Child ID theft
Child identity theft is a type of theft that
can go hidden for many years until the child has grown into an
adult. By then, the damage to their identity from the theft has
already been inflicted.
Tax ID theft
This occurs when a social security number is
stolen and used to file tax returns by anyone other than the owner
of the SSN.
Medical ID theft
This type of theft occurs when someone
steals another person’s medical information or health insurance
data for medical services, or by billing false charges to the
policy holder’s company.
Social ID theft
Known nowadays as a ‘catfish,’ this kind of theft happens when
someone steals another person’s name, photographs, and other
personal information to create a fake social media account.
Identity theft
The Debt Consolidation Care website created
a guide on what actions you can take if you’re a victim of identity
theft. According to their statistics, 20 people are fall victim to
identity theft every minute, equaling about 10 million cases a
year. The 5 steps that should be taken in the event of identity
theft are as follows:
1.
Have a fraud alert
placed on your credit files and observe
your credit reports carefully
It is best to contact all the concerned
reporting agencies and have them place a fraud alert on your credit
report. They will then ask for a ‘victim’s statement’ and request
to be notified of any changes to current or new accounts.
2.
Close any accounts which you think are compromised or
don’t remember opening
This can be done by calling the creditor and
requesting the account to be ‘closed by creditor’s request,’ so
that your credit report is not negatively affected. Then get a
report of the fraudulent charges made on that account.
3.
File a complaint with
the Federal Trade Commission (FTC)
You can do this online or over the phone by
calling the Identity Theft Hotline.
4.
Contact local law
enforcement where the theft took place and file a complaint with
them
Submit as much proof as possible to law
enforcement. Don’t forget to include the FTC complaint form filed
from step 3.
5.
Change all your passwords
If your ATM or debit card is involved, you
should change the PIN. Add challenging passwords to any account
that does not currently have one. Activate multi-factor
authentication on all sensitive accounts. For banking accounts you
can request a physical keyfob to verify identity access.
Top data breaches
With the advancements made in the methods
that hackers use, large corporations had a taste of their wrath
when their systems were hacked into, and customer information was
left exposed and vulnerable. A list of the top attacks derived from
Huffington Post shows the extent of cyberattacks that corporations
and businesses have experienced. Please note, this list only
includes cases where hackers have externally retrieved a company’s
accounts, not from entities within the establishment.
Sony
In April 2017, Sony told its customers that
hackers had stolen classified information from 77 million user
accounts. This resulted in the company temporarily shutting down
the PlayStation Network.
Anthem
In January 2015, the health insurance
company, Anthem, had their records hacked and this resulted in the
extensive information of 80 million customers being
exposed.
Heartland payment systems
F rom 2006
to 2008, hackers successfully breached a widely-used payment processing system and took the financial
information of nearly 130 million customers.
eBay
The multinational, e-commerce corporation
advised users to change their passwords in 2014 after a data breach
uncovered customer names, addresses, birthdates, and encrypted
passwords of 148 million users. Luckily, none of the credit or
debit card information was compromised as it was stored separately
from the other information.
Prominent American businesses
The largest cybercrime on file to date, occurred during
2005-2013 when a hacking group out of Ukraine and Russia attacked
banks and large companies such as Nasdaq, JC Penny, JetBlue, and
7-11. The hackers successfully stole 160 million bank card numbers
and breached 800,000 bank accounts (Liga
to, 2015 ).
The Dark Web
It is essential that proper steps are
explained throughout this book to certify that personal data will
never end up in the hands of the wrong person or sold on the dark
web.
Imagine the World Wide Web as an iceberg.
The top of the iceberg that is sticking out of the water, and is
visible, is called the ‘public web.’ This is the part of the
internet that anyone can access and find using a search engine.
Right beneath the public web is the deep web. The deep web is a
place that refers to anything on the internet that cannot be found
using a search engine. In order to access this part of the web,
users need passwords or direct URLs to access specific content.
Finally, right below the deep web, we have the dark web. This is
the part of the internet that a lot of people are unaware of and
do not have access to. The only way to
access this part of the web is through using certain software
specialized for the task. In simpler terms, the dark web is
composed of websites and networks that are heavily encrypted and
concealed from the typical internet user (Betts, 2016).
In the dark web, special markets called
‘darknet markets’ operate by making a profit from selling illegal
products like drugs, firearms, pornography, etc. A lot of these
transactions are made using untraceable cryptocurrencies like
bitcoin. The dark web has become a place where groups who want to
remain hidden from the government and law enforcement agencies
gather. Instead of going further into detail about the dark web,
what’s only important is that people are aware of its existence.
Hackers and cybercriminals use their sophisticated methods in order
to steal private information that they can profit from by selling
the stolen information on the dark web.