* "Dumpster-diving"
* "Mail theft"
*"Pharming"
* "Phishing"
* "Skimming"
* "Shoulder-surfing"
One of the positive things criminals have done, if I may say so, is add "creative" terms to our vocabulary. It always amazes me how intelligent and creative criminals can be! - Always one step ahead of their next victim, and ultimately, the law!
Whether they go after your mail, or go "dumpster-diving", or go "shoulder surfing", or "pharming", the end results are always the same: They become successful over another innocent victim!
Identity criminals are basically lazy people, in my opinion. Rather than getting a legitimate job, they would rather come up with "creative" schemes to part their victims from their personal information and their money.
One of the laziest ways they steal our identity, usually with our unwitting help, is through "Dumpster-diving". They simply sort through a person's trash for paper records such as credit card offers, bank statements, past paid bills, or anything that has your personal and financial information. Sometimes they can obtain a full profile of us from separate documents (such as church records, car repair records, personal letters, medical records, etc.) they find. And businesses as well as consumers fall victim to this one form of theft.
Mail theft is a low-tech method lazy criminals use to go after your personal and financial information. As with "dumpster-diving", it another easy way for criminals to get what they want with hardly any effort on their part, thanks to our unwitting help. For example, we leave a red flag on our mailbox to alert the mail carrier that there is out-going mail to be picked up. Or the mail carrier might do likewise to alert us to pick up our mail. Unfortunately, criminals love this because they tell them that the mailbox is ripe for the picking. A friend of mines calls this "The Low-Handing Fruit Scheme".
"Shoulder-surfing" is a low-tech, low-touch technique criminals use to get your information - and they boldly do so in public places usually right under our noses or over our shoulders. Typically they would watch or listen carefully as we key our credit card number or password into a keypad, or give our account number over the telephone. And don't for a moment think that they have to be standing within earshot to steal your info. No!
Sophisticated shoulder surfers have been known to use bioculars, telescopes, or super-sensitive listening devices to steal your info from across the room or across the street. Sometimes they will record the sounds for accurate playback. Recording of the keypad sounds help them analyze those tones for replicated PIN numbers and passwords. Some criminals standing nearby may even use their camera-cellphone to record the numbers they see or take a picture over your shoulder.
"Pharming" comes in several version. I'll just discuss one here. Similar to "Phishing", "Pharming" is an electronic scam in which criminals attempt to steal personal and financial information from numerous people simultaneously through something known as "Domain Spooling". Here the hackers take over a DNS server and redirect user information to a new website that they use to gather illegal information.
"Phishing" also bears mentioning here. It is a scam in which you, the consumer, are tricked into entering your personal and financial information (account numbers, Social Security number, PIN number, password, etc.) via a bogus email and website form. The email looks as if it was sent from a company with whom most consumers may have an affiliation, such as AOL ®, PayPal ®, eBay ®, or a major bank or credit card company; but, in reality, are nothing more than identity thieves hiding behind the email.
"Skimming" is a another growing identity theft scam where criminals quickly and temporarily steal a credit card and run it through a credit card reader known as a skimmer that has been reprogrammed to steal information off the card. Often, this takes place at a hectic retail store where a consumer might not notice that their credit card has been taken from them for a few moments.
And the list goes on. I'm sure that by the time you read this, there will be several new types to describe new and creative way these cybercriminals have come up with to part you from your personal information and your money. It's seem to be a losing battle - but don't give up hope yet. There are several resources that will come to your aid. I've compiled them on my blog at http://www.ProtectingYourIdentity.blogspot.com/.
More Post
New Medicines Available To Treat Rare Diseases
Music now we learn also on-line
Give A Heart Necklace This Holiday
Cure your Baldness & Alopecia the Natural Way (Chinese Herbs)
Teach Courses Online
Facts About Spirulina- Worlds Most Powerful Food
School Fundraiser Niche - Valentines Day
Hair Loss: Cosmetic Solutions For Good Cover Up
Dating Blindly
Sun Tanning Protects The Skin
Thay Call It "Dog Breath" For A Reason
Using Magnets To Fight The Pain
A Note From Saint Valentine - A First Person Tale Of This Wonderful Day
Spitting Up – And Other Joys Of Motherhood
Las Vegas: How to Ensure Your Vacation is Full of Adventure and Kicks
Is Self-Esteem Contrary to Christianity
What Educational Toys Do Kids Actually Enjoy Playing With?
MLM Success | Relationships in Two Minutes Flat
Are vent free gas fireplaces safe?
Domestic Violence Dr Jekyll or Mr Hyde