1. Money
Send to a Friend via Email

Recognizing Common Identity Theft Scams

By

The risks for identity theft are everywhere you turn. Your mail, your computer, your credit cards, even your trash; all present opportunities for criminals to gain access to your personal information. To prevent identity theft, you must constantly be aware of the ways that criminals will use to gain access to your personal, identifying information.

Computer Scams

Email box showing list of spam messages.
Getty Images

One place that identity thieves often focus their attention is on your computer. Web sites and emails can put you at risk for identity theft. Learn how to recognize the most common computer-based scams.

Spot a Phishing Email
Protect Your Computer from Spyware
Spear Phishing: Identity Theft's New Black
Web Page Spoofing
Email Spoofing
Nigerian Letter Scams Getting More Elaborate

Real World Scams

Laptop computer screen.
Getty Images, Photographer: Justin Sullivan

Most people associate identity theft with computer crimes, but in truth more than half of identity theft happens in real world situations. Learn how to recognize the situations that put you at risk for identity theft.

Dumperster Diving
Your Risky Mailbox
Credit Card Protection Basics
Data Breaches
Vishing
Social Engineering

Risky Situations

Getty Images, Photographer: Justin Sullivan

Criminals will take advantage of any situation to gain access to your personal information. When you least expect it, you can become a victim. Learn to protect yourself when these unusual situations arise, too.

Vacation Time: Protect Yourself from Identity Theft
Natural Disasters: Protect Yourself From Identity Theft
Is Your Bank Really Merging?
Old Scams, Made New

©2014 About.com. All rights reserved.