Internet Identity Theft - How You Can Shield Yourself

With the advent of the World Wide Web, a whole new breed of criminals have surfaced, posing threats to more than just our material assets, but also to our very identities. Although there are a number of effective methods for protecting yourself from internet identity theft, not everyone takes the necessary steps to initiate such a plan. By tightening up your own personal security measures, you'll be far safer when you go online, and much less likely to become just another victim in the world of cyber-theft.

Securing your Channel

Anybody who's spent any amount of time online knows that internet addresses begin with "http://". This is used to electronically communicate the request for a line in which to jump onto the internet, and is what most people use for web surfing. Those who are a bit savvier know that a request can be put in for a secure channel, which will deflect attempts to capture any personal data that may be transmitted through the line, such as in the case of bank account numbers for those who prefer to do online banking. In order to request a secure channel, simply begin the web address with "https://" ? the "s" is a red flag to the system that you're requesting a secure channel.

Credit Card vs. Debit Card

Making online purchases using a credit card is a fairly common practice today, but is far different from using a debit card online. If you really must make a purchase in this way, don't ever use a debit card. Once the funds are removed from your account, you'll be unable to retrieve them, but a credit card charge can be disputed and ? in most cases ? the amount that was charged without your authorization can be retrieved.

Phishing Scams

While it's simply common sense not to provide anyone with your password to an online account ? or other information that might be used to access it by an outside entity ? some rather creative scams have been perpetrated, which are convincing enough to lure even the most cautious of consumers into their trap.

The best example of this type of scenario would be the receipt of an e-mail from your bank, payment service or online auction host that appears to be perfectly legitimate, telling you that you need to confirm your account number, password or balance due to some type of fraud investigation, etc., that they've initiated.

Typically, a link is offered that you're instructed to click onto, in order to verify that you are, in fact, the owner of the account. When you sign in with your screen name and password after clicking on the link, these electronic thieves capture that information and use it against you in the future.

The moral of the story is that, if you should receive any type of communication from one of these types of institutions, always use an outside internet line to contact them directly in order to confirm the fact that they've sent you this e-mail. In nearly every case, these messages are fraudulent.

Social Security and Credit Cards

Since cards such as these contain extremely sensitive information about your identity ? particularly in the case of the social security card ? then the best way to guard against internet identity theft is to avoid providing them online. If these are truly needed in order to process some type of transaction, then it's better to request that a hard copy form is sent to you through the postal service, and take care of the matter in that way.

Use Common Sense

Protecting yourself from internet identity theft is largely a matter of common sense. If there's a bit of sensitive information that no-one else should be privy to, then it's not a good idea to blast it across the internet ? unless you're feeling very, very lucky.

The author grants reprint permission to all venues so long as the copyright and by-line are included intact.

Copyright © 2005 Preventing Identity Theft.com All Rights Reserved.

About the Author: Nikki Greene is dedicated to helping you become better informed when it comes to preventing identity theft. Sign up for her "Preventing Identity Theft Newsletter" and keep up with the latest trends, identity theft in the news, and how you can safeguard your identity: http://www.preventing-identity-theft.com/

In The News:


pen paper and inkwell


cat break through


Wireless Network Security

Working from home has its advantages, including no commute, a... Read More

Virus Prevention 101

Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More

Personal Firewalls - Secure Your Computer

There has not been a time in the history of... Read More

Make Money Online - Defend Against The Latest Scam

First, let's do a little recap'. As I stated in... Read More

Spy Scanners ? Don?t Compromise your Privacy

Spies, spyware, internet parasites are among what they are usually... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

Breaking Into Your PC: News...

You'd better learn news from media, not from emails, security... Read More

Spyware Attacks! Windows Safe Mode is No Longer Safe

Many of us have run into an annoying and time-consuming... Read More

A New Era of Computer Security

Computer security for most can be described in 2 words,... Read More

Computer-Virus Writers: A Few Bats In The Belfry?

"Male. Obsessed with computers. Lacking a girlfriend. Aged 14 to... Read More

Top Five Spyware Fighting Tips

Spyware and adware are becoming major problems for online surfers... Read More

Three-pronged Trojan Attack Threatens Security on the Internet

Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More

3 Pervasive Phishing Scams

Scams involving email continue to plague consumers across America, indeed... Read More

Top Ten Spyware and Adware Threats Identified

On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More

Top Five Online Scams

The top five online scams on the Internet hit nearly... Read More

Information Security for E-businessmen: Just a Couple of Ideas

If you constantly deal with bank or electronic accounts, it... Read More

6 Ways To Prevent Identity Theft

These six ways to prevent identity theft offer you valuable... Read More

Protecting Your Children On The Internet

If you are a parent, as am I, I think... Read More

Internet/Network Security

Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More

How to Know Whether an Email is a Fake or Not

A few nights ago I received an email from "2CO"... Read More

Dont be a Dork ? Protect Yourself

There are folks out there who use their powers for... Read More

Phishing-Based Scams: A Couple of New Ones

Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More

Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and Worms

Never before with Instant Messaging (IM) has a more vital... Read More

Behavior to Stay Safer Online

1. Importance of a Virus Scanner: A Antivirus program can... Read More

Don?t Become An Identity Fraud Statistic!

"You've just won a fabulous vacation or prize package! Now,... Read More

How to Protect Your Child from the Internet

When the Internet first came about, it was realized it... Read More

Criminals are Fishing For Your Identity

What is Phishing? In a typical Phishing attack, a criminal... Read More

Crack The Code - Thats A Direct Challenge

I Challenge You To Crack The Code ------------------------------------- I had... Read More

How To Avoid Hackers From Destroying Your Site?

Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More

Web and Computer Security

Well, if that would have been said to me by... Read More

Social Engineering: You Have Been A Victim

Monday morning, 6am; the electric rooster is telling you it's... Read More

How to Manage Your Username and Password The Easy and Secure Way

Have been an Internet user for more than 9 years,... Read More

A Painless Plagiarism Solution

A crowded marketplace can lead to unethical webmasters using underhand... Read More