1. Money

Your suggestion is on its way!

An email with a link to:

http://idtheft.about.com/popular.htm

was emailed to:

Thanks for sharing About.com with others!

Most Emailed Articles

How To Fill Out Form W-4

Identity Theft: Most Popular Articles

These articles are the most popular over the last month.
13 Things You Must Do When Someone Steals Your...
Many cases of identity theft start with a lost wallet or purse. Taking the right actions (and taking them quickly) can help protect you from that. Find out what you can do now.
Money is No Concern: Most Identity Theft Has...
When we hear about identity theft, most of us think about credit cards and bank accounts. But there are several areas identity theft can strike, not just our wallet. Find out about the various forms of identity theft, and what you can do to reduce your risks.
IRS Helping Identity Theft Victims, Just Take a...
The Internal Revenue Service now has a toll-free hotline for identity theft victims.
Tell the IRS About Your Identity Theft
IRS, reporting identity theft, Form 14039, tax returns, filing taxes, report identity theft to IRS
Top ATM Card Scams You Need to Watch Out For
Knowing the difference between your ATM card and credit card can save you a lot of headaches if you become a victim of identity theft. Although there are no guarantees, a few precautions can go a long way to help you protect your money from
Yes, Your Business Is at Risk for Identity Theft
Corporate identity theft is a very real concern, whether you are a mega corporation, a mom-and-pop shop, or just run a home-based business.
How to Report Identity Theft to the Police
Reporting identity theft to the police is the first step in recovering if you are a victim. There are some specific issues you want to be aware of when you are trying to get an identity theft police report, though.
Tax Time Identity Theft – IRS Form 8821
Social security identity theft often shows up around this time of year, in the form of tax fraud. IRS Form 8821 could provide you an early warning in the event someone is trying to file for your tax return.
Watch Out for These Low-Tech Methods of...
How identity theft happens may include a combination of low and high tech methods, from simple phone scams to data breach.
Recognize Identity Theft Scams - Spotting a...
It's estimated that 75-100 million phishing emails are sent out each day. These emails are designed to capture your personal and financial information so that criminals can steal your identity. Learn how spot a phishing emails so that you can protect yourself from this threat.
Why Social Security Fraud Is on the Rise
If someone uses a stolen social security number to work in the US illegally, guess who gets the tax bill? Even though you've told the Social Security Administration about the problem. The largest group of offenders are
Prepaid Debit Cards
Prepaid (or reloadable) debit cards are a clever way to protect your money, and shop online securely, if you use them properly.
Your Risky Mailbox: Identity Theft 101
The most commonly used means of identity theft in the real world is mail theft and redirection. This article explains the crime and provides tips for protecting your mail and your identity.
Recovering From Identity Theft: Repairing Your...
Identity theft usually hits victims where it hurts most: in the wallet. If you've been victimized by identity theft, you want to clean the mess up quickly. This article walks you through the basics of fixing your credit report after identity theft.
Steps to Recovering Your Identity After...
It's scary when identity theft happens. Your first instinct is to panic. But you shouldn't. Instead, begin immediately to put your identity back together following these steps.
Reporting Identity Theft 101
Identity theft happens to even those who protect their identities closely. But when it happens, you want to report it as quickly as possible to limit your liability. Use these steps to quickly report suspected identity theft.
Identity Theft: 15 Signs Yours Was Stolen
Identity theft is a sneaky crime that can take over your life long before you know it—unless you know the early warning signs.
IRS Form 5071C is Actually a Good Thing to Get...
IRS Form 5071C can be one way you find out you're a victim of social security identity theft.
Where Did the Identity Theft Problem Start?
The history of identity theft goes back quite some time, there is even an account of it in the Bible. But the more recent history of identity theft can be very telling about where we are heading.
Three Tips for Keeping Your Wallet or Purse...
A stolen wallet or purse can mean more than just losing your cash and credit cards. It can also mean that your identity is at risk. Learn how to protect belongings and prevent identity theft
Which Mail Do You Need to Shred?
Postal mail is one of the most used methods of identity theft. Learn what mail puts you at risk, and then reduce the risk by shredding it.
5 Tips for Online Shopping That Can Save You...
The majority of identity theft takes place in the real world, away from the Internet. But the Internet is still a commonly used tool in identity theft, and Internet shopping is one area in which you are at risk. Learn online shopping safety tips to help protect your identity and your credit.
