5 most common ways criminals perform identity theft TechRadar
5 most common ways criminals perform identity theft TechRadar Skip to main content TechRadar is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Here's why you can trust us. 5 most common ways criminals perform identity theft By Bryan M Wolfe, Christian Cawley published 16 June 2022 What do criminals need to do to steal your ID and how do they do it? (Image credit: Shutterstock) Audio player loading… To steal your ID, cybercriminals need to catch you unawares. A momentary lapse of concentration and the necessary information could be handed over without protest, almost subconsciously. Like all scams, ID theft works when you least expect it. Several techniques are in use by cybercriminals that help them steal your ID and the contents of your current account. Here are five of the most common identity theft techniques.Protect your privacy online with one of the best VPN servicesKeep your devices safe with the best antivirus softwareWe've also highlighted the best password manager 1 Phishing Phishing emails and text messages (sent via SMS, Twitter, Skype, or any instant messenger you can think of) can be used to fool you into giving up your personal information. All it takes is an urgent, seemingly genuine message, and a few moments later, you're handing over all your personal information without question. Why would you do this? It's thanks to how the message is crafted, the graphics that are included, and a cloned website. Scammers make copies of the websites of banks, credit card companies, PayPal, and even eBay. There are a few logos in the right place, a form for you to fill in, and moments later, you're willingly sending your data. In almost every case, a phishing email can be spotted early. Often, mail filtering software will catch it. But if not, take a moment to read it through. There will almost certainly be grammatical issues, spelling mistakes, and formatting errors. No financial institution would release emails that look unprofessional. Beat phishing: don't click on links in messages and emails purporting to be from your bank, PayPal, etc. Instead, open a browser window and log in to confirm or disprove the details of the message. (Image credit: Pixabay) 2 Skimming Rather than physically stealing your credit card, cybercriminals rely on technology to clone the details. This information can then be used to create a duplicate card or entered at the checkout of an online store. How does this happen? Lightweight, palm-sized machines can be used to clone your card. They "skim" the data from the black strip, which is then used to make a copy. It's a technique that has expanded to ATMs and fuel station forecourts. Prevent skimming: always keep your card in your hand; use contactless payments where possible; check ATMs for false facias and skimmers. 3 Social media Using social media gives you a presence on the internet that leaks certain information that is useful to cybercriminals. A key example is Facebook, where information about your hometown, family, job, and even your spending habits can be found. With a public profile, public posts, and tags, there is a good chance that anyone can find out as much as they need about you to steal your identity. Places you've been, where you live, who you know, your date of birth - it's all on there. In recent years, Facebook has taken steps to improve user privacy. However, there is a strong chance that you're not using these settings correctly. Check this by reviewing your last Facebook post. If there is a globe next to the date, it's public. Protect social media: secure your account, ensuring all information, photos, and updates can be seen only by friends. On Facebook, use Settings > Privacy to make these changes. You can also consider reducing your friend list or deleting your account.These are the best social media management tools 4 Shoulder surfing Rather than rely on technology to grab your credit card details, some scammers prefer a more traditional approach. They hang around ATMs and stores to observe what PINs people key in. This technique, which usually means getting quite close to the target (or "mark"), is called "shoulder surfing." After all, they're looking over your shoulder! Shoulder surfing means the perpetrator must have eagle eyes to spot the digits used in your PIN. Of course, the number also needs to be memorized. But that's not enough for ID theft, is it? As you've probably guessed, shoulder surfing is often a precursor to skimming or even old-fashioned pickpocketing. As soon as a criminal has their hands on your card, accompanied by the PIN, they have the advantage. Prevent shoulder surfing: ensure you cover the keypad when entering your PIN at an ATM or cashier desk. (Image credit: Shutterstock / metamorworks) 5 Unsecure networks Despite improvements in wireless security, unsecure networks still exist. For example, you might have an old router at home; when you should be connecting using a secure WPA2 connection, your router can't offer anything more secure than WEP. Meanwhile, your local café might be persisting with an incorrectly configured Wi-Fi network. Or it could be the railway station, bus concourse, public library, shopping center, or even football ground. Anywhere could be serving you unsecured Wi-Fi. Whatever the reason, the lack of a secure connection can be devastating for your online privacy. Various risks threaten your online safety. Unsecured routers with publicly accessible backdoors, for example. Bad Wi-Fi security allows the data you send to the internet via the router to be "sniffed" and read. Or scammers who set up fake Wi-Fi networks to fool you into sending your data via their device. Make networks secure: if it's your network, upgrade the router; if you're using a public Wi-Fi network, be sure to use a VPN.We've put together a list of the best secure routers around Awareness is the key to combating identity theft  There's a good chance you've heard of some of these identity theft techniques. You probably never thought you would be struck by them, though. After all, you hardly have anything in your bank account. So who would bother with that? Sadly, the reality is that Joe Public is more straightforward to steal from than a Hollywood star, Premier League footballer, or industrialist. Therefore, awareness of phishing, skimming, shoulder surfing, and the risks of unsecured networks is vital. And the less you share on social media, the better.Also check out our complete list of the best identity theft protection Bryan M WolfeBryan M. Wolfe is a staff writer at TechRadar, iMore, and wherever Future can use him. Though his passion is Apple-based products, he doesn't have a problem using Windows and Android. Bryan's a single father of a 15-year-old daughter and a puppy, Isabelle. Thanks for reading! See more Computing news Are you a pro? Subscribe to our newsletter Sign up to theTechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed! Thank you for signing up to TechRadar. You will receive a verification email shortly. There was a problem. Please refresh the page and try again. MOST POPULARMOST SHARED1The iPhone 14 Pro is made of the wrong stuff; the Pixel 7 proves that to me2Stop saying Mario doesn't have an accent in The Super Mario Bros. Movie3Google Pixel Tablet is what Apple should've done ages ago4RTX 4090 too expensive? Nvidia resurrects another old favorite5Blizzard made me explain Overwatch 2 smurfing to my mum for nothing1Logitech's latest webcam and headset want to relieve your work day frustrations2Best offers on Laptops for Education – this festive season3Apple October launches: the new devices we might see this month4Google's AI editing tricks are making Photoshop irrelevant for most people5Best laptops for designers and coders Technology Magazines (opens in new tab)● (opens in new tab)The best tech tutorials and in-depth reviewsFrom$12.99 (opens in new tab)View (opens in new tab)