Identity Theft: See precautions to avoid falling for these scams

Illustrative picture (PCPR)

An increasingly common phenomenon, identity theft through digital means is a crime that can cause many problems. Imagine an unknowing criminal using your name to open an account such as telephony, and you only find out when your name is dirty? Well, that’s just one of the problems.

As can be seen, these crimes are characterized by the theft of personal data, with the intention of committing some kind of digital fraud. There are many types of actions in the possession of consumer data, ranging from financial theft to using the victim’s data for medical treatment or applying for credit.

These crimes are becoming simpler and simpler for criminals, an example is the ease with which they break into someone’s accounts on social networks today. The big mistake people make is in the misuse of tools and in the fact that they freely share personal information on the Internet.

In possession of the data, the embezzler poses as the victim, in order to buy or sell. In some cases, fraud and identity theft can take years to detect, and in others to try to expose and unsubscribe. However, even with best efforts there is no guarantee that these frauds will be resolved and losses recovered.

See types of thefts

There are several ways to steal people’s identities, but there are always the most common ones, as described below:

Accessing accounts — in this case, in possession of the victim’s information and passwords, the person impersonates them in the bank’s security environments in order to fraudulently obtain money, usually through a virus.

This is the type of offense that harms consumers the most, as it uses stolen data to log into a bank account and transfer money to another account. You can also add his name to the bank account in “download”. In this way, you can submit false tax documents and get a refund of your income tax refund, get loans, make purchases with a credit card, for example.

Identity theft – this is a real concern, but it is becoming very common, an embezzler assumes the identity of another person, setting up a false identity, to avoid the legal consequences of their actions. Usually, this crime is committed when the thief uses someone else’s false documents or forges documents because he has not been arrested or prosecuted.

Medical ID — This case occurs when a fraudster steals an identity, including health insurance information, using it to provide medical treatment on behalf of the victim. So, when the latter goes for medical help, he can be denied treatment, since the thief has already received that treatment.

The situation is serious, even if a child’s identity theft occurs, fraudsters can use the child’s social security number or other identification to apply for credit, make purchases, etc.

Social Media Profile — This is becoming very common, where a fraudster can take over a person’s network or even create an account on the networks with the person’s information. With that, he starts talking to contacts for various actions, such as asking for money or trying to sell goods and products that usually don’t exist. Actions via WhatsApp, asking for money from parents, relatives and friends are also very common.

What to do?

The best thing you can do in such cases is to protect yourself. These thefts usually take place through the Internet, social networks, e-commerce sites, data leaks, also through phishing and pharming attacks to trick victims into handing over confidential personal information. Keep in mind that phishing mostly takes place through the use of fake e-mails, while pharming takes place through fake websites.

With this, malware viruses or malware are injected into the machines and then the thieves need to turn the stolen data into profit and this is where the dark web comes in. The guideline is that in order to reduce or eliminate the risk of your identity being stolen, here are some tips:

Proteja sua conta de e-mail com uma senha forte e única, com combinação de letras, números e símbolos ou gere uma senha aleatória e atualize-a com frequência;
Sempre realize logout, após verificar seu e-mail, contas bancárias ou outras e redes sociais e isso em qualquer computador que não seja o seu;
Nunca use o Wi-Fi público não seguro, porque qualquer pessoa com um pouco de conhecimento e acesso às ferramentas certas pode estacionar seu computador em uma rede Wi-Fi pública e espionar todos os outros;
Não anote as senhas em nenhum local e muito cuidado quando for digitá-las, certifique-se que não tem ninguém olhando e que a máquina é segura;
Não confie em conversas online, principalmente quando as pessoas solicitarem se dados e outras informações pessoais;
Não clique em links estranhos enviados por SMS, e-mail ou WhatsApp;
Tenha sempre um antivírus atualizado
Não se exponha em demasia nas redes sociais, assim terá grande probabilidade de não ter sua identidade roubada.

Remember, no one is immune to identity theft, but some people are at greater risk than others. Identity thieves prey on people who are less likely or less able to regularly monitor their financial accounts. They also look for people without good internet security habits, such as anyone who uses the same password for multiple accounts.

I remind you that protection is prior prevention and constant monitoring of the account, finally, an interesting way is to block the phone with a fingerprint and activate facial recognition. Finally, lower your limits and keep your credit locked up until you need it.

Leave a Reply

Your email address will not be published. Required fields are marked *