How Do You Know Someone is Using Your Social...
Social security identity theft, employment fraud, tax fraud, social security number
Cloud Computing
Cloud computing, or “the Cloud”, is now being marketed to companies as an inexpensive online data storage solution. But with data breaches in the news on a daily bases, data security is a big concern when it comes to those companies putting your personal information somewhere they have no control over.
Who Commits Identity Theft?
We usually trust family and friends to look out for us, but what can we expect if it is someone close to us who commits identity theft?
What is Identity Theft?
This basic explanation of identity theft details why criminals steal identities, who those thieves are, and how the crime is committed. Readers are reminded to remain constantly vigilant about protecting their identities.
Keeping Your Kids Safe: A Parent's Glossary to...
I recently posted a glossary for parents who are trying to learn more about Internet vocabulary and keeping their kids for that matter safe when online.
What to Do if You're a Victim of Identity Theft
Statistics the past few years say that the chances of being a victim of identity theft are rapidly on the rise. It’s just as important to know what to do when if happens to you as it is to know how to prevent identity theft, or at least reduce your risk of being a victim.
Evaluate Your Identity Theft Risk
Knowing what information an identity thief is after can help you protect yourself from identity theft.
The Federal Trade Commission
If you are an identity theft victim, you will end up talking with someone in the FTC. But they do more than collect information – they help consumers fight back against identity theft.
GPS and Your Privacy
The US Supreme Courts decision in a recent case involving GPS may have ruled in favor of the defendant, but published opinion gives broad license to law enforcement when it comes to your cell phone.
Your Biometric Identity
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >One way that shows
Think Before You Click to Avoid Identify Theft
URL shortening services have quickly become a real problem for Facebook users. You never know what might happen if you just click a link…
Are You Ready for These Threats in 2016?
Attackers from across the world are focusing on utilities that support life such as power grids and water companies.
Cell Phone Safety
Social media like Facebook and Twitter are just a couple of places you must think about when looking at your cell phone security. But cell phone safety doesn’t end with social networking…
4 Surprising Ways Your Identity Can Be Stolen
Identity theft starts in many different places. Some of those places are completely obvious, like your mail box and online, but there are other identity theft risks that you might not be so familiar with. Learn more about little known identity theft risks in this article.
Protect Yourself from Identity Theft
Although it's nearly impossible to stop, there are things you can do to help protect yourself from identity theft. Here are some recommendations by experts in identity theft.
Should You Bother with Identity Theft...
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >In 2008 the FTC
Spoofing
Spoofing is a broad-ranging term that essentially means to pretend to be something or someone that you're not. It is, however, much more complicated.
Protect Your Mail
Your mailbox is one of the riskiest places for your identity. These tips help you to protect your mail from the thieves that would use it to steal your identity. Page 2.
Identity Theft Restoration Programs
Identity theft restoration programs are among the high-end of identity protection when it comes to price, but victims who have a restoration program almost always say it was well worth the investment.
What are Skimming devices and Cloned cards
In this post we discuss cloned cards, what they are and how they work and various types of ATM skimming hardware and how to protect yourself.
Food Banks and Identity Theft
When you’re down on your luck, getting something to eat may have a bigger pricetag than you expect…
Tips for e-Filing Your Taxes
Filing tax returns electronically (“e-filing”) can get your tax refund back to you in a matter of a couple of weeks. But there are some things you will want to know before you e-file your taxes.
Do License Plate Readers Violate Privacy?
License plate readers can sometimes help police catch the bad guys, but privacy advocates worry that police profiling is violating privacy.
6 Basic Rules to Prevent Credit Card Fraud
Credit card fraud and identity theft are not the same crimes. But you still need to protect yourself from credit card fraud. Learn how in this article.
EFTA spells out how to get your money back when...
When an identity thief gets your debit card of finds a way into your bank account, you will be fighting with the bank to get your hard-earned money back. The Electronic Funds Transfer Act is the law your bank will most follow as you try to get your cash back.
5 Things You Shouldn't Keep in Your Wallet
Although it's not possible to completely prevent identity theft, there are a a few simple things you can do to make yourself far less likely to become a victim.
How to Prevent Identity Theft
Identity theft is a common crime that affects everyone. Learn how to protect yourself from mortgage scams, mail fraud, credit fraud, and other identity crimes.
