A | B |
identity cloning | encompasses all types of ID theft where someone steals and uses a person's personal data that involves fraud or deception |
phishing | using emails or text messages to get access to personal information. Emails come from look-alike websites that victims regularly visit |
pharming | hackers redirect website traffic to a hoax site--criminals wait for victims to enter their personal information to capture personal information from victims |
smishing | victims receive a text message to lure them into revaling account information or install malware |
cell phone hacking | hacker gains control of victim's cell phone to obtain personal information and confidential data |
malware | computer hackers gain access or cause damage to a computer or network. The victim doesn't realize the crime has happened. |
vishing | using the phone in the name of a business in an attempt to find out personal information the unsuspecting victim tells criminal personal information and details |
bot | internet robots used to gain control of a computer. Hackers gather passowrds, Log keystrokes and introduces viruses or malicious code onto your computer |
What you should carry in your wallet or purse | Only what you need--medical insurance card, driver's license, debit card and/or credit card |
Ways to prevent ID Cloning | limit amount of personal information/Review your credit card bills/obtain a copy of your credit report a least once a year/ |
Steps to take if you become a victim of ID theft | Contact your bank and credit card issuers/Call and notify banks and credit cards that were opened fraudulently/File a report with the FTC/Contact creditors involved in the ID Theft/Submit all documentation to the Rochester Police Department |