Identity Theft - Dont Blame The Internet

Identity theft ? also known as ID theft, identity fraud and ID fraud ? describes a type of fraud where a criminal adopts someone else's identity in order to profit illegally. It is one of the fastest growing forms of fraud in many developed countries.

In the UK identity theft is increasing at the rate of 500% each year and, according to Which Magazine, 25% of the population have either suffered from identity theft or know someone who has.

In the USA, a report issued by the Better Business Bureau revealed that, in 2004, over 9 million Americans became victims of identity theft with the total sum defrauded being $52.6 billion.

With figures like this, it's no surprise that there is a certain amount of concern regarding computer and internet security. After all, the internet is basically a mechanism for exchanging information and the possibility that some of the information exchanged may be more than intended is never far from many internet user's minds.

It's easy to imagine criminal masterminds worldwide using the internet to hack into computers in order to gain access to information with which to advance their devilishly cunning schemes. However, as revealed in the report, the facts of the matter are a little more down to earth and the internet, far from making you more at risk to identity theft, can help to significantly cut your losses if you do fall victim this form of fraud.

According to the Better Business Bureau's research the main methods by which criminals gain access to information used for identity theft fraud are as below:

  • Lost or stolen wallet, chequebook or credit card. 28.8%
  • Accessed as part of a transaction. 12.9%*
  • Accessed by friend, acquaintance or relative. 11.4%
  • Don't know, refused, no answer. 11.1%
  • Information accessed by corrupt employee. 8.7%
  • Stolen paper mail or fraudulent change of address. 8.0%
  • Obtained some other way. 7.4%
  • Computer spyware. 5.2%
  • Information stolen from garbage. 2.6%
  • Computer viruses and/or hackers. 2.2%
  • Emails sent by criminals posing as legitimate business. 1.7%
  • * 12.9% due to transactions ? 10.4% offline transactions, 2.5% online transactions.

    In total, when the instances where information was accessed during transactions are subdivided into online and offline transactions, only 11.6% of the information used to carry out identity theft fraud was obtained from computers.

    Of this more than half was obtained by the use of spyware, viruses or hacking ? the risk of which can be greatly reduced by installing the appropriate protection software and ensuring that this is kept up to date.

    Not only did the survey reveal that the internet was not a major source of illegally obtained personal information, but it was also found that those fraud victims who checked their financial records using the internet, ATM machines or other electronic methods suffered financial losses which were, on average, 8 times lower than those of victims who used traditional paper statements to monitor their accounts. This very significant reduction was attributed to the rapid discovery of the fraud due to "real time" monitoring.

    Of course, that's not to say that you shouldn't exercise caution when using the internet or take care to protect the personal information which you may have stored on your PC. However, as long as you install suitable virus, firewall and spyware protection, and keep this continually updated the internet can should be more of a help than a hindrance when it comes to avoiding identity fraud.

    Hamish Hayward
    Don't become a victim. Find out the facts about identity theft.
    http://www.id-theft-info.com/

    In The News:


    pen paper and inkwell


    cat break through


    Passwords or Pass Phrase? Protecting your Intellectual Property

    Much has been said on the theory of password protection... Read More

    Delete Cookies: New-Age Diet or Common Sense Internet Security?

    No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More

    Remove Rogue Desktop Icons Created By Spyware

    If you have used a Windows machine for a while,... Read More

    Personal Firewalls - Secure Your Computer

    There has not been a time in the history of... Read More

    Instant Messaging ? Expressway for Identity Theft, Trojan Horses, Viruses, and Worms

    Never before with Instant Messaging (IM) has a more vital... Read More

    Securing Your Accounts With Well-Crafted Passwords

    In the past I've never really paid much attention to... Read More

    Identity Theft Offline -- So Many Possibilities

    Chris Simpson, head of Scotland Yard's computer crime unit was... Read More

    Reclaim Your PC from the Internet Spies

    Viruses are, however, not the only malicious software programs out... Read More

    Why you Must Secure your Digital Product and Thank You Web Page

    A couple of years back, I paid my dues the... Read More

    6 Ways To Prevent Identity Theft

    These six ways to prevent identity theft offer you valuable... Read More

    The Importance of Protecting Your PC from Viruses and Spam

    Today the internet is a mine field of malicious code... Read More

    Make Money Online - Defend Against The Latest Scam

    First, let's do a little recap'. As I stated in... Read More

    Dont Allow Hackers to Take Out Money from Your Bank Account

    If you know what is the 'Fishing' then it's very... Read More

    A Painless Plagiarism Solution

    A crowded marketplace can lead to unethical webmasters using underhand... Read More

    Anti-Spyware Protection: Behind How-To Tips

    There is no doubt that "how-to articles" have become a... Read More

    How To Clean the Spies In Your Computer?

    Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More

    Identity Theft - Dont Blame The Internet

    Identity theft ? also known as ID theft, identity fraud... Read More

    Mail Forwarding - Why Would You Do It?

    First of all we need to get some terms stated.... Read More

    Phishing-Based Scams: A Couple of New Ones

    Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More

    Top Five Spyware Fighting Tips

    Spyware and adware are becoming major problems for online surfers... Read More

    Phishing - A High Tech Identity Theft With A Low Tech Solution

    Have you ever got an email asking you to confirm... Read More

    All About Computer Viruses

    Your computer is as slow as molasses. Your mouse freezes... Read More

    What to Look for before You Purchase Spyware Software

    Huge number of spyware software applications are available in the... Read More

    Corporate Security for Your Home Business

    The words Corporate Security may conjure up images of a... Read More

    IPv6 - Next Step In IP Security

    IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More

    Viruses and Worms: The Problems and Their Solutions

    History and BackgroundThe virus was one of the first ever... Read More

    Dont be a Dork ? Protect Yourself

    There are folks out there who use their powers for... Read More

    How To Cover Your Tracks On The Internet

    Every single time you access a website, you leave tracks.... Read More

    Are They Watching You Online?

    When surfing the Internet you probably take your anonymity for... Read More

    The One Critical Piece Of Free Software Thats Been Overlooked

    Can You Prevent Spyware, Worms, Trojans, Viruses, ... To Work... Read More

    Traditional Antivirus Programs Useless Against New Unidentified Viruses!

    Every now and then you can read about a new... Read More

    SPYWARE - Whos Watching Who?

    I am in the midst of Oscar Wilde's The Picture... Read More

    3 Things You Must Know About Spyware

    1)Spyware is on your system. Like it or not, statistically... Read More