Beware of Frauds That Target Senior Citizens
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >Senior citizens
The Identity Theft and Assumption Deterrence...
The Identity Theft and Assumption Deterrence Act (ITADA or ITAD Act) was the first of many Federal laws targeting identity thieves.
Local Police Use NSA Tech to Spy on Citizens
You may think your cell phone conversations are private, but the US Justice Department is arguing quite the opposite. And while the debate is raging, law enforcement officers are using a device called a StingRay to intercept phone calls... just in case.
Credit Report Freeze
A credit freeze, or credit report freeze, locks down a consumer's credit report so no new credit accounts can be activated without the proper authorization from the consumer.
Identity Theft and Legal Help
Most people are a little intimidated by lawyers, but when you look to protecting yourself and your family from identity theft, having access to legal help can be a critical part of fixing your problems.
What is ATM Skimming
Criminals place a device on the face of an ATM, which appears to be a part of the machine. It’s almost impossible for civilians to know the difference.
What you should know about mobile banking and...
Cell phones, especially smartphones, have become an indispensable part of our lives. We can access anything from Facebook to our bank account at the touch of the screen. In fact, it seems these days that the last thing we really do with our smartphone is make phone calls.
Protecting Your Personal Information: What Data...
You're told all the time to protect your personal information, but do you know what to protect? What information is it that identity thieves are after? And is some information more valuable than others? Find out what personal information thieves want most in this article.
IDT Definition
The definition of identity theft seems to vary depending on who you ask. Some sources think it only has to do with money, while others have a broader definition. So, what is identity theft?
Credit Reports: How to Monitor Your Credit Report
Your credit report is center of your financial world. It's also the main target for identity theft. Learn how to monitor your credit report and keep your identity safe from identity theft.
Office Printers and Identity Theft
Businesses scan, print, copy, and fax information all the time. Who would have suspected that the office printer they use is really an identity thief's Trojan horse?
Beware of These 11 Facebook Scams
The following activities are prevalent on Facebook and other social network sites, so keep your eyes open for them:
Spear Phishing: Identity Theft’s New Black
Phishing is already a mainstay in identity theft attacks, but now a new method of attack is emerging. Spear phishing targets individuals and can be far more costly than its predecessor. Learn what spear phishing is and how to protect yourself.
FCRA
The Fair Credit Reporting Act (FCRA) gives identity theft victims specific rights when it comes to recovering from identity theft - rights that most businesses still try to take from the victim.
Do I Really Need a Lawyer?
Victims of identity theft seldom use an attorney, but in many situations, you'll need a lawyer to nafigate the red tape and minefields.
Credit Fraud Alert
A fraud alert is used to alert potential lenders that your identity may have been compromised by identity theft.
5 Ways to Protect Yourself From Mortgage Scams
Mortgage fraud is often one of the results of identity theft. Learn how to protect yourself from mortgage fraud and prevent criminals from stealing your home right out from under you.
Criminal Identity Theft
You don't have to do something wrong to run afoul of the legal system. The Identity Theft Resource Center reported 56% of the identity theft victims they talked with reported the impostor used their information when they were arrested, booked, or arraigned. One third said there were criminal convictions in their name as a result of this, while still more found warrants in their name.
The NSA, Conspiracy Theories and Your Privacy
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >Just a few short
How to Stay Safe from College Identity Theft
College students are at high risk for identity theft. To protect themselves, they need to understand what identity theft is, where they are at risk, and what steps to take if they suspect identity theft. All of that information is included in this article.
HIPAA
For medical identity theft, HIPAA is the principle law geared to protect consumers. This law is focused on your health information, who has access to it, and how it can be used.
Although not the most common type, financial...
Identity theft can have deep and long-term effects on your life, but when someone digs into your wallet for your bank or credit card, it can send you in a tailspin.
Hiding Behind an IP Address
While wireless internet (WiFi) gives you the ability to take your internet virtually anywhere, an open network allows anyone to get an IP address under your account.
High-Tech Identity Theft Protection
Identity theft has already touched the lives of 10% of the American population, and shows no signs of slowing. The high-tech markets are paying attention, and now offer several new solutions that may protect us through the 21st century.
RFID Dust
The latest generation of RFID tracking tags is so small it's called RFID Dust.
