www.spokeo.com Open in urlscan Pro
54.189.109.202  Public Scan

Submitted URL: https://click.mail4.spokeo.com/?qs=fd1537e9359decc9aeb95d23afd73e60ec8ff22398b967b20c3d8dcbe7d902f29099a76f3761c9ffb71eb0945531...
Effective URL: https://www.spokeo.com/compass/8-types-of-identity-theft/?g=_em_blog__202109.blog.a_asn&utm_medium=email&utm_source=blo...
Submission: On September 29 via api from US — Scanned from DE

Form analysis 5 forms found in the DOM

GET https://www.spokeo.com/compass/

<form role="search" method="get" id="searchform" action="https://www.spokeo.com/compass/">
  <div>
    <input type="text" class="search-input" placeholder="Type and hit enter..." name="s" id="s">
  </div>
</form>

GET https://www.spokeo.com/compass/

<form role="search" method="get" id="searchform" action="https://www.spokeo.com/compass/">
  <div>
    <input type="text" class="search-input" placeholder="Type and hit enter..." name="s" id="s">
  </div>
</form>

Name: searchGET https://www.spokeo.com/search/

<form name="search" class="spokeo-search" action="https://www.spokeo.com/search/" method="get">
  <input type="text" name="q" value="" placeholder="Enter Phone Number">
  <input type="submit" name="SEARCH NOW" value="search" class="btn-search">
</form>

POST https://www.spokeo.com/compass/wp-admin/admin-post.php?action=mailpoet_subscription_form

<form target="_self" method="post" action="https://www.spokeo.com/compass/wp-admin/admin-post.php?action=mailpoet_subscription_form" class="mailpoet_form mailpoet_form_form mailpoet_form_widget" novalidate="" data-delay="" data-exit-intent-enabled=""
  data-font-family="">
  <input type="hidden" name="data[form_id]" value="3">
  <input type="hidden" name="token" value="f670a543f2">
  <input type="hidden" name="api_version" value="v1">
  <input type="hidden" name="endpoint" value="subscribers">
  <input type="hidden" name="mailpoet_method" value="subscribe">
  <label class="mailpoet_hp_email_label">Please leave this field empty<input type="email" name="data[email]"></label>
  <div class="mailpoet_paragraph "><input type="email" class="mailpoet_text" name="data[form_field_N2U3MTQ2NTNjNGM2X2VtYWls]" title="Your Email" value=""
      style="width:100%;background-color:#ffffff;border-style:solid;border-radius:2px !important;border-width:0px;border-color:#313131;padding:11px;margin: 0 auto 0 0;font-size:14px;line-height:1.5;height:auto;" data-automation-id="form_email"
      placeholder="Your Email *" data-parsley-required="true" data-parsley-minlength="6" data-parsley-maxlength="150" data-parsley-error-message="Please specify a valid email address." data-parsley-required-message="This field is required."></div>
  <div class="mailpoet_paragraph last"><input type="submit" class="mailpoet_submit" value="SUBSCRIBE" data-automation-id="subscribe-submit-button"
      style="width:100%;background-color:#33393c;border-style:solid;border-radius:2px !important;border-width:0px;border-color:#313131;padding:11px;margin: 0 auto 0 0;font-size:14px;line-height:1.5;height:auto;color:#ffffff;font-weight:bold;"><span
      class="mailpoet_form_loading"><span class="mailpoet_bounce1"></span><span class="mailpoet_bounce2"></span><span class="mailpoet_bounce3"></span></span></div>
  <div class="mailpoet_message">
    <p class="mailpoet_validate_success" style="display:none;">Thanks for subscribing! Check your inbox or spam folder now to confirm your subscription. </p>
    <p class="mailpoet_validate_error" style="display:none;"> </p>
  </div>
</form>

Name: searchGET https://www.spokeo.com/search/

<form name="search" class="spokeo-search" action="https://www.spokeo.com/search/" method="get">
  <input type="text" name="q" value="" placeholder="Enter First and Last Name">
  <input type="submit" name="Search" value="search" class="btn-search">
</form>

