Identity Theft: Most Popular Articles
Many cases of identity theft start with a lost wallet or purse. Taking the right actions (and taking them quickly) can help protect you from that. Find out what you can do now.
When we hear about identity theft, most of us think about credit cards and bank accounts. But there are several areas identity theft can strike, not just our wallet. Find out about the various forms of identity theft, and what you can do to reduce your risks.
Knowing the difference between your ATM card and credit card can save you a lot of headaches if you become a victim of identity theft. Although there are no guarantees, a few precautions can go a long way to help you protect your money from
Reporting identity theft to the police is the first step in recovering if you are a victim. There are some specific issues you want to be aware of when you are trying to get an identity theft police report, though.
The majority of identity theft takes place in the real world, away from the Internet. But the Internet is still a commonly used tool in identity theft, and Internet shopping is one area in which you are at risk. Learn online shopping safety tips to help protect your identity and your credit.
How identity theft happens may include a combination of low and high tech methods, from simple phone scams to data breach.
Although it's not possible to completely prevent identity theft, there are a a few simple things you can do to make yourself far less likely to become a victim.
We usually trust family and friends to look out for us, but what can we expect if it is someone close to us who commits identity theft?
Cloud computing, or “the Cloud”, is now being marketed to companies as an inexpensive online data storage solution. But with data breaches in the news on a daily bases, data security is a big concern when it comes to those companies putting your personal information somewhere they have no control over.
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >One way that shows
It's estimated that 75-100 million phishing emails are sent out each day. These emails are designed to capture your personal and financial information so that criminals can steal your identity. Learn how spot a phishing emails so that you can protect yourself from this threat.
The history of identity theft goes back quite some time, there is even an account of it in the Bible. But the more recent history of identity theft can be very telling about where we are heading.
It’s easy enough to protect a video game from hackers, subscribers to World of Warcraft (WoW) use an authenticator to keep their account safe. Why isn’t this technology being used to protect our bank accounts?
If an identity thief manages to get his or her hands on your driver's license, chances are good you'll be in for a very rough ride.
It's scary when identity theft happens. Your first instinct is to panic. But you shouldn't. Instead, begin immediately to put your identity back together following these steps.
Knowing what information an identity thief is after can help you protect yourself from identity theft.
If someone uses a stolen social security number to work in the US illegally, guess who gets the tax bill? Even though you've told the Social Security Administration about the problem. The largest group of offenders are
Corporate identity theft is a very real concern, whether you are a mega corporation, a mom-and-pop shop, or just run a home-based business.
Identity theft starts in many different places. Some of those places are completely obvious, like your mail box and online, but there are other identity theft risks that you might not be so familiar with. Learn more about little known identity theft risks in this article.
Postal mail is one of the most used methods of identity theft. Learn what mail puts you at risk, and then reduce the risk by shredding it.
Identity theft protection programs can help immensely in an identity theft situation, but there are some important things you will want to know before enrolling in one.
The definition of identity theft seems to vary depending on who you ask. Some sources think it only has to do with money, while others have a broader definition. So, what is identity theft?
The US Supreme Courts decision in a recent case involving GPS may have ruled in favor of the defendant, but published opinion gives broad license to law enforcement when it comes to your cell phone.
Although it's nearly impossible to stop, there are things you can do to help protect yourself from identity theft. Here are some recommendations by experts in identity theft.
The most commonly used means of identity theft in the real world is mail theft and redirection. This article explains the crime and provides tips for protecting your mail and your identity.
Phishing is already a mainstay in identity theft attacks, but now a new method of attack is emerging. Spear phishing targets individuals and can be far more costly than its predecessor. Learn what spear phishing is and how to protect yourself.
This basic explanation of identity theft details why criminals steal identities, who those thieves are, and how the crime is committed. Readers are reminded to remain constantly vigilant about protecting their identities.
A credit freeze, or credit report freeze, locks down a consumer's credit report so no new credit accounts can be activated without the proper authorization from the consumer.