How to Report Identity Theft to the FTC
Federal Trade Commission, FTC, reporting identity theft, Fraud Affidavit
What You Think You Know CAN Hurt You When It...
Sometimes thinking you know something you don’t can have a big impact on your life. This is usually the case when it comes to identity theft, because there has been a lot of misinformation circulated over the past several years.
The Nigerian 419s
Those scam e-mails claiming you’re the recipient of a ton of money may have originated from Nigeria. A 419 Nigerian code made these e-mails illegal.
The Medical Information Bureau
The Medical Information Bureau (MIB) is often cited as a potential threat of medical identity theft, but this is not precisely accurate.
Web Page Spoofing
Web page spoofing is just one type of deception that hackers use to trick people into providing personal information that can be used for the purposes of identity theft.
8 ways to protect from Scareware Scams
Have you heard of scareware? If you haven't heard the term, you may have seen the scam. Here's how it goes: you are innocently browsing the Internet.
Victim Resources
Although not an exhaustive list of agencies, this article will give identity theft victims a launchpad to getting help with identity theft.
How to Create an Awesome Password (That You Can...
We use the internet for everything - online shopping, email, even managing our bank account - and we use passwords for everything. One key to protecting yourself form identity theft is to have good passwords. Here's some tips to help make killer passwords that will stop identity thieves in their tracks.
Insurance Identity Theft
Insurance identity theft can create issues in healthcare and finances. For many victims, the problem only starts there - the real impact is in future insurability.
Identity Thieves Love Your Gadgets, Too!
Your cell phone, iPod, and GPS system might be putting you at risk for identity theft. These gadgets can be used by identity thieves to gain access to your personal information. Learn how to protect your identity by securing your personal gadgets.
Recognizing Common Identity Theft Scams
The risk of identity theft presents itself at every turn. Learn what some of the most common identity theft scams are, and how to prevent them.
Parents are Under Appreciating Child Online...
As parents, we all want to offer our children the best opportunities to become healthy, happy, educated and responsible citizens.
Email Spoofing
Email spoofing is a technique that hackers use to send fraudulent emails and is often used as a tool to collect information need for identity theft activities.
business identity theft, corporate identity...
Statistics say that 90% of all businesses fail during the first five years. Of the 10% that survive, 90% of those fail during the next five years. This is most often because the business owner had not taken into consideration factors that could ruin public perception, or impact his company directly.
How to Avoid Tax Fraud
Tax fraud, social security identity theft, IRS, income taxes
What is Account Takeover Fraud?
When people think of “identity theft” they often think credit card fraud which is just one form of Account Takeover Fraud
How Identity Theft Happens: Small Business is...
Small businesses often believe they're too small to interest identity thieves, but they're wrong. Identity thieves have an intense interest in small businesses as Jennifer and Rick learned when their small business identity was stolen by a check forgery ring dealing in gray market goods.
What are the Telltale Signs of a Phishing Attack?
Phishing e-mails come in many shapes, sizes and forms, in that there’s a colorful variety of ways that the thief-sender could structure the message.
Identity Theft: Dealing with Credit Card...
When identity theft strikes, it's not uncommon for the identity thief to get credit in the victim's name. It can be a slow process cleaning up the mess, often taking years. Find out what you can do, and how to start fixing the problem today.
Medical Identity Theft: the Dark Side of...
Money is the least of your worries if you've had a medical identity theft. Getting the wrong alergies or blood-type in your medical record can yield deadly results. Information shared through the Medical Information Bureau (MIB) means once your medical information is digital, anyone can get it, and (worse) it can get the wrong information into the hands of your doctor. And fixing medical identity theft is never easy.
Protect Your Computer from Spyware
Spyware is one of the most prevalent methods that identity thieves use to collect the information needed to steal your identity. Learn how to recognize and protect your computer from spyware threats.
Multiple Layers of Identity Theft Protection
What options do consumers have once they learn that there’s been a data breach involving their credit cards, medical records or whatever?
How Social Networking Puts Your Identity at Risk
The phenomenon of social networks took the business world by surprise. But people are social by nature, so it's natural for them to want to participate in a social network. It's also natural for identity thieves to go where the information is, and people may be unknowingly placing themselves at risk with the information they include on social networking profiles. Learn what personal information not to include on your social networking profile in this article.
