Welcome, Guest: Join TodayNewsReview / Login / Trending / Recent

Stats: 340 members, 4,611 Topics. Date: January 22, 2018, 11:09 pm

Top 5 Common Strategies Used By Hackers And Scammers To Steal Identity

TodayNewsReview / Technology / Webmasters / Top 5 Common Strategies Used By Hackers And Scammers To Steal Identity 319 Views

(Go Down)
Here are the top five tactics used by cyber criminals to steal your identity

One fine morning you may wake up to a reality called identity theft. While stealing someone’s identity is not legal, there are several tricky but legal methods scammers and hackers use which can expose you to identity theft as well. The first step to stop this worrying scenario is to be aware of the more common data collection schemes that can render you susceptible.

Provided below are the five tactics you should be aware of so you can keep your identity as well as saneness in check.

1. Social media spying

People have started sharing more about their personal lives over the internet than ever before with the emergence of social media. While you can virtually connect with long-lost friends and relatives through the social media, it also makes it simpler for a scammer or hacker to get hold of your personal information that could lead to identity theft. Generally, if you decide to reveal identifying information like your birthday or any other personal details, it is suggested that you keep your profile settings private and wisely contemplate the consequences of anything you post. For instance, bragging about your vacation could signal to a thief that personal information is being left unguarded at home or the mail is unattended.

2. Social engineering

Some scammers and hackers will create traps that depend mainly on human interaction to gain access instead of spending their time trying to guess or track down your personal information. This tactic is known as “social engineering.” They often portray themselves as a genuine person or company that is looking for information, social engineering tricks depend on people’s curiosity and trust to be successful. You may want to be cautious of “urgent” emails looking to confirm your login information or doubtful social media friend requests.

3. Tapping into your old hard drive or computer

Don’t just simply give away your old computer with the existing hard drive intact, if you are looking to sell or discard it. You could be unintentionally handing over the keys to information to the thieves that are needed to assume your identity. Ensure that the physical hard drive is replaced and destroyed before you throw out or upgrade an old machine.

4. Malware-based phishing

There are chances that you might be more vulnerable to scams masked as “fixes” to the problem when you feel that your computer has been taken over by malware. If you feel that your computer has been infected or has downloaded illegal content and if you are offered an instant solution to the problem, then think twice. You may actually end up installing the attacker’s malware instead.

5. Vishing, or “voice phishing”

Voice phishing or “vishing” scams are voicemails or robocalls that often pose as companies or government agencies with an unrelenting necessity meant to supersede your natural caution. They will want you to disclose important identifying information like your social security or credit card number quickly over the phone. Word of caution: a reliable organization will never function this way.

Credit: techworm.net

0 Like

(Go Up)
Viewing this topic:
1 guest viewing this topic
TodayNewsReview is owned and managed by Jeremiah O. A.(TodayNewsReview) (Read TNR Rules) - Advertise With Us
- Copyright © 2018. All rights reserved.
Disclaimer: Every TodayNewsReview member is solely responsible for anything that he/she posts or uploads on TodayNewsReview .
For enquiries & feedbacks send email to: contact@todaynewsreview.com