On Different Forms of Fraud
We might all be familiar with the term identity theft.
We all know that it is a crime involving the stealing of the identity of a person by another person.
But identity theft consists of several terms that should be known in order to fully understand this crime.
Shoulder surfing - often happens in a public place.
It is when an identity thief is standing close to you, memorizing your personal information such as your name, address, phone number, credit card number or even Personal Identification Number while you are having a transaction involving those information.
Shoulder surfers are fond at watching you as you punch in your phone or credit card numbers at public places.
They can also be the one standing near you in a crowded place, observing you as you fill out a form or enter your login and password in a public kiosk or Internet cafe.
Dumpster diving - is an act of collecting your trashes that they can recycle.
These trashes may be your old documents containing some of your identifying information.
If you do not know how to shred, or even tear, those documents, the life of the dumpster drivers will be much easier.
Mail fraud - can look like a real mail from some agencies you know or you don't know.
The letter might be informing you that you won in some you-don't-know-games.
They will ask you to pay for the shipping of your prize but the truth is they are the ones who will receive a prize if you respond to them.
Phishing - is quite as similar as to hacking online accounts but more likely involve in criminally acquiring usernames, passwords, credit detail, etc.
They often appear as an authentic unit in an electronic communication.
Phone fraud - involves your phone.
Giving identifying information over the phone without even verifying the person on the other line is a basic way of acquiring information about you.
Callers may claim that they are from a certain bank or agency who is just verifying some of your identifying information because there had been a problem on your account.
Trojan horse - is a virus that can usually be found in e-mails.
It comes from e-mail attachments which once opened affects your personal and financial information on your hard drive.
It delivers those information to the database of the identity thief responsible for your future problems.
There are more terms that we should be familiarized if we really want to know about identity theft.
Knowing those terms will not just add something on our knowledge but it will also add security on our identities.
But knowing all of those technical terms regarding identity theft are not really required.
It is enough to know the basics yet necessary information about the crime.
The extra terms that you know will serves as a bonus to you because since you know it, you can prevent yourself from being a victim of identity theft through that particular ways.
Identity theft is a broad crime and we should also broaden the things we know about it.
We all know that it is a crime involving the stealing of the identity of a person by another person.
But identity theft consists of several terms that should be known in order to fully understand this crime.
Shoulder surfing - often happens in a public place.
It is when an identity thief is standing close to you, memorizing your personal information such as your name, address, phone number, credit card number or even Personal Identification Number while you are having a transaction involving those information.
Shoulder surfers are fond at watching you as you punch in your phone or credit card numbers at public places.
They can also be the one standing near you in a crowded place, observing you as you fill out a form or enter your login and password in a public kiosk or Internet cafe.
Dumpster diving - is an act of collecting your trashes that they can recycle.
These trashes may be your old documents containing some of your identifying information.
If you do not know how to shred, or even tear, those documents, the life of the dumpster drivers will be much easier.
Mail fraud - can look like a real mail from some agencies you know or you don't know.
The letter might be informing you that you won in some you-don't-know-games.
They will ask you to pay for the shipping of your prize but the truth is they are the ones who will receive a prize if you respond to them.
Phishing - is quite as similar as to hacking online accounts but more likely involve in criminally acquiring usernames, passwords, credit detail, etc.
They often appear as an authentic unit in an electronic communication.
Phone fraud - involves your phone.
Giving identifying information over the phone without even verifying the person on the other line is a basic way of acquiring information about you.
Callers may claim that they are from a certain bank or agency who is just verifying some of your identifying information because there had been a problem on your account.
Trojan horse - is a virus that can usually be found in e-mails.
It comes from e-mail attachments which once opened affects your personal and financial information on your hard drive.
It delivers those information to the database of the identity thief responsible for your future problems.
There are more terms that we should be familiarized if we really want to know about identity theft.
Knowing those terms will not just add something on our knowledge but it will also add security on our identities.
But knowing all of those technical terms regarding identity theft are not really required.
It is enough to know the basics yet necessary information about the crime.
The extra terms that you know will serves as a bonus to you because since you know it, you can prevent yourself from being a victim of identity theft through that particular ways.
Identity theft is a broad crime and we should also broaden the things we know about it.