COPPA
Geared to stop companies from putting children at risk of identity theft, COPPA is the FTC's regulation for what a business must do to collect a child's personal information online.
RFID to the Rescue
Radio Frequency IDentification (RFID) is making bold promises in the fight against identity theft.
The Fair and Accurate Credit Transaction Act of...
FACTA or the FACT Act, is a primary Federal law related to identity theft and data security. It gives consumers specific rights, and provides businesses with guidelines about how to protect your personal information.
Identity Theft Reimbursement
Although at first the idea of an identity theft reimbursement program sounds good, but before you enroll in one, be sure you know what it does (and does not) cover.
Synthetic Identity Fraud
Synthetic identity fraud occurs when an identity thief alters your personal information for the purpose of using it to gain access to information or money based on your credit history.
Your Social Digital Identity
One of the emerging areas of personal privacy we have a great deal of control over is our social digital identity.
Securing and Managing Your Cloud Data
When storing data on a computer, it is all kept ‘together in one place. Data on a cloud, however, is spread out across the world, often redundantly.
Supreme Court Decision is a Major Victory for...
In the Riley v California decision, the Supreme Court clarifies that police always need a warrant to search your cell phone, even if you're arrested.
Natural Disasters: Protect Your Identity
Identity thieves never take a break. They're always looking for the next opportunity and natural disasters, like hurricanes, tornadoes, and earthquakes offer lots of opportunity. Learn how to protect your identity in the wake of a natural disaster
Helpful tips to (hopefully) avoid identity...
Fraudulent returns filed under your name can rob you of your tax refund. Here are some tips to keep you ahead of the curve this tax season.
Is it Safe to Store Passwords in the Cloud?
Data that is stored on a computer is saved in a nice, controlled place. Data that is stored in a cloud, however, is spread out throughout the world.
Should You Be Afraid of the NSA?
After 9/11, most of the anti-government spying issues of the past fell to the wayside because many people were fine with giving up a little privacy.
How Has Hacking Evolved with Technological...
Unfortunately, the bad hackers are evolving faster than the good guys trying to stop them.
The First 3 Types of Identity Theft
Identity theft and identity fraud are terms used to refer to all types of crimes in which someone wrongfully obtains and uses another person's data
Gone Phishing
There are more phishing schemes and scams floating around than even an identity theft expert can know about. But they're all pretty much the same in this: they target your personal information, and they'll get it however they can.
Resolving Identity Theft - Services to Evaluate
Identity theft resolution programs offer a good deal more help (and value) than basic credit monitoring.
How to Protect Your Identity from Employment...
Unemployment rates keep rising. But identity thieves don't care if you're out of work. They'll take advantage of you anyway with employment scams designed to steal your personal information. Learn how to protect yourself from identity theft employment scams.
identity theft, business identity theft, loan...
Technically speaking, a business can't be the victim of identity theft. But if you own a business, you should know that an identity theft that happens to you can close your doors for good.
Hackers getting in through the Front Door using...
The good guys, a.k.a. white hat hackers, are hired by CIOs of companies to infiltrate the company’s system to identify weaknesses.
What are Ram Raids, PIN Hacking and SMS attacks
Ram Raids; ATMs built into a wall or stand alone are being rammed by a truck and/or wrapped with chain and pulled out then loaded onto a truck.
Viral Identity Theft Schemes
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >Sometimes I feel
Protect Yourself with Your Smartphone
Now that the cell phone companies are marketing 3G and 4G capable “smartphones” like the Droid, Blackberry and iPhone, identity thieves are targeting these more heavily.
Identity Theft Insurance Doesn't Do What You...
Identity theft protection programs can help immensely in an identity theft situation, but there are some important things you will want to know before enrolling in one.
Tips for the web-savvy surfer, when out and...
Public WiFi networks are easier to find than free water these days, but they have severe risks associated with using them.
Top Cities for Identity Theft – And Tips...
Guest author Stephen Ebbett, president of Protect Your Bubble, takes a look at the 2012 identity theft statistics and examines some of the trends. He also takes a moment to give us some tips to help protect ourselves from identity theft.
The Signs of a Telemarketing Scam
Telemarketing scams are becoming more prevalent than ever before, and the following are some of the most common scams that are investigated by the FBI
Strategies for Preventing Identity Theft
Identity theft happens to about 8 million people each year in the US. The best way to protect yourself is to know how identity theft happens. Learn what signs to look for and the best methods for preventing identity theft.
