A | B |
Stealing | Information is taken from a purse or wallet, personnel records from a workplace, tax information, bank or credit card statements, or pre-approved credit card offers from the mail. |
Diverting Mail | Thieves can complete a change of address form and have the victim’s bills and statements mailed to a different location. |
“Dumpster Diving” | Personal information is discarded and thieves remove it from the trash. |
Skimming | Thieves attach a device to card processors to steal credit and debit card information |
Phishing | Thieves use a form of electronic communication (usually email) to pretend to be a company or depository institution in order to get the victim to give up their personal information. |
Pretexting | Thieves use false pretenses to obtain your personal information from financial institutions, telephone companies, and other sources. |
Spyware | Software installed on the victim’s computer, without their knowledge or consent, that monitors internet use, sends pop up ads, re-directs the computer to other sites, and tracks key strokes. |
Hacking | Information is stolen by breaking into a computer system. |