Text Content

 * Company
   * All Community Culture Press Recruiting Team Tech Blog
     Dating
     
     
     HOW TO DO A CATFISH PHONE NUMBER SEARCH…
     
     Tech Blog
     
     
     RAILS RENDERING IS SLOW – WE USE A…
     
     Tech Blog
     
     
     WHAT’S THE FASTEST WAY TO STORE INTERMEDIATE RESULTS…
     
     Tech Blog
     
     
     A GUIDE TO TERRAFORM PRE-COMMIT HOOKS
     
     Community
     
     
     PEOPLE OF PASADENA: AARON WHEELER
     
     Community
     
     
     TAKEAWAYS FROM GENERAL ASSEMBLY
     
     Community
     
     
     GA & SPOKEO PRESENT: HOW TO BUILD A…
     
     Community
     
     
     SPOKEO SEARCH ANGEL REUNION: ERIKA, BRANDY AND REBECCA
     
     Culture
     
     
     SPOKEO CEO SHOWS YOU HOW TO CRUSH ANY…
     
     Culture
     
     
     CELEBRATING TEN YEARS!
     
     Culture
     
     
     SPOKEO CELEBRATES 10TH ANNIVERSARY WITH #SPOKEOTURNS10 SWEEPSTAKES
     
     Culture
     
     
     SPOKEO LIFE: KIDS DAY
     
     Press
     
     
     HOW TO DO A CATFISH PHONE NUMBER SEARCH…
     
     Press
     
     
     SPOKEO ON ORANGE IS THE NEW BLACK
     
     Press
     
     
     SPOKEO ACHIEVES ISO 27001:2013 CERTIFICATION FOR STATE-OF-THE-ART
     INFORMATION…
     
     Press
     
     
     SPOKEO RANKS #110 ON THE 2017 ENTREPRENEUR 360™…
     
     Recruiting
     
     
     WHY COMPANIES SHOULD SUPPORT EMPLOYEE-LED INITIATIVES
     
     Recruiting
     
     
     FIVE REASONS WHY SPOKEO LOVES PASADENA
     
     Recruiting
     
     
     SPOKEO’S APPROACH TO INTERVIEWING
     
     Recruiting
     
     
     CUSTOMER CARE JOB FAIR – 5/19/2015
     
     Team
     
     
     HONORING OUR WORLD-CLASS CUSTOMER CARE TEAM
     
     Team
     
     
     WHY PEOPLE WANT TO WORK AT SPOKEO
     
     Team
     
     
     HOW SPOKEO SAVED TIME WITH LAZYMAP
     
     Team
     
     
     HOW A SPOKEO INTERN IS BRIDGING TECH’S GENDER…
     
     Tech Blog
     
     
     RAILS RENDERING IS SLOW – WE USE A…
     
     Tech Blog
     
     
     WHAT’S THE FASTEST WAY TO STORE INTERMEDIATE RESULTS…
     
     Tech Blog
     
     
     A GUIDE TO TERRAFORM PRE-COMMIT HOOKS
     
     Tech Blog
     
     
     SEMANTIC VERSIONING
 * Product
   * All Product Updates Product Usage
     Guides
     
     
     HOW TO SEARCH & FIND SOMEONE’S PHONE NUMBER
     
     Guides
     
     
     WHAT CAN A CELL NUMBER LOOKUP FIND?
     
     Guides
     
     
     HOW TO TRACK A PHONE NUMBER
     
     Guides
     
     
     WHO IS CALLING ME? HOW TO TELL IF…
     
     Product Updates
     
     
     WHO IS CALLING ME? HOW TO TELL IF…
     
     Product Updates
     
     
     SPOKEO INTRODUCES INVESTIGATIVE TOOL FOR LAW ENFORCEMENT
     
     Product Updates
     
     
     NEW TO SPOKEO: PROPERTY OWNERS & RESIDENTS
     
     Product Updates
     
     
     SPOKEO EXPANDS ADDRESS MAPS
     
     Product Usage
     
     
     HOW TO SEARCH & FIND SOMEONE’S PHONE NUMBER
     
     Product Usage
     
     
     WHAT CAN A CELL NUMBER LOOKUP FIND?
     