License plate readers can sometimes help police catch the bad guys, but privacy advocates worry that police profiling is violating privacy.
When you’re down on your luck, getting something to eat may have a bigger pricetag than you expect…
Synthetic identity fraud occurs when an identity thief alters your personal information for the purpose of using it to gain access to information or money based on your credit history.
Covering CIPA regulation and general issues associated with implementation, to include legal challenges and cost to organizations.
When an identity thief gets your debit card of finds a way into your bank account, you will be fighting with the bank to get your hard-earned money back. The Electronic Funds Transfer Act is the law your bank will most follow as you try to get your cash back.
We use the internet for everything - online shopping, email, even managing our bank account - and we use passwords for everything. One key to protecting yourself form identity theft is to have good passwords. Here's some tips to help make killer passwords that will stop identity thieves in their tracks.
The risk of identity theft presents itself at every turn. Learn what some of the most common identity theft scams are, and how to prevent them.
Identity theft can have deep and long-term effects on your life, but when someone digs into your wallet for your bank or credit card, it can send you in a tailspin.
Identity theft usually hits victims where it hurts most: in the wallet. If you've been victimized by identity theft, you want to clean the mess up quickly. This article walks you through the basics of fixing your credit report after identity theft.
Credit card fraud and identity theft are not the same crimes. But you still need to protect yourself from credit card fraud. Learn how in this article.
College students are at high risk for identity theft. To protect themselves, they need to understand what identity theft is, where they are at risk, and what steps to take if they suspect identity theft. All of that information is included in this article.
Spoofing is a broad-ranging term that essentially means to pretend to be something or someone that you're not. It is, however, much more complicated.
Identity theft happens to even those who protect their identities closely. But when it happens, you want to report it as quickly as possible to limit your liability. Use these steps to quickly report suspected identity theft.
URL shortening services have quickly become a real problem for Facebook users. You never know what might happen if you just click a link…
The Fair Credit Reporting Act (FCRA) gives identity theft victims specific rights when it comes to recovering from identity theft - rights that most businesses still try to take from the victim.
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >In 2008 the FTC
Most people are a little intimidated by lawyers, but when you look to protecting yourself and your family from identity theft, having access to legal help can be a critical part of fixing your problems.
Social security identity theft often shows up around this time of year, in the form of tax fraud. IRS Form 8821 could provide you an early warning in the event someone is trying to file for your tax return.
For medical identity theft, HIPAA is the principle law geared to protect consumers. This law is focused on your health information, who has access to it, and how it can be used.
You don't have to do something wrong to run afoul of the legal system. The Identity Theft Resource Center reported 56% of the identity theft victims they talked with reported the impostor used their information when they were arrested, booked, or arraigned. One third said there were criminal convictions in their name as a result of this, while still more found warrants in their name.
While wireless internet (WiFi) gives you the ability to take your internet virtually anywhere, an open network allows anyone to get an IP address under your account.
Web page spoofing is just one type of deception that hackers use to trick people into providing personal information that can be used for the purposes of identity theft.
The phenomenon of social networks took the business world by surprise. But people are social by nature, so it's natural for them to want to participate in a social network. It's also natural for identity thieves to go where the information is, and people may be unknowingly placing themselves at risk with the information they include on social networking profiles. Learn what personal information not to include on your social networking profile in this article.
While getting legal help with an identity theft issue is virtually a requirement, finding an attorney may not be as easy as it sounds.
Internet sites like FreeCreditReport.com say they will let you look at your personal credit report free, but may only show you one credit report. If you want to get your credit report free from all three credit reporting agencies, the best site is AnnualCreditReport.com, the governments gateway to watching your credit reports.
Guest author Mac McMillan gives us an insiders view of the problems surrounding medical identity theft, what it is, and how it needs to be handled. Companies that must comply with HIPAA and Red Flags will be especially interested in what he has to say.
