ID Theft
What is identity Theft?
Identity theft is a two-step process. First, someone steals your personal information. Second, the thief uses that information to impersonate you and commit fraud. Of course, stealing your personal information isn't the worst of the crime; it's the second part of this process that does the most harm: using your information to commit credit card fraud, mortgage and utilities scams; and leave you with emptied bank accounts.
Types Of Identity Theft
There are many different types of ways that identity theft can be performed. The most common way is through a data breach. A data breach occurs when a cybercriminal hacks into a company’s database and steals the personal information that it stores about their customers. The most popular industries being attacked are healthcare, retail, financial and the government. These types of data breaches are so popular because a cybercriminal can obtain massive amounts of personal information from hundreds to millions of people such as full names, social security numbers, health insurance information and more in one fell swoop.
There are smaller scale scams that aim to steal an individual’s personal information as well. Phishing is the most popular way to try to trick users into divulging sensitive information. Either by tricking you into providing it yourself, or by tricking you to install malware that automatically steals data from your computer.
How To Report Identity Theft
If you become an unfortunate victim of identity theft, there are many ways to report it. You can start by going to the Federal Trade Commission’s website. You can fill out the FTC online complaint form to start the process.
How To Prevent Identity Theft
Prevention is the best measure you can take for protection against this threat. You can help prevent identity theft by educating yourself. Explore the articles below to read all about the signs of ID theft, the tactics used by cybercriminals, and even learn how to monitor your credit.
-
Phishing email examples to help you identify phishing scams
Read MoreLearn how to identify phishing email scams. Here’s what they look like and how to spot a fake.
-
2019 data breaches: 4 billion records breached so far
Read MoreA look at 2019 data breaches so far, arranged by business sector, plus actions you can take help protect against identity theft.
-
Virus warning signs: How to tell if your computer has a virus
Read MoreComputer viruses are about as diverse as computer users. Here’s how to tell if your computer has a virus.
-
Privacy vs. security: what’s the difference?
Read MorePrivacy vs. security: what’s the difference? Here’s what you need to know.
-
How to remove a virus from an Android phone
Read MoreWonder whether your Android phone is harboring a virus or other malware? Learn how to detect and remove it.
-
Is hotel Wi-Fi safe? Staying secure on public Wi-Fi
Read MoreLearn how-to tips for using public Wi-Fi safely at the Wi-Fi network at your airport, cafe Wi-Fi networks, and hotel Wi-Fi networks.
-
How secure is a VPN? What makes a safe VPN?
Read MoreHere’s how to make sure you choose a safe VPN.
-
How to recognize and avoid tech support scams
Read MoreTech support scams can be executed via cold calls, pop-up messages, and incorrect search engine results. Learn more.
-
Malware attacks: What you need to know
Read MoreMalware is a threat to your devices and your cybersecurity. Here’s what you need to know.
-
Cyberstalking: Help protect yourself against cyberstalking
Read MoreCyberstalking is online stalking. It may include false accusations, monitoring, threats and identity theft. Here’s what you need to know.
-
Cyber Safety gift guide 2019: 5 great device-security and online-privacy gifts
Read MoreIf you’re concerned about online security and privacy, here are some gift ideas that can help keep you safer.
-
SIM swap fraud explained and how to help protect yourself
Read MoreSIM swapping can be used to take over your financial accounts. Learn how to help protect yourself.
-
Is the dark web illegal?
Read MoreThe dark web attracts plenty of illicit activity, but is it illegal? We took a deep dive into the dark web and its legal implications. Here’s what we found.
-
Data breach: Could your email account be compromised?
Read MoreHackers could take control of your email accounts after a data breach. Learn more.
-
Cyber safety guide: Tips to Own IT. Secure IT. Protect IT.
Read MoreLearn how your actions can impact online privacy and device security. Here’s help during National Cyber Safety Awareness Month and beyond.
-
-
What is identity theft?
Read MoreIdentity theft occurs when someone uses your personal information to pretend to be you to commit fraud or to gain financial benefits.
-
Credit monitoring services: How do they work?
Read MoreCredit monitoring services can alert you when there's activity on your credit files. Is that enough to help protect you against ID theft?
-
Tips for protecting your social media privacy
Read MoreIn a world where companies can collect your online information, learn tips for protecting your social media privacy.
-
What is a rootkit? And how to stop them
Read MoreRootkits are a type of malware that are designed so that they can remain hidden on your computer. Find out more.
-
Fake IRS calls vs. legit IRS contact
Read MoreFake IRS calls are a scam to look out for, especially around Tax Day. Here’s what you need to know.
-
Dark web scans and dark web monitoring can help you protect your identity
Read MoreDark web scans and dark web monitoring can help you protect your identity | Norton
-
9 warning signs of identity theft and what to look for
Read MoreLearn 9 common signs of identity theft and what to look for.
-
Internet scams: What they are and how to avoid them
Read MoreHere’s what you need to know about internet scams and how to help protect yourself.
-
Don't fall for online employment and job scams
Read MoreOnline job scams are a way for scammers to gain access to either your money or your bank account or credit cards.
-
How to protect your Social Security number: 10 SSN tips
Read MoreYour Social Security number is a high value target for identity theft. An identity protection plan could help.
-
Internet privacy: A guide to online privacy
Read MoreTake steps to boost your privacy online. Here’s what to do and why it’s important.
-
How to freeze your credit report after identity theft
Read MoreA credit freeze allows you to restrict access to your credit report. It can help if you’ve been a victim of identity theft.
-
What to do with old computers
Read MoreTake these steps to ensure your old technology has been properly wiped and recycled.
-
POS malware data breaches and why they keep happening
Read MorePOS Malware Data Breaches and Why They Keep Happening
-
How to avoid identity theft online
Read MoreOctober is National Cyber Security Awareness month. Identity theft is a growing concern in today's internet landscape. Learn how to be protected against it. This is part 3 in a series of blog posts...
-
-
Myths and facts about identity theft
Read MoreKnowing how identity theft really works can help protect you from this crime.
-
How to protect your privacy online
Read MoreOnline privacy is important. Take these steps to protect your financial and personal information.
-
The evolution of Norton™ 360: A brief timeline of cyber safety
Read MoreThe evolution of Norton 360 : A brief timeline of cyber security
-
7 tips to help you file your taxes online safely
Read MoreLearn security measures you can take if you plan to file taxes online this year to help protect your personal information.
-
How does a VPN work?
Read MoreUsing a virtual private network, or VPN, can help protect your online privacy, data, and identity. Here’s how.
-
Tax season: How to help protect yourself against tax-related identity theft
Read MoreTax season: How to help protect yourself against tax-related identity theft
-
What you can still do about the Equifax data breach in 2018
Read MoreIf you were affected by the Equifax data breach, it may not be too late to help protect your identity. Take these steps now.
-
How identity theft can impact foster youth
Read MoreFoster youth face identity theft risks that the rest of us don’t.
-
Child identity theft: What parents need to know
Read MoreChild identity theft can go on for years before it’s discovered. Learn what parents can do to help protect their kids from this threat.
-
Foster youth and identity theft
Read MoreWhy are foster youth so susceptible to identity theft? One reason is the number of people who have access to their personal information.
-
How to help protect against phishing scams during tax season
Read MoreW-2 phishing scams are on the rise especially during tax season. The IRS reported an estimated 400% increase in phishing and malware incidents from 2015 to 2016.
-
Protecting your child from identity theft
Read MoreIdentity theft is a growing menace. With each passing day, cyber criminals are getting greedier and more malicious. They dont spare anyone when it comes to reaping unethical financial gains.They wont...