     Product Usage
     
     
     HOW TO TRACK A PHONE NUMBER
     
     Product Usage
     
     
     LEARN HOW YOU CAN FIND AN ADDRESS USING…
 * Stories
   * All Businesses Connectors Consumers Protectors
     Connectors
     
     
     SENDING A GIFT: HOW SPOKEO HELPED A USER…
     
     Dating
     
     
     INVESTIGATING INFIDELITY
     
     Connectors
     
     
     A CARING NEIGHBOR
     
     Connectors
     
     
     A LIFE-CHANGING ENCOUNTER
     
     Businesses
     
     
     SPOKEO COMMUNITY GRANT PROGRAM HIGHLIGHT: FAMILY SERVICES OF…
     
     Businesses
     
     
     ADOPTEES FIND A WHOLE NEW WORLD OF RESOURCES…
     
     Businesses
     
     
     HOW SPOKEO HELPED A MOM FIND HER MISSING…
     
     Businesses
     
     
     3 WAYS YOU CAN USE SPOKEO FOR YOUR…
     
     Connectors
     
     
     SENDING A GIFT: HOW SPOKEO HELPED A USER…
     
     Connectors
     
     
     A CARING NEIGHBOR
     
     Connectors
     
     
     A LIFE-CHANGING ENCOUNTER
     
     Connectors
     
     
     NEW HOUSE, NEW FRIENDSHIP
     
     Consumers
     
     
     HOW SPOKEO HELPED BETTE PREVENT INSURANCE FRAUD
     
     Consumers
     
     
     3 WAYS YOU CAN USE SPOKEO FOR YOUR…
     
     Consumers
     
     
     SPOKEO HELPS A 50-YEAR HIGH SCHOOL REUNION
     
     Consumers
     
     
     AN OLD MAN, HIS SON, AND A STORM
     
     Protectors
     
     
     INVESTIGATING INFIDELITY
     
     Protectors
     
     
     CASE OF THE MISSING SON
     
     Protectors
     
     
     TOO GOOD TO BE TRUE
     
     Protectors
     
     
     MAMA BEAR TO THE RESCUE
 * Advice & How-To
   * All Dating Family Friends Fun Guides Identity Relationships Safety
     Identity
     
     
     SHOULDER SURFING IS THE LOW-TECH IDENTITY THEFT THREAT…
     
     Identity
     
     
     FAKE LETTERS FROM SOCIAL SECURITY: MAIL FRAUD IS…
     
     Identity
     
     
     HOW SECURE IS YOUR ONLINE IDENTITY? THE ANSWER…
     
     Dating
     
     
     TOO GOOD TO BE TRUE: TINDER SCAMS TO…
     
     Dating
     
     
     TOO GOOD TO BE TRUE: TINDER SCAMS TO…
     
     Dating
     
     
     HOW TO TELL IF YOU’RE BEING CATFISHED (EVEN…
     
     Dating
     
     
     HOW TO FIND OUT IF SOMEONE IS MARRIED:…
     
     Dating
     
     
     INVESTIGATING INFIDELITY
     
     Family
     
     
     WHAT PARENTS SHOULD KNOW ABOUT TEEN DATING APPS
     
     Family
     
     
     IS TIKTOK SAFE? WHAT PARENTS SHOULD KNOW ABOUT…
     
     Family
     
     
     INTERNET SAFETY FOR KIDS: BEWARE OF POPULAR WEBSITES
     
     Family
     
     
     TIPS FOR KEEPING YOUR CHILD SAFE ON REDDIT
     
     Friends
     
     
     HOW TO PLAN A HIGH SCHOOL REUNION
     
     Friends
     
     
     A GUIDE TO RECONNECTING WITH OLD FRIENDS
     
     Friends
     
     
     VETERANS GROUPS: WHICH ONE IS RIGHT FOR YOU?
     
