Applicable for: Android;Mac;Windows;iOS
It is when thieves steal personal information and use it for taking over or opening new accounts, filing fake tax returns, renting or buying properties, or doing other criminal things in someone else's name.
Data Breaches: If the companies you do business with store your personal information, such as a huge insurance or medical corporation, your identity could be compromised in a large-scale data breach.
ATM Overlays: Thieves can install these devices at ATM machines and gas pumps to steal your account information when you insert your card.
Malware and Viruses: With the number of viruses, your computer and your information can be hacked through websites, Internet programs or file-sharing networks allowing thieves to access your private personal information.
Mail Theft: Thieves can steal mail directly from unlocked and low visibility mailboxes, enabling them to access your personal information from bills, statements, etc.
Dumpster Diving: Thieves will sort through garbage to find old bills, recent receipts, and other discarded personal information.
Change of Address: Thieves can change your address and divert your mail into the wrong hands.
Tax related ID Theft: By only using a stolen Social Security number and birth date, identity thieves can file a fake tax return in your name.
Medical ID Theft: Thieves can use your name or insurance information to receive medical care.
Social Security ID Theft: Thieves can use a stolen Social Security number to create new Social Security cards, access a number public records, financial investments or steal your name and personal information.
Drain Accounts: Under your name, thieves can withdraw money or make major purchases like house or car while you're struck with the bill.
Open New Accounts: Thieves can open accounts for credit cards, loans, utility accounts and more in order to make purchases or steal funds. These accounts may not be detected for a year or more.
Was this article helpful?