Money is the least of your worries if you've had a medical identity theft. Getting the wrong alergies or blood-type in your medical record can yield deadly results. Information shared through the Medical Information Bureau (MIB) means once your medical information is digital, anyone can get it, and (worse) it can get the wrong information into the hands of your doctor. And fixing medical identity theft is never easy.
Social media like Facebook and Twitter are just a couple of places you must think about when looking at your cell phone security. But cell phone safety doesn’t end with social networking…
Vishing uses social engineering and phishing techniques to steal people's identities using Voice over Internet Protocol (VoIP) phone lines.
Prepaid (or reloadable) debit cards are a clever way to protect your money, and shop online securely, if you use them properly.
Identity theft is a common crime that affects everyone. Learn how to protect yourself from mortgage scams, mail fraud, credit fraud, and other identity crimes.
Spyware is one of the most prevalent methods that identity thieves use to collect the information needed to steal your identity. Learn how to recognize and protect your computer from spyware threats.
Cell phones, especially smartphones, have become an indispensable part of our lives. We can access anything from Facebook to our bank account at the touch of the screen. In fact, it seems these days that the last thing we really do with our smartphone is make phone calls.
Your credit report is center of your financial world. It's also the main target for identity theft. Learn how to monitor your credit report and keep your identity safe from identity theft.
FACTA or the FACT Act, is a primary Federal law related to identity theft and data security. It gives consumers specific rights, and provides businesses with guidelines about how to protect your personal information.
Social security identity theft, employment fraud, tax fraud, social security number
A fraud alert is used to alert potential lenders that your identity may have been compromised by identity theft.
IRS, reporting identity theft, Form 14039, tax returns, filing taxes, report identity theft to IRS
Insurance identity theft can create issues in healthcare and finances. For many victims, the problem only starts there - the real impact is in future insurability.
When identity theft strikes, it's not uncommon for the identity thief to get credit in the victim's name. It can be a slow process cleaning up the mess, often taking years. Find out what you can do, and how to start fixing the problem today.
The Medical Information Bureau (MIB) is often cited as a potential threat of medical identity theft, but this is not precisely accurate.
Watching out for your own identity can be tough, but when you think about your risks where your kids are concerned, there are a couple of things that need to be considered: what information they have, and who has their information.
The Internal Revenue Service now has a toll-free hotline for identity theft victims.
The Identity Theft and Assumption Deterrence Act (ITADA or ITAD Act) was the first of many Federal laws targeting identity thieves.
The Nigerian Letter Scam is one that's been around for a while. The advent of the Internet has changed the way the Nigerian Letter Scam is delivered, but it's still the same scam.
The FBI has sent an official warning to mobile users: beware of Loozfon and FinFisher cellphone viruses.
The practice of deceiving someone, either in person, over the phone, or using a computer, with the express intent of breaching some level of security either personal or professional.
There is a worrisome undercurrent of sentiment that seems to subtly associate being privacy-minded with creepy stalkers and underworld (and terrorist) activities.
Your cell phone, iPod, and GPS system might be putting you at risk for identity theft. These gadgets can be used by identity thieves to gain access to your personal information. Learn how to protect your identity by securing your personal gadgets.
Email spoofing is a technique that hackers use to send fraudulent emails and is often used as a tool to collect information need for identity theft activities.
If you want to prevent identity theft, it’s important to know how identity theft happens, what information to protect, and who commits identity theft. Our friends, family, and trusted advisors are often more dangerous than identity theft rings.
Guest author Stephen Ebbett, president of Protect Your Bubble, takes a look at the 2012 identity theft statistics and examines some of the trends. He also takes a moment to give us some tips to help protect ourselves from identity theft.
Your mailbox is one of the riskiest places for your identity. These tips help you to protect your mail from the thieves that would use it to steal your identity. Page 2.
Identity theft restoration programs are among the high-end of identity protection when it comes to price, but victims who have a restoration program almost always say it was well worth the investment.
Biometrics have been presented as the answer to identity theft, but the technology brings with it certain privacy issues that have many up-in-arms.