     Friends
     
     
     HOW TO MAKE FRIENDS ONLINE
     
     Fun
     
     
     HOW TO SCARE (OR AT LEAST ANNOY) A…
     
     Fun
     
     
     THE 10 MOST POPULAR COMPASS ARTICLES OF 2020
     
     Fun
     
     
     DOES A FEBRUARY 29 LEAP YEAR BIRTHDAY MAKE…
     
     Fun
     
     
     THE 12 MOST-SEARCHED PEOPLE OF JANUARY 2019
     
     Guides
     
     
     HOW TO SCARE (OR AT LEAST ANNOY) A…
     
     Guides
     
     
     HOW TO FIND OUT IF SOMEONE IS MARRIED:…
     
     Guides
     
     
     HOW TO SEARCH & FIND SOMEONE’S PHONE NUMBER
     
     Guides
     
     
     DARK WEB VS. DEEP WEB: WHAT’S THE DIFFERENCE?
     
     Identity
     
     
     SHOULDER SURFING IS THE LOW-TECH IDENTITY THEFT THREAT…
     
     Identity
     
     
     FAKE LETTERS FROM SOCIAL SECURITY: MAIL FRAUD IS…
     
     Identity
     
     
     HOW SECURE IS YOUR ONLINE IDENTITY? THE ANSWER…
     
     Identity
     
     
     UP YOUR SECURITY GAME BY LEARNING TO ENCRYPT…
     
     Relationships
     
     
     WANT TO FIND OUT IF YOUR PARTNER IS…
     
     Relationships
     
     
     HOW THE 5 LOVE LANGUAGES CAN IMPROVE YOUR…
     
     Relationships
     
     
     HOW TO REKINDLE LONG LOST LOVE
     
     Relationships
     
     
     DATING A CHEATER? HOW TO FIND HIDDEN APPS…
     
     Safety
     
     
     SHOULDER SURFING IS THE LOW-TECH IDENTITY THEFT THREAT…
     
     Safety
     
     
     TOO GOOD TO BE TRUE: TINDER SCAMS TO…
     
     Safety
     
     
     HOW TO TELL IF YOU’RE BEING CATFISHED (EVEN…
     
     Safety
     
     
     BUY, SELL, CHEAT: MERCARI SCAMS TO WATCH OUT…
 * Phone Lookup


 * Company
   * All Community Culture Press Recruiting Team Tech Blog
     Dating
     
     
     HOW TO DO A CATFISH PHONE NUMBER SEARCH…
     
     Tech Blog
     
     
     RAILS RENDERING IS SLOW – WE USE A…
     
     Tech Blog
     
     
     WHAT’S THE FASTEST WAY TO STORE INTERMEDIATE RESULTS…
     
     Tech Blog
     
     
     A GUIDE TO TERRAFORM PRE-COMMIT HOOKS
     
     Community
     
     
     PEOPLE OF PASADENA: AARON WHEELER
     
     Community
     
     
     TAKEAWAYS FROM GENERAL ASSEMBLY
     
     Community
     
     
     GA & SPOKEO PRESENT: HOW TO BUILD A…
     
     Community
     
     
     SPOKEO SEARCH ANGEL REUNION: ERIKA, BRANDY AND REBECCA
     
     Culture
     
     
     SPOKEO CEO SHOWS YOU HOW TO CRUSH ANY…
     
     Culture
     
     
     CELEBRATING TEN YEARS!
     
