Credit Education 101
Website CertifiedPrivacy Protected
Credit Education > Identity Theft > Going Phishing for Identity

Going Phishing for Identity

By Janet Lacey
Published: Thursday, December 24th, 2009

Identity thieves after exhausting the most reliable ways of getting information from the owners themselves like dumpster diving and shouldering have learned new ways of obtaining information for fraudulent use. Identity theft is now a cyber crime which means it can be committed through the internet.

The billions of revolving information in the internet make identity thievery in the web easier to conceal. A few letters deviation from the original website can result to cyber phishing. Every day a lot of people around the globe simultaneously receive e-mails on company promos and even rewards. To verify the name and identity of the person claiming the promo, companies require some personal information. The information that they require is enough to get hold of someone’s identity and used it for personal benefits.

Cyber Phishing is usually committed by identity thieves by hiding through the emails sent by legitimate banks, retailers, organizations and even the federal government. Identity theft is committed using back links and links that will divert the legitimate web activity like filling up an online personal data sheet to a back link that mimics the form for other illegitimate parties. There are a lot of reasons which are made up by the online thieves themselves to get hold of someone’s personal information.

The common reasons would include the need to confirm an account which has been closed or activated, someone is supposedly claiming to purchase under the name of the victim and even to claim a free vacation or high rebates. There are many reasons that can be used by the thieves and knowing those that are fraudulent is the hard part.

Cyber phishing is responsible for almost 50%of the total reported cases of identity theft. It is large part of the whole crime rate especially when it is translated to the millions of dollars losses which are incurred because of this crime.

Phishing emails can be set apart from the legitimate emails if the recipients of these emails are knowledgeable enough with their differences. Legitimate emails would have a specific addressed individual. Phishing emails would probably have a generic greeting and addressing style; the millions of email addresses that thieves are phishing make it hard for them to specifically address everyone. Phishing emails would probably sound as something urgent and can jeopardize the well being of the individual. Many cases of identity theft are made through quick responses without much thinking in the part of the victims.

Back links are the main playground of cyber phishing thieves. By omitting just a few letters from the official websites the prospect victims are being directed to new web pages with the same content except it is not official. Attachments with identity stealing software are being sent to millions of internet users. Opening the attachment will automatically direct the computer to send personal information of the recipient to the sender of the attachments. Nowadays, identity theft can already be committed with just the social security number of the victim. Stopping this crime is proving to be a hard task, but there are ways wherein possible victims are given chances to prepare for possible attacks on their identity. As for the case of cyber phishing, vigilance is the only way to be a survivor of identity theft.

No Comments

No comments yet.

RSS feed for comments on this post.

Sorry, the comment form is closed at this time.