Reviewed post: Identity theft-Cases on stolen laptops, hacking and lost CD



I read a post which is about the identity theft and i reliased that how a grave consequance will happen if we do not get awareness of this issue. As identity theft is a crime of stealing someone's personal, identifying information for the purpose of using that information fraudulently. Those personal and identifying information are including social security numbers, credit card and banking account numbers, usernames, passwords and patient records. While these information have been stolen which helped the criminal do the fraudulent activities such as opening new credit accounts, taking out loans in the victim's name, stealing money from financial accounts, or using available credit. There are a lot of cases are happened around us as the victims were be in a huge debt but without applying any loan.



Trickier Methods that would use by Identity Theft
Hereby i would like to share with you some of the trickier methods which identity theft usually use and we should get to know more about their tactics as we can alert of not being one of the victims.

1. Pretexting

A trickier method that thieves fabricate false pretenses under which to obtain your sensitive financial information from banks or other financial institutions. For example, they will impersonate as your relative and obtain your information from a phone company or bank.

2. Direct Theft



It is an straight line method for stealing information directly from you. They can directly get your credit card information, bank statements, and the like by stealing your mail, swiping your purse or pickpocketing your wallet.


3. Skimming

Skimming is where the theft use sophisticated storage device to connect with a card reader and then access that information for malicious use. While this is a very perilous trick as such a device can directly be installed on any legitimate card reader without recognition the card reader is compromised.

4. Redirecting your mail

It is where those companies send a change of address form and from this, theft will divert your mail to a separate address and gain access to your account statements and other information. As another word, they will directly steal from your mailbox.

5. Phishing

It is using fraudulente-mail messages that appear to come from legitimate businesses in order to gain the personal information. Those personal data such as account numbers and passwords, credit card numbers may be abused by theft.





Does Encryption is useful for protecting your personal information?
It can't deny that encrytion will help us to protect our personal data but for me, this is a subjective question. For my opinion, eventhough there are a lot of high technology of encrytion to secure the data. However there are still a lot of hackers successful broke in to get those high confidential data.
Some of the cases happened were due to the people carelessness. Some of the businessmen send their notebooks for maintenance service but they did not store those customers confidential information in a secure location where it will give a chance to competitors stole their information.

Nomatterhow, we still have to prevent those identity theft. Here are some ways which i would like to share with you:
  • Protect your Social security number
  • Treat your trash and mail carefully
  • Be on guard when using the Internet
  • Select intricate passwords
  • Verify sources before sharing information
  • Safeguard your purse and wallet
  • Store information in secure locations
At last, i want to share my personal experience with you. It is a real life case.


During the time when i get hurry to search a good university or college to further my study, i received a private call. The person that talking on the phone is a China girl who speak with China accent. She promoted me to study at China and kept persuaded me with a lot of reasons. I asked her how she can get my phone number and she told me that may be when my friends applied for the China University form and give them my number.
Come on!!! This is a one of the trick as they have gained access to the school and obtain those student data. Therefore, we should always alert of this kind of phone call or email to avoid be trapped into a snare.

Reviewed post from:
Prepared by Wong Chuan Chi

0 comments:

Post a Comment