     Culture
     
     
     SPOKEO CELEBRATES 10TH ANNIVERSARY WITH #SPOKEOTURNS10 SWEEPSTAKES
     
     Culture
     
     
     SPOKEO LIFE: KIDS DAY
     
     Press
     
     
     HOW TO DO A CATFISH PHONE NUMBER SEARCH…
     
     Press
     
     
     SPOKEO ON ORANGE IS THE NEW BLACK
     
     Press
     
     
     SPOKEO ACHIEVES ISO 27001:2013 CERTIFICATION FOR STATE-OF-THE-ART
     INFORMATION…
     
     Press
     
     
     SPOKEO RANKS #110 ON THE 2017 ENTREPRENEUR 360™…
     
     Recruiting
     
     
     WHY COMPANIES SHOULD SUPPORT EMPLOYEE-LED INITIATIVES
     
     Recruiting
     
     
     FIVE REASONS WHY SPOKEO LOVES PASADENA
     
     Recruiting
     
     
     SPOKEO’S APPROACH TO INTERVIEWING
     
     Recruiting
     
     
     CUSTOMER CARE JOB FAIR – 5/19/2015
     
     Team
     
     
     HONORING OUR WORLD-CLASS CUSTOMER CARE TEAM
     
     Team
     
     
     WHY PEOPLE WANT TO WORK AT SPOKEO
     
     Team
     
     
     HOW SPOKEO SAVED TIME WITH LAZYMAP
     
     Team
     
     
     HOW A SPOKEO INTERN IS BRIDGING TECH’S GENDER…
     
     Tech Blog
     
     
     RAILS RENDERING IS SLOW – WE USE A…
     
     Tech Blog
     
     
     WHAT’S THE FASTEST WAY TO STORE INTERMEDIATE RESULTS…
     
     Tech Blog
     
     
     A GUIDE TO TERRAFORM PRE-COMMIT HOOKS
     
     Tech Blog
     
     
     SEMANTIC VERSIONING
 * Product
   * All Product Updates Product Usage
     Guides
     
     
     HOW TO SEARCH & FIND SOMEONE’S PHONE NUMBER
     
     Guides
     
     
     WHAT CAN A CELL NUMBER LOOKUP FIND?
     
     Guides
     
     
     HOW TO TRACK A PHONE NUMBER
     
     Guides
     
     
     WHO IS CALLING ME? HOW TO TELL IF…
     
     Product Updates
     
     
     WHO IS CALLING ME? HOW TO TELL IF…
     
     Product Updates
     
     
     SPOKEO INTRODUCES INVESTIGATIVE TOOL FOR LAW ENFORCEMENT
     
     Product Updates
     
     
     NEW TO SPOKEO: PROPERTY OWNERS & RESIDENTS
     
     Product Updates
     
     
     SPOKEO EXPANDS ADDRESS MAPS
     
     Product Usage
     
     
     HOW TO SEARCH & FIND SOMEONE’S PHONE NUMBER
     
     Product Usage
     
     
     WHAT CAN A CELL NUMBER LOOKUP FIND?
     
     Product Usage
     
     
     HOW TO TRACK A PHONE NUMBER
     
     Product Usage
     
     
     LEARN HOW YOU CAN FIND AN ADDRESS USING…
 * Stories
   * All Businesses Connectors Consumers Protectors
     Connectors
     
     
     SENDING A GIFT: HOW SPOKEO HELPED A USER…
     
     Dating
     
     
     INVESTIGATING INFIDELITY
     
     Connectors
     
     
     A CARING NEIGHBOR
     
     Connectors
     
     
     A LIFE-CHANGING ENCOUNTER
     
     Businesses
     
     
     SPOKEO COMMUNITY GRANT PROGRAM HIGHLIGHT: FAMILY SERVICES OF…
     
     Businesses
     
     
     ADOPTEES FIND A WHOLE NEW WORLD OF RESOURCES…
     
     Businesses
     
     
     HOW SPOKEO HELPED A MOM FIND HER MISSING…
     
     Businesses
     
     
     3 WAYS YOU CAN USE SPOKEO FOR YOUR…
     
     Connectors
     
     
     SENDING A GIFT: HOW SPOKEO HELPED A USER…
     
     Connectors
     
     
     A CARING NEIGHBOR
     
     Connectors
     
     
     A LIFE-CHANGING ENCOUNTER
     
     Connectors
     
     
     NEW HOUSE, NEW FRIENDSHIP
     
     Consumers
     
     
     HOW SPOKEO HELPED BETTE PREVENT INSURANCE FRAUD
     
     Consumers
     
     
     3 WAYS YOU CAN USE SPOKEO FOR YOUR…
     
     Consumers
     
     
     SPOKEO HELPS A 50-YEAR HIGH SCHOOL REUNION
     
     Consumers
     
     
     AN OLD MAN, HIS SON, AND A STORM
     
     Protectors
     
     
     INVESTIGATING INFIDELITY
     
     Protectors
     
     
     CASE OF THE MISSING SON
     
     Protectors
     
     
     TOO GOOD TO BE TRUE
     
     Protectors
     
     
     MAMA BEAR TO THE RESCUE
 * Advice & How-To
   * All Dating Family Friends Fun Guides Identity Relationships Safety
     Identity
     
