SlideShare una empresa de Scribd logo
1 de 8
Identity theft in the internet
‫كتبي‬ ‫ضياء‬ ‫محمد‬ :‫المتدرب‬ ‫اسم‬
‫العديني‬ ‫إبراهيم‬ ‫المهندس‬ :‫المقرر‬ ‫مدرب‬
What Is online identity theft?
Identity theft affects millions of people every
year and occurs when a fraudster steals your
identity—by gaining access to your personally
identifiable information (PII)—to commit
fraud. While ID theft can happen a number of
ways, online ID theft occurs when someone
steals your digital PII using scams like
planting malicious software on your
computer—as opposed to the old, simple
technique of, say, stealing your purse.
How online ID theft happens and
what you can do
As we share our personal information online via social media and other digital
formats, we may be putting that info at risk of falling into the wrong hands.
Fraudsters use high-tech and other ways to steal digital PII. Knowing what
these tactics are may help you protect yourself:
 Phishing occurs when cybercriminals send emails purporting to be
from a financial institution or other trusted organization, trying to trick
you into opening attachments or clicking on links and providing your
PII. Ignore unsolicited emails and online requests for information. If
you want to visit, say, your bank’s website to provide information, type
in the URL rather than clicking on an emailed link.
 Pharming occurs when your browser, compromised by a virus, is
hijacked without your knowledge. You type a legitimate website URL
into the address bar, but you’re redirected to a fake site that looks
legitimate. There, cybercriminals are able to collect any PII you may
type into the website.
 Malicious software. Fraudsters may try to trick you into downloading
“malware” that can attack your computer and, possibly, reveal your
PII. Consider purchasing online security software for your computer,
and keep it—and your computer operating system software—up to
date.
 Unsecure websites. Avoid online shopping and other activities on
websites that aren’t secure, and be cautious about the apps you use.
Make sure you use only official, secure websites with the “https:”
prefix—not “http:”.
 Weak passwords used for both social and financial accounts can
leave you vulnerable. Strive to use unique, long, and strong passwords
for each of your accounts. And when possible, activate multi-factor
authentication, which requires you to enter both your log-in
credentials and a secret code sent to your smartphone or other device
before giving you access to your account.
 Discarded computers and mobile devices that haven’t been wiped
of your PII can be another point of access for a thief.
 Targeting children online. Kids can give away personal information
online without realizing it. Help protect your children online; be vigilant
in monitoring the information they share when using an Internet-
connected device.
We’ve all received emails saying we’ve won a too-good-to-be-true prize—
redeemed by providing our personal information. As with anything in life,
when something online seems too good to be true, it probably is. Don’t
respond to emails from someone you don’t know. Don’t click on unknown
links or attachments.
The bottom line? You can never be too careful when sharing your personal
information online.
Identity theft can happen to you
even if you’re careful
But what’s the first thing you need to do? To start, a fraudster could have
several pieces of your personally identifiable information (PII). This is unique,
sensitive information like your Social Security number that can enable
someone to commit more than one type of fraud in your name.
Using Information on the Internet
for Identity Theft
The outcome of identity theft is usually the same, regardless of how the thief
obtains your information. However, the Internet is providing new ways for
people to steal your personal information and to commit fraud. Thieves can
accomplish their goal several ways such as using Internet chat rooms and
spreading Trojan horses that drop key loggers on your computer to transmit
any passwords, usernames and credit card numbers you use on your
computer back to the thieves. Many online businesses today also store
personal information about customers and shoppers on websites, and this
provides another way for your personal information to be accessed, without
your permission or knowledge.
Additionally, email phishing is another way that thieves can attempt to gather
your personal information. Phishing emails falsely claim to be an established
legitimate enterprise in an attempt to scam you into surrendering private
information that will be used for identity theft. The email will direct you to
visit a website where you're asked to update personal information, such
as passwords and credit card, social security, and bank account numbers —
information the legitimate organization already has. The website, however, is
bogus and set up only to steal your information.
How to Protect Yourself: Minimize
the Risk
In offline transactions don't provide credit card numbers, financial account
numbers, and personal identifying information over the phone unless you
know the communication line is secure. Ideally, you should initiate the phone
conversation.
Lastly, there are recommended everyday practices, such as keeping an eye
on postal mail to ensure your bills are arriving when they should be, and
taking the time to properly dispose of paper documents that may contain
credit card numbers and other identifying personal information.
Remember: The more private and secure you keep your personal identifying
information, the less susceptible to identify theft you are.
Identity Theft
Identity theft is the illegal use of someone else’s personal information in order
to obtain money or credit. Identity theft can happen to anyone in any
location across the country.
Take simple steps to protect your online identity by:
 Locking and password protecting your computer and cell phone.
 Not sharing specific personal information online, such as your full name
or birthday.
 Setting proper privacy settings on social networking sites.
Help Protect Your Family’s Identity
The more time that your children spend online, the more opportunities they
will have to share information about themselves. Talk to your children about
the information that they should never share without your permission,
including Social Security numbers and credit or debit card numbers.
Then, visit the FTC’s website to learn more about how to better protect
yourself and your family, and how to file a complaint.
 Never share your password or account numbers over an e-mail or
instant message.
 Do not follow links from e-mails when conducting financial
transactions; instead, enter the URL yourself.
 Be wary of callers, pop-ups, websites, or e-mails asking for personal
information.
 Look for “https” or a picture of a lock before purchasing from a website
or giving out information on that website.
 Create secure passwords and change them often.
 Never download software from a source you do not trust or open e-
mails or images from unfamiliar senders.
 Install firewall, anti-spyware, and antivirus software, and update it often
 File a report with law enforcement and notify creditors if thereis an incident
or a suspicion of identitytheft.
Prevention
 Do not share account information with friends, familyor otherpeople.
 Ensure youalways have effective and updated antivirus/antispyware
software running.
 If possible, arrange for paperless bills and statements.
 File sensitive documents securely, and shred thoseyou no longer need –
preferablywith a cross-cut shredder.
 Never divulgeprivate information datain response to an email, text,letter or
phonecall unless you are certain that therequest is from a bona fide source.
 Always beware of peoplelooking overyour shoulder when you are entering
private informationon a computer, smartphone/tabletorATM.
‫المراجع‬
-identity-online-resources-theft-identity-https://www.lifelock.com/learn
happens.html-it-how-is-it-what-theft
https://www.webopedia.com/DidYouKnow/Internet/identity_theft.asp
https://internetsafety101.org/identitytheft
identity/-gyourself/safeguardin-https://www.getsafeonline.org/protecting