Statistics the past few years say that the chances of being a victim of identity theft are rapidly on the rise. It’s just as important to know what to do when if happens to you as it is to know how to prevent identity theft, or at least reduce your risk of being a victim.
Sometimes thinking you know something you don’t can have a big impact on your life. This is usually the case when it comes to identity theft, because there has been a lot of misinformation circulated over the past several years.
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >Just a few short
There are more phishing schemes and scams floating around than even an identity theft expert can know about. But they're all pretty much the same in this: they target your personal information, and they'll get it however they can.
The Identity Theft Enforcement and Restitution Act can help consumers recoup the costs associated with having their identity stolen. Currently, this act is still pending approval of the President.
Now that the cell phone companies are marketing 3G and 4G capable “smartphones” like the Droid, Blackberry and iPhone, identity thieves are targeting these more heavily.
Although not an exhaustive list of agencies, this article will give identity theft victims a launchpad to getting help with identity theft.
The latest generation of RFID tracking tags is so small it's called RFID Dust.
Most business owners understand there are risks involved with hiring a new employee. The new landscape created by identity theft and the potential of data breach can be a minefield if proper steps are not taken early on.
Mortgage fraud is often one of the results of identity theft. Learn how to protect yourself from mortgage fraud and prevent criminals from stealing your home right out from under you.
A stolen wallet or purse can mean more than just losing your cash and credit cards. It can also mean that your identity is at risk. Learn how to protect belongings and prevent identity theft
Unemployment rates keep rising. But identity thieves don't care if you're out of work. They'll take advantage of you anyway with employment scams designed to steal your personal information. Learn how to protect yourself from identity theft employment scams.
If you are an identity theft victim, you will end up talking with someone in the FTC. But they do more than collect information – they help consumers fight back against identity theft.
Thanks to Bob Sullivan (The Red Tape Chronicles) Equifax takes a prominent place in front of the controversies surrounding how personal information is being used by employers. And the year has just begun...
It's frightening to realize that your identity has been stolen. But the sooner you realize it, you can begin to repair the damages. Before you even start the repair process, however, you need to understand your rights as a consumer. This article explains them.
Businesses scan, print, copy, and fax information all the time. Who would have suspected that the office printer they use is really an identity thief's Trojan horse?
Small businesses often believe they're too small to interest identity thieves, but they're wrong. Identity thieves have an intense interest in small businesses as Jennifer and Rick learned when their small business identity was stolen by a check forgery ring dealing in gray market goods.
Glossary: Identity Theft Monitoring Service
Statistics say that 90% of all businesses fail during the first five years. Of the 10% that survive, 90% of those fail during the next five years. This is most often because the business owner had not taken into consideration factors that could ruin public perception, or impact his company directly.
Identity theft protection programs have been the fastest growing insurance in North America for six years now. The key to knowing if a program is right for you is asking the right questions, and understanding the various components of identity theft protection.
License plate recognition (LPR) is back in the spotlight as EPIC releases documents detailing how law enforcement agencies collect and share their information.
IRS Form 5071C can be one way you find out you're a victim of social security identity theft.
Links for all 50 state bar associations
An exploration of the concept of VLAN security as it relates to segmenting network traffic by threat/risk level and the all too common practice today of virtualizing everything and labeling it as “secure”.
The Red Flags Rule is an addition to FACTA that applies to companies which use credit reports, give information to credit reporting agencies, or accept payments from customers. This law requires companies to watch out for your identity, and to tell you if they see something wrong.
While identity theft can wreak havoc in anyone's life, there are special considerations for servicemembers to consider - especially if they have a security clearance.
Hackers recently stole information about Citigroup’s customers with a program designed to attack their website using a simple browser. While the company scrambles to fix the problem, there are some disturbing things this data breach brings to light.
Identity thieves never take a break. They're always looking for the next opportunity and natural disasters, like hurricanes, tornadoes, and earthquakes offer lots of opportunity. Learn how to protect your identity in the wake of a natural disaster
Radio Frequency IDentification (RFID) is making bold promises in the fight against identity theft.