     
     SHOULDER SURFING IS THE LOW-TECH IDENTITY THEFT THREAT…
     
     Identity
     
     
     FAKE LETTERS FROM SOCIAL SECURITY: MAIL FRAUD IS…
     
     Identity
     
     
     HOW SECURE IS YOUR ONLINE IDENTITY? THE ANSWER…
     
     Dating
     
     
     TOO GOOD TO BE TRUE: TINDER SCAMS TO…
     
     Dating
     
     
     TOO GOOD TO BE TRUE: TINDER SCAMS TO…
     
     Dating
     
     
     HOW TO TELL IF YOU’RE BEING CATFISHED (EVEN…
     
     Dating
     
     
     HOW TO FIND OUT IF SOMEONE IS MARRIED:…
     
     Dating
     
     
     INVESTIGATING INFIDELITY
     
     Family
     
     
     WHAT PARENTS SHOULD KNOW ABOUT TEEN DATING APPS
     
     Family
     
     
     IS TIKTOK SAFE? WHAT PARENTS SHOULD KNOW ABOUT…
     
     Family
     
     
     INTERNET SAFETY FOR KIDS: BEWARE OF POPULAR WEBSITES
     
     Family
     
     
     TIPS FOR KEEPING YOUR CHILD SAFE ON REDDIT
     
     Friends
     
     
     HOW TO PLAN A HIGH SCHOOL REUNION
     
     Friends
     
     
     A GUIDE TO RECONNECTING WITH OLD FRIENDS
     
     Friends
     
     
     VETERANS GROUPS: WHICH ONE IS RIGHT FOR YOU?
     
     Friends
     
     
     HOW TO MAKE FRIENDS ONLINE
     
     Fun
     
     
     HOW TO SCARE (OR AT LEAST ANNOY) A…
     
     Fun
     
     
     THE 10 MOST POPULAR COMPASS ARTICLES OF 2020
     
     Fun
     
     
     DOES A FEBRUARY 29 LEAP YEAR BIRTHDAY MAKE…
     
     Fun
     
     
     THE 12 MOST-SEARCHED PEOPLE OF JANUARY 2019
     
     Guides
     
     
     HOW TO SCARE (OR AT LEAST ANNOY) A…
     
     Guides
     
     
     HOW TO FIND OUT IF SOMEONE IS MARRIED:…
     
     Guides
     
     
     HOW TO SEARCH & FIND SOMEONE’S PHONE NUMBER
     
     Guides
     
     
     DARK WEB VS. DEEP WEB: WHAT’S THE DIFFERENCE?
     
     Identity
     
     
     SHOULDER SURFING IS THE LOW-TECH IDENTITY THEFT THREAT…
     
     Identity
     
     
     FAKE LETTERS FROM SOCIAL SECURITY: MAIL FRAUD IS…
     
     Identity
     
     
     HOW SECURE IS YOUR ONLINE IDENTITY? THE ANSWER…
     
     Identity
     
     
     UP YOUR SECURITY GAME BY LEARNING TO ENCRYPT…
     
     Relationships
     
     
     WANT TO FIND OUT IF YOUR PARTNER IS…
     
     Relationships
     
     
     HOW THE 5 LOVE LANGUAGES CAN IMPROVE YOUR…
     
     Relationships
     
     
     HOW TO REKINDLE LONG LOST LOVE
     
     Relationships
     
     
     DATING A CHEATER? HOW TO FIND HIDDEN APPS…
     
     Safety
     
     
     SHOULDER SURFING IS THE LOW-TECH IDENTITY THEFT THREAT…
     
     Safety