Protección contra robo de identidad y fraude
According to the Federal Trade Commission, identity theft consistently tops its list of consumer complaints every year. Identity theft occurs when a criminal obtains and misuses someone’s personal information without permission, typically for economic gain. For many victims, it can result in drained bank accounts, poor credit, and a damaged financial reputation.
It's always a bummer when we waste money – what’s even worse is when our money is wasted by someone else. The best way to prevent identity theft is through education. By staying aware of the latest tricks and common schemes, you can lower your chances of becoming a victim of fraud.
Report any suspected fraud to your bank immediately.
Common Types of Fraud
Most would-be identity thieves use the same ideas, just with different details and contexts. Check out the chart below for some of the common ways fraud attempts can appear.
| Method |
What It Is |
Examples |
| Mail Theft |
- Thieves steal statements or other financial papers out of your trash or physical mailbox.
- They use the sensitive information on there, such as account numbers, to steal your identity and open new accounts or loans in your name.
|
- You receive your credit report and discover a new auto loan on your record that you don’t recognize.
- You notice that you haven’t received your credit card statement in the mail for last month yet, but your financial institution claims it was sent weeks ago.
|
| Phishing |
- A scammer sends an email, text or other message while pretending to be a person or an organization you know, such as your friend, your bank or a department store. They may be offering a special deal or claim there’s something wrong with your account.
- They try to get you to willingly hand over your account’s passwords or credit card information.
|
- You receive a text from your bank asking you to confirm a credit card transaction. They ask you to click a link or tell them your PIN.
- You receive an alert that a package you ordered has been delayed, instructing you to click a link to track it – but you don’t remember ordering anything.
- You get a DM from your friend asking you to vote for them in an online competition on a social media site. The link forces you to log in, and then steals your account information.
|
| AI Voice Imitation |
- A loved one’s voice gets cloned by an AI voice software, and you receive a phone call that sounds like your loved one in need of help.
- The scammer impersonates your loved one to get you to send money, gift cards or account information.
|
- You pick up the phone and hear silence – it could be someone trying to record your voice.
- You get a call from an unknown number, but the voice sounds familiar and claims to be someone you know in a desperate situation.
|
| Deepfakes |
- Scammers use deepfake AI technology to create believable videos of you or someone you know.
- It’s often hard to believe that a video call could be fake, so you’re more likely to provide money or account details.
|
- You receive a FaceTime call from your grandson who looks and sounds panicked – and in need of money.
- You’ve been chatting with a potential romantic partner and have never met them in person but have chatted over video and phone – and then they get into financial trouble and need your help.
|
| Fake Website/Merchant |
- Scammers set up a website or online store with stolen pictures, then list items at an incredibly discounted price.
- The goal is to steal your money or credit card info.
|
- You’re gift shopping on an online marketplace and spot a deal that seems too good to be true. You make the purchase, but the item never arrives.
|
| Fraudulent Job Opportunities |
- Scammers post fake job opportunities or reach out to try to hire you.
- They use this to steal your Social Security number and personal data.
|
- You see a job listing that offers high pay but has little detail.
- You get an unsolicited recruiter email demanding an immediate interview.
|
| Skimming |
- A thief sets up a device on an ATM, gas pump, or point-of-sale terminal that copies your card information when you use it.
- They retrieve the info and steal funds.
|
- You notice a loose or misaligned card reader before inserting your card.
|
How to Protect Yourself from Fraud
Even the smartest person you know can become a victim of fraud or identity theft. Protecting your private information and staying skeptical are crucial for lowering your chances of becoming a victim.
- Don’t share your secrets.
Don’t provide your Social Security number or account information to anyone who contacts you online or over the phone. Protect your PINs and passwords and do not share them with anyone. Do not reveal sensitive or personal information on social networking sites.
Use a combination of letters and numbers for your passwords and change them periodically. Do not used easily guessed words or numbers, such as pet names or birthdays. Do not reuse passwords across different accounts.
Don’t open attachments or click on links in suspicious or unsolicited emails. Read the sender’s email address carefully for typos or unusual URLs.
Shred receipts, banks statements and unused credit card offers before throwing them away.
- Keep an eye out for missing mail.
Don’t mail bills from your own mailbox with the flag up. Consider enrolling in online banking to reduce the likelihood of paper statements being stolen.
- Use online banking to protect yourself.
Monitor your financial accounts regularly for fraudulent transactions. Sign up for text or email alerts from your bank for certain types of transactions, such as online purchases or transactions of more than $500.
- Monitor your credit report.
Order a free copy of your credit report every four months from one of the three credit reporting agencies at annualcreditreport.com.
Make sure the virus protection software on your computer is active and up to date. When conducting business online, make sure your browser’s padlock or key icon is active. Also look for an “s” after the “http” to be sure the website is secure.
- Protect your mobile device.
Before you donate, sell or trade your mobile device, be sure to wipe it using specialized software or using the manufacturer’s recommended technique. Some software allows you to wipe your device remotely if it is lost or stolen.
If you receive an unsolicited phone call, resist the urge to answer with “Yes?” or “Hi, this is [name].”
- Verify through other means.
If you receive an email, text, message or phone call that you’re unsure about, ask a trusted friend or family member to look it over with you. If the one contacting you is supposedly a person or organization you know, contact that person or organization through a different method to confirm that the message is real.
Further Reading
OUCH! Newsletter
OUCH! Newsletter: CEO Fraud/Business Email Compromise
OUCH! Newsletter: Stop That Phish
OUCH! Newsletter: Smart Home Devices
OUCH! Newsletter: Five Examples of Social Engineering
OUCH! Newsletter: Phone Call Attacks & Scams
OUCH! Newsletter: The Human Side of Security
Extra Tips
Identity Theft Tips from the National Fraud Information Center
Federal Trade Commission - Identity Theft
Privacy Rights Clearinghouse - Identity Theft IQ Test
Consumer Guides and Protection
Sign Up for Consumer Alerts
What to Do If You’re a Victim
Tips for Consumers - What to do Post-Breach
Report Fraud to the Federal Trade Commission
What to Do Right Away & What to Do Next
Credit Reporting Agencies
www.equifax.com
(800) 685-1111
www.experian.com
(888) 397-3742
www.transunion.com
(800) 888-4213