Monday, January 22, 2007

Why It Works

One of the reasons that computer identity theft works so well is that the e-mails look official. Sometimes they even redirect the consumer to a site that looks exactly like they would expect the site to look. They also make the consumer feel as though if they do not do something about the information in the e-mail, their account will be in serious jeopardy, or an expensive charge will be made to their account that they did not intend. The sense of urgency created by computer identity theft is one reason why it is so successful.

How to Protect Yourself

To protect yourself from computer identity theft, start by installing an anti-spy ware program on your computer. Run it before doing any financial work online. This program will scan your computer for programs that record your personal information and send it to a third party. Remove these programs before you do anything online that could give your personal information away.

Second, do not click on e-mails that look like they are from a company or agency, no matter how official. Instead, type in the address of the e-mail and put in your password. This ensures that you will not be taken for a ride, because you know the website address of the company.

Finally, only do online business with secure sites. Never give your social security address out over the Internet. These two tips will go a long way to keeping you safe from computer identity theft.

Everything You Need To Know About Computer Identity Theft

Computer identity theft is a growing problem facing consumers, as more and more people are turning to the Internet for their shopping needs. Predators are using the power of the Internet to steel the information from unsuspecting victims. Computer identity theft usually starts with an e-mail. The e-mail is sent from what looks to be a reputable agency or business that the person has reason to deal with, such as the IRS, Ebay, or a credit card company. The e-mail tells the reader that something has happened to them, such as an audit or a problem with their credit card, and all they need to do is respond to the e-mail with their information, or Social Security number, and the problem will be fixed.

The minute the consumer responds to this e-mail, the computer identity theft begins. The scammer immediately begins to use their identity online to make purchases, clear bank accounts, and even take out loans. The sad truth about identity theft is that the person whose identity is used to make the fraudulent purchases is often responsible for them. This can lead to financial disaster, particularly for people who are in a dangerous place financially.