Internet scammers casting about for people's financial information have a new way to lure unsuspecting victims; it's called 'phishing'. Phishing is a high-tech scam that uses spam or pop-up messages to deceive you into disclosing your credit card numbers, bank account information, Social Security Number, passwords, or other sensitive information. Take a note if there are irregularity listings on address and other basic data. Don t answer directly from your landline telephone, nor you d reply straight to the caller in his telephone or mobile unit for any demand on your personal identity number, or number. Queries needing response that you find doubtful should be replied direct to the office referred to, in the call. If you must write it down in a document then secure it with a password or delete it before turning off your laptop or personal computer. 7. Avoid charging a high bill on one credit card. This could lead to unwanted attention on your finances. Try to use two cards on expensive purchase. 8. Limit your use of Automated Teller machines (ATM). It makes a lot of sense hiring them and turning them into constructive allies for the benefit of many people. There are accounts of success stories about this. Internet security starts individually. One must not carelessly give identity in all web forms they encounter in every visited websites. Being in the Internet means being responsible for every data transfer in every keyboard interaction. Identity theft happens when one makes use of your personal information without your knowledge to create fraud and other crimes. With the advent of the computer and the Internet, it has made such a crime more prevalent, making more and more people susceptible. Even the proliferation of credit cards and its growing use in the world today has made it easier for more criminals to commit identity theft. Households, telephone booths, and garbage areas are common places where criminals loiter around to look for their prey. Thieves simply want it the easiest way to earn without exerting much effort. If a culprit gets into hands-on control of one s number, it could be a start of a cycle of indefinite crimes against the legitimate owner, would lead the poor victim and his family into rubbles of chaos that can t easily be repaired.
Share This Page