
We’ve all received emails saying we’ve won a too-good-to-be-true prize—
redeemed by providing our personal information. As with anything in life,
when something online seems too good to be true, it probably is. Don’t
respond to emails from someone you don’t know. Don’t click on unknown
links or attachments.
The bottom line? You can never be too careful when sharing your personal
information online.
Identity theft can happen to you
even if you’re careful
But what’s the first thing you need to do? To start, a fraudster could have
several pieces of your personally identifiable information (PII). This is unique,
sensitive information like your Social Security number that can enable
someone to commit more than one type of fraud in your name.
5. Using Information on the Internet
for Identity Theft
The outcome of identity theft is usually the same, regardless of how the thief
obtains your information. However, the Internet is providing new ways for
people to steal your personal information and to commit fraud. Thieves can
accomplish their goal several ways such as using Internet chat rooms and
spreading Trojan horses that drop key loggers on your computer to transmit
any passwords, usernames and credit card numbers you use on your
computer back to the thieves. Many online businesses today also store
personal information about customers and shoppers on websites, and this
provides another way for your personal information to be accessed, without
your permission or knowledge.
Additionally, email phishing is another way that thieves can attempt to gather
your personal information. Phishing emails falsely claim to be an established
legitimate enterprise in an attempt to scam you into surrendering private
information that will be used for identity theft. The email will direct you to
visit a website where you're asked to update personal information, such
as passwords and credit card, social security, and bank account numbers —
information the legitimate organization already has. The website, however, is
bogus and set up only to steal your information.
How to Protect Yourself: Minimize
the Risk
In offline transactions don't provide credit card numbers, financial account
numbers, and personal identifying information over the phone unless you
know the communication line is secure. Ideally, you should initiate the phone
conversation.
Lastly, there are recommended everyday practices, such as keeping an eye
on postal mail to ensure your bills are arriving when they should be, and
taking the time to properly dispose of paper documents that may contain
credit card numbers and other identifying personal information.
Remember: The more private and secure you keep your personal identifying
information, the less susceptible to identify theft you are.
6. Identity Theft
Identity theft is the illegal use of someone else’s personal information in order
to obtain money or credit. Identity theft can happen to anyone in any
location across the country.
Take simple steps to protect your online identity by:
Locking and password protecting your computer and cell phone.
Not sharing specific personal information online, such as your full name
or birthday.
Setting proper privacy settings on social networking sites.
Help Protect Your Family’s Identity
The more time that your children spend online, the more opportunities they
will have to share information about themselves. Talk to your children about
the information that they should never share without your permission,
including Social Security numbers and credit or debit card numbers.
Then, visit the FTC’s website to learn more about how to better protect
yourself and your family, and how to file a complaint.
Never share your password or account numbers over an e-mail or
instant message.
Do not follow links from e-mails when conducting financial
transactions; instead, enter the URL yourself.
Be wary of callers, pop-ups, websites, or e-mails asking for personal
information.
Look for “https” or a picture of a lock before purchasing from a website
or giving out information on that website.
Create secure passwords and change them often.
Never download software from a source you do not trust or open e-
mails or images from unfamiliar senders.
Install firewall, anti-spyware, and antivirus software, and update it often
File a report with law enforcement and notify creditors if thereis an incident
or a suspicion of identitytheft.
7. Prevention
Do not share account information with friends, familyor otherpeople.
Ensure youalways have effective and updated antivirus/antispyware
software running.
If possible, arrange for paperless bills and statements.
File sensitive documents securely, and shred thoseyou no longer need –
preferablywith a cross-cut shredder.
Never divulgeprivate information datain response to an email, text,letter or
phonecall unless you are certain that therequest is from a bona fide source.
Always beware of peoplelooking overyour shoulder when you are entering
private informationon a computer, smartphone/tabletorATM.