REAL ID, the latest innovation to come to driver's license requirements, may help curb identity theft.
Federal Trade Commission, FTC, reporting identity theft, Fraud Affidavit
When you are considering an identity theft protection service, credit monitoring may be the most common component you find... and the least effective.
An update on how the Global Payment Systems data breach has evolved in the first 2 months.
Although at first the idea of an identity theft reimbursement program sounds good, but before you enroll in one, be sure you know what it does (and does not) cover.
The California Public Interest Research Group (CALPIRG) highlights the impact of technology on identity theft and the climbing cost of new account fraud to victims.
One of the emerging areas of personal privacy we have a great deal of control over is our social digital identity.
Indiana's Attorney General has set up an identity theft response site specifically designed to help victims quickly respond when the worst happens to them.
Victims of identity theft seldom use an attorney, but in many situations, you'll need a lawyer to nafigate the red tape and minefields.
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >So I took a bit
Recent (and upcoming) identity theft laws look toward protecting your personal information.
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >Everyone knows
I've been talking about our digital identities for a while now, but this is one of the most extreme cases I've seen where a digital identity is snagged by a stranger and used against the owner. It's definitely not a case of identity theft, but I feel it illustrates how our public posting can lead to unintended consequences.
Guest author Mac McMillan points to the need for a universal security framework guideline that can be adopted by all healthcare organizations to reduce the risk of data breach and medical identity theft.
Just because an organization (even a school) asks for your child's social security number does not mean you have to give it out.
The latest volley to come in the attack on personal privacy isn't a law at all - it's a growing public perception that not having a Facebook account is enough reason to be suspicious of someone.
The best way to avoid phishing scams is to delete phishing emails when they come to your inbox. Learn how to recognize them in under a minute.
The face of illegal immigration is evolving, and now, more than ever, political lines are being drawn.
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >I was appalled
There is far more to consider than your credit rating when you are looking to protect your identity. Specialty consumer reports have become a common tool used by credit lenders, and therefore have become subject to the FCRA - meaning you can look at these reports, dispute information in them, and even make statements in them... free.
Identity thief, stolen identity, someone stole my identity, steals your identity
Technically speaking, a business can't be the victim of identity theft. But if you own a business, you should know that an identity theft that happens to you can close your doors for good.
You're told all the time to protect your personal information, but do you know what to protect? What information is it that identity thieves are after? And is some information more valuable than others? Find out what personal information thieves want most in this article.
If you’re considering an identity theft protection program like many consumers today, it’s probably more important to know what it won’t do, than what it will.
Product Review: TrustedID. Identity Theft.
The National Foundation for Credit Counseling (NFCC) is having their 4th annual National Protect Your Identity Week from October 16th through the 22nd. In the spirit of consumer education program, your Guide is pleased to present this short series of articles designed to bring you up to speed quickly on the state of identity theft today.
Clean out your wallet (purse, satchel, man-bag, or whatever) to help protect yourself from identity theft.
Finsphere takes a common-sense approach with existing technology to offer “instant” notification for your credit cards, debit cards… all of your finances.
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >There's been a
Obviously as technology advances it will be used by law enforcement to catch bad guys, but privacy-minded organizations are concerned when the FBI ignores legal requests for information.
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >You might want
I always look forward to this report being released - Javelin has been keeping an eye on these numbers for over a decade now.
One common question of identity theft experts has to do with how much information is stored on the keycards collected on vacation. Many believe there's even a connection between their hotel room keycard and their bank account. Is it true, or are we just being paranoid?
When I read the headline that the IRS said they didn't need warrants to get my email, I thought it was from The Onion. Imagine my surprise when I realized it was actually from CNet...
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" > Greentree Cash
Vacation should be a time to relax and enjoy yourself, but it can turn into an identity theft nightmare if you're not careful. Learn how to protect your identity while you're on vacation.
Maryland takes a swing at protecting all children from identity theft, but the new law may not go far enough.