According to LifeTips.com, approximately 10 million people are victims of identity theft every year, which is about 19 new victims every minute. These figures are projected to increase as internet programs continue to accumulate personal data and hacking becomes more sophisticated.
Most consumers and businesses think they are covered by their individual credit card agreements, but don't realize how quickly identities are robbed and used. Sometimes it is such a small theft, the owner doesn't even know it. There are thieves who capture information and use it to make purchases at the same online stores as the credit card or debit owner, thereby escaping notice.
Lifelock has been leading the way for many years and is diligent about making consumers aware of the latest and trending methods that thieves are using to steal identities. For more in-depth information:
Watch out list for keeping your identity safe.
- Dumpster diving: an old, but trusted method
- Wallet stealing: back pocket wallets are always in jeopardy
- They change your address: this is difficult to catch for months
- Mail theft: incoming and outgoing
- Shoulder surfing with phone cameras and recorders: too busy to pay attention
- ATM Skimmers/Handheld Skimmers: Portable credit card skimmers
- Overlays on ATMs: keosks can be easy targets
- Data breaches: are organizations always leveling with us?
- Youths at risk for future: kids in their teens
- P2P file sharing: music, photos and peer-to-peer sharing too much
- Phishing: duplicates legitimate corporate emails
- SMSishing: same as phishing but uses texting
- Vishing: same as phishing but uses voice calls
- Online Shopping
Lifelock is determined to stay on the leading edge and also encourages a frequent check on their watch list. Technological threats increase as quickly as technology itself.
Some of the future threats have been identified as: Trojan horses, spyware, malware, viruses and worms, which are getting more sophisticated. The manner in which the thief tricks users into downloading is, at times, beyond recognition. Beware of selling old computers and laptops. When a hard drive isn't wiped clean, personal information can be obtained and used by the new owner or a counterfeit refurbisher. Keystroke logging is becoming a popular method for malware criminals to steal passwords, IDs and more, without the user ever knowing.
Fast forward into the future: As cyber thefts and cyber identities continue to progress, companies like Lifelock will become a standard for cyber security.