As technology advances, you can be sure that identity thieves are not far behind. Here are some common methods cyberthieves use to steal your personal information and how you can increase your security while shopping or banking.
Your email messages may not be quite what they appear to be if you're targeted by a phishing scam. Phishing is the act of sending fraudulent emails that seem to come from familiar businesses. These messages contain links to phony websites designed to steal personal information either directly or through malware and keyloggers. Often you'll see a problem referenced with a request to click on the link provided to correct it. Once you've entered your information, ID thieves can access your accounts.
Vishing is the telephone version of phishing. Callers are sometimes bold enough to suggest the victim call back to verify authenticity. But the vishers don't actually hang up; instead they play a recorded dial tone to make the victim believe he's making a call.
Most shoppers love the convenience of plastic, and identity thieves use this to their advantage whether it involves skimming, phishing, vishing, malware, mail theft or just looking over a victim's shoulder to steal account numbers. When debit cards are compromised, it's particularly alarming because fraudulent purchases drain your checking account instantly.
Business email compromise, or BEC, scams have cost companies more than $1.2 billion. A phony email from a CEO requesting that funds be transferred per attached instructions is sent to an employee. Because the email appears to come from the employee's superiors, and because the message so closely resembles requests this employee receives regularly, the transfer is often made without question. The money then ends up in overseas accounts that are almost impossible to trace.