Más contenido relacionado

La actualidad más candente (20)

Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Anti phishing
Anti phishingAnti phishing
Anti phishing
 
Introduction to phishing
Introduction to phishingIntroduction to phishing
Introduction to phishing
 
Phishing-Updated
Phishing-UpdatedPhishing-Updated
Phishing-Updated
 
Strategies to handle Phishing attacks
Strategies to handle Phishing attacksStrategies to handle Phishing attacks
Strategies to handle Phishing attacks
 
Phishing technology
Phishing technologyPhishing technology
Phishing technology
 
Identity theft
Identity theftIdentity theft
Identity theft
 
10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud
 
Internet use issues
Internet use issues Internet use issues
Internet use issues
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
Frauds and scams
Frauds and scamsFrauds and scams
Frauds and scams
 
Phishing
PhishingPhishing
Phishing
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Phishing
PhishingPhishing
Phishing
 
Intro phishing
Intro phishingIntro phishing
Intro phishing
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharming
 

Similar a Identity theft in the internet

Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptxAchu69
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Online Fraud and Identity Theft: Transact Safely - Symantec Corp. Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Online Fraud and Identity Theft: Transact Safely - Symantec Corp. mariotoronto
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2NetLockSmith
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15Naval OPSEC
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)aleeya91
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft- Mark - Fullbright
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxssuserb73103
 
W A2 Group P P
W A2  Group  P PW A2  Group  P P
W A2 Group P Ptawnygsu
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Ratmegg16
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pdjeelsonani003567
 

Similar a Identity theft in the internet (20)

Identity theft
Identity theftIdentity theft
Identity theft
 
Cyber safety.pptx
Cyber safety.pptxCyber safety.pptx
Cyber safety.pptx
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Online Fraud and Identity Theft: Transact Safely - Symantec Corp. Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
Online Fraud and Identity Theft: Transact Safely - Symantec Corp.
 
Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2Cybersecurity Awareness Posters - Set #2
Cybersecurity Awareness Posters - Set #2
 
Phishing
PhishingPhishing
Phishing
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
Ict Phishing (Present)
Ict   Phishing (Present)Ict   Phishing (Present)
Ict Phishing (Present)
 
You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
You Have the Power to Stop Identity Theft
You Have the Power to Stop Identity TheftYou Have the Power to Stop Identity Theft
You Have the Power to Stop Identity Theft
 
Unit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptxUnit 3 - Cyber Crime.pptx
Unit 3 - Cyber Crime.pptx
 
W A2 Group P P
W A2  Group  P PW A2  Group  P P
W A2 Group P P
 
What is Identity (ID) Theft ?
What is Identity (ID) Theft ?What is Identity (ID) Theft ?
What is Identity (ID) Theft ?
 
Phishing
PhishingPhishing
Phishing
 
Slideshow - Lil Rat
Slideshow - Lil RatSlideshow - Lil Rat
Slideshow - Lil Rat
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd
 
Internet fraud and identity theft
Internet fraud and identity theftInternet fraud and identity theft
Internet fraud and identity theft
 

Último

Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 

Último (20)

Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

Identity theft in the internet

  • 1. Identity theft in the internet ‫كتبي‬ ‫ضياء‬ ‫محمد‬ :‫المتدرب‬ ‫اسم‬ ‫العديني‬ ‫إبراهيم‬ ‫المهندس‬ :‫المقرر‬ ‫مدرب‬
  • 2. What Is online identity theft? Identity theft affects millions of people every year and occurs when a fraudster steals your identity—by gaining access to your personally identifiable information (PII)—to commit fraud. While ID theft can happen a number of ways, online ID theft occurs when someone steals your digital PII using scams like planting malicious software on your computer—as opposed to the old, simple technique of, say, stealing your purse.
  • 3. How online ID theft happens and what you can do As we share our personal information online via social media and other digital formats, we may be putting that info at risk of falling into the wrong hands. Fraudsters use high-tech and other ways to steal digital PII. Knowing what these tactics are may help you protect yourself:  Phishing occurs when cybercriminals send emails purporting to be from a financial institution or other trusted organization, trying to trick you into opening attachments or clicking on links and providing your PII. Ignore unsolicited emails and online requests for information. If you want to visit, say, your bank’s website to provide information, type in the URL rather than clicking on an emailed link.  Pharming occurs when your browser, compromised by a virus, is hijacked without your knowledge. You type a legitimate website URL into the address bar, but you’re redirected to a fake site that looks legitimate. There, cybercriminals are able to collect any PII you may type into the website.  Malicious software. Fraudsters may try to trick you into downloading “malware” that can attack your computer and, possibly, reveal your PII. Consider purchasing online security software for your computer, and keep it—and your computer operating system software—up to date.  Unsecure websites. Avoid online shopping and other activities on websites that aren’t secure, and be cautious about the apps you use. Make sure you use only official, secure websites with the “https:” prefix—not “http:”.
  • 4.  Weak passwords used for both social and financial accounts can leave you vulnerable. Strive to use unique, long, and strong passwords for each of your accounts. And when possible, activate multi-factor authentication, which requires you to enter both your log-in credentials and a secret code sent to your smartphone or other device before giving you access to your account.  Discarded computers and mobile devices that haven’t been wiped of your PII can be another point of access for a thief.  Targeting children online. Kids can give away personal information online without realizing it. Help protect your children online; be vigilant in monitoring the information they share when using an Internet- connected device. We’ve all received emails saying we’ve won a too-good-to-be-true prize— redeemed by providing our personal information. As with anything in life, when something online seems too good to be true, it probably is. Don’t respond to emails from someone you don’t know. Don’t click on unknown links or attachments. The bottom line? You can never be too careful when sharing your personal information online. Identity theft can happen to you even if you’re careful But what’s the first thing you need to do? To start, a fraudster could have several pieces of your personally identifiable information (PII). This is unique, sensitive information like your Social Security number that can enable someone to commit more than one type of fraud in your name.
  • 5. Using Information on the Internet for Identity Theft The outcome of identity theft is usually the same, regardless of how the thief obtains your information. However, the Internet is providing new ways for people to steal your personal information and to commit fraud. Thieves can accomplish their goal several ways such as using Internet chat rooms and spreading Trojan horses that drop key loggers on your computer to transmit any passwords, usernames and credit card numbers you use on your computer back to the thieves. Many online businesses today also store personal information about customers and shoppers on websites, and this provides another way for your personal information to be accessed, without your permission or knowledge. Additionally, email phishing is another way that thieves can attempt to gather your personal information. Phishing emails falsely claim to be an established legitimate enterprise in an attempt to scam you into surrendering private information that will be used for identity theft. The email will direct you to visit a website where you're asked to update personal information, such as passwords and credit card, social security, and bank account numbers — information the legitimate organization already has. The website, however, is bogus and set up only to steal your information. How to Protect Yourself: Minimize the Risk In offline transactions don't provide credit card numbers, financial account numbers, and personal identifying information over the phone unless you know the communication line is secure. Ideally, you should initiate the phone conversation. Lastly, there are recommended everyday practices, such as keeping an eye on postal mail to ensure your bills are arriving when they should be, and taking the time to properly dispose of paper documents that may contain credit card numbers and other identifying personal information. Remember: The more private and secure you keep your personal identifying information, the less susceptible to identify theft you are.
  • 6. Identity Theft Identity theft is the illegal use of someone else’s personal information in order to obtain money or credit. Identity theft can happen to anyone in any location across the country. Take simple steps to protect your online identity by:  Locking and password protecting your computer and cell phone.  Not sharing specific personal information online, such as your full name or birthday.  Setting proper privacy settings on social networking sites. Help Protect Your Family’s Identity The more time that your children spend online, the more opportunities they will have to share information about themselves. Talk to your children about the information that they should never share without your permission, including Social Security numbers and credit or debit card numbers. Then, visit the FTC’s website to learn more about how to better protect yourself and your family, and how to file a complaint.  Never share your password or account numbers over an e-mail or instant message.  Do not follow links from e-mails when conducting financial transactions; instead, enter the URL yourself.  Be wary of callers, pop-ups, websites, or e-mails asking for personal information.  Look for “https” or a picture of a lock before purchasing from a website or giving out information on that website.  Create secure passwords and change them often.  Never download software from a source you do not trust or open e- mails or images from unfamiliar senders.  Install firewall, anti-spyware, and antivirus software, and update it often  File a report with law enforcement and notify creditors if thereis an incident or a suspicion of identitytheft.
  • 7. Prevention  Do not share account information with friends, familyor otherpeople.  Ensure youalways have effective and updated antivirus/antispyware software running.  If possible, arrange for paperless bills and statements.  File sensitive documents securely, and shred thoseyou no longer need – preferablywith a cross-cut shredder.  Never divulgeprivate information datain response to an email, text,letter or phonecall unless you are certain that therequest is from a bona fide source.  Always beware of peoplelooking overyour shoulder when you are entering private informationon a computer, smartphone/tabletorATM.