1. Money
Send to a Friend via Email

Theft Methods

Identity theft happens when you least expect it. Learn how identities are stolen online and in the physical world. Once you can spot the risks to your personal information, it's much easier to protect your identity.

Who Do You Trust?
Recent developments at AUL bring our trusted advisors back into the spotlight - who do you trust?

Warning: Identity Thieves Want Your Home
Identity thieves are interested in your identity for what they can gain from it. When they can access your mortgage or the deed to your home, that can be literally the roof over your head. Your learn what the top mortgage scams are so that you can protect yourself from criminals that would use your information to steal your home.

Medicare and Medical Identity Theft
Centers for Medicare and Medicaid Services (CMS) know having your SSN on your Medicare card is a threat to your identity. Now they are looking at a fix...

Identity Thieves Love Your Gadgets, Too!
Your cell phone, iPod, and GPS system might be putting you at risk for identity theft. These gadgets can be used by identity thieves to gain access to your personal information. Learn how to protect your identity by securing your personal gadgets.

How to Protect Your Identity from Employment Scams
Unemployment rates keep rising. But identity thieves don't care if you're out of work. They'll take advantage of you anyway with employment scams designed to steal your personal information. Learn how to protect yourself from identity theft employment scams.

Identity Theft Methods You May Not Have Considered
Identity theft is often thought of as an electronic crime. In truth, however, it’s your every day habits that could lead to identity theft. Little things that you don’t think about it can create the opportunities that an identity thief needs to grab enough information to damage your credit, or worse, your whole life. Here’s a quick list of four common ways that identity thieves ga…

Recognizing Common Identity Theft Scams
The risks for identity theft are everywhere you turn. Your mail, your computer, your credit cards, even your trash; all present opportunities for criminals to gain access to your personal information. To prevent identity theft, you must constantly be aware of the ways that criminals will use to gain access to your personal, identifying information.

Spear Phishing: Identity Theft’s New Black
Phishing is already a mainstay in identity theft attacks, but now a new method of attack is emerging. Spear phishing targets individuals and can be far more costly than its predecessor. Learn what spear phishing is and how to protect yourself.

Financial Fraud - Scams and Schemes
This article outlines identity theft and how to prevent it, and also provides information on other financial scams you may encounter.

You're Risky Mailbox: Identity Theft Methods
The most commonly used means of identity theft in the real world is mail theft and redirection. This article explains the crime and provides tips for protecting your mail and your identity.

Recognize Identity Theft Scams - Spotting a Phishing E-mail
It's estimated that 75-100 million phishing e-mails are sent out each day. These e-mails are designed to capture your personal and financial information so that criminals can steal your identity. Learn how spot a phishing e-mails so that you can protect yourself from this threat.

Identity Theft: How it Happens
This in depth article details how identity theft happens, including some of the different methods for identity theft.

Identity Theft Scams
description

Identity Theft and the 2012 Election
Phone scams like vote by phone or vote by text "phishing" attempts are widely reported this year.

Medical Information, HIPAA, and Obamacare
The move towards digitizing medical information is a natural extension of the information age that we live in today. Many politicians (as well as consumers) are unaware of the risks involved.

New Scams; Same Old Story
One-Ring scam, $9.84 scam, Brian Krebs

How Do You Know Someone is Using Your Social Security Number?
Social security identity theft, employment fraud, tax fraud, social security number

©2014 About.com. All rights reserved.