Recovering From Identity Theft: Your Rights as...
It's frightening to realize that your identity has been stolen. But the sooner you realize it, you can begin to repair the damages. Before you even start the repair process, however, you need to understand your rights as a consumer. This article explains them.
Who Commits Identity Theft
We have trusted advisors to guide us through life’s complications, but what can we expect if it is one of our trusted advisors who commits identity theft?
Seniors: Protecting Yourself From Identity Theft
Seniors make attractive identity theft targets because they have life-long credit worthiness, retirements funds, and can be too trusting. If you're a senior, learn how to protect your identity before someone steals your life's work.
Government ID and Your Privacy
Online accounts have started asking for your government ID before helping recover your digital identity, but often, their privacy policy doesn't adequately cover the information they request.
What are Point of Sale Skimming Attacks And PCI
Point of Sale (POS) skim; there are 3 kinds of POS skims they are Clerk skim, POS swaps advanced skim and POS malware the most sophisticated POS skim.
Technology isn't offering as much help as some...
EMV payment cards are being touted as a great boon against financial crimes, but they aren't necessarily offering much protection to consumers.
This Message Brought to You by the Dept. of...
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >I like to take
Identity theft, id theft, idtheft, idt,...
class="no-js" itemscope itemtype="http://schema.org/Article" > itemprop="description" >Everyone knows
Identity theft involving our children can be a...
Protecting our kids now involves more than just keeping them physically safe.
First quarter of 2015 expected to be harder hit...
Experts predict the first quarter of 2015 will be more active with identity theft than previous years.
Your Driver's License May Be the Biggest...
If an identity thief manages to get his or her hands on your driver's license, chances are good you'll be in for a very rough ride.
Nigerian Letter Scams
The Nigerian Letter Scam is one that's been around for a while. The advent of the Internet has changed the way the Nigerian Letter Scam is delivered, but it's still the same scam.
Vishing
Vishing uses social engineering and phishing techniques to steal people's identities using Voice over Internet Protocol (VoIP) phone lines.
Your Employees and Identity Theft
Most business owners understand there are risks involved with hiring a new employee. The new landscape created by identity theft and the potential of data breach can be a minefield if proper steps are not taken early on.
CMMS and Medical Identity Theft
The Center for Medicare and Medicaid Services has been leaving 1/3 of the population exposed to medical identity theft, and has no intention of changing this.
Skimmers Still Take Consumers to the Cleaners...
Identity thieves still frequently use ATM skimmers to take advantage of unwary consumers. Know what to look for when you are using your credit card or debit card to protect yourself from identity theft.
What are Ghost ATMs and Dummy ATMs
Ghost ATMs; this ATM is created and built from scratch. It may incorporate a hybrid of parts from junked ATMs but is essentially a hand crafted ATM.
Tell it to the judge... and hope they listen.
Criminal identity theft can leave you trying to prove you didn't commit a crime, when common sense should make that point obvious.
Even your business can be a victim of identity...
If your company has an EIN (employer identification number), it can be a victim of identity theft just as easily as an individual can.
Paying for Someone Else's Crimes - Criminal...
If you believe you don't have to worry about the police unless you commit a crime, you don't know about criminal identity theft yet... and you probably should.
Too bad there's no way around having a social...
Our social security numbers are possibly the biggest risk we have when it comes to identity theft, but it's almost impossible to do without them.
Tax and Wage Fraud Nearly Half of All Identity...
The Consumer Sentinel Network 2012 Identity Theft report paints a picture of the government itself being under attack by identity thieves.
Types of Identity Theft
Although most of us think about money when we hear the words “identity theft”, financial identity theft is less of a concern than social security identity theft – and medical identity theft is often playing with your life… literally.
The Drivers Privacy Protection Act of 1994
The Drivers Privacy Protection Act of 1994
Mention identity theft, and everyone thinks of...
Financial identity theft only represents about 1-in-5 cases of reported identity theft, but it's the first thing that comes to mind when we hear those words.
Name One Reason Identity Thieves Would Ignore You
When the Social Security Number was created in the 1930s to track income for SS benefits, nobody could have foreseen that decades later.

©2016 About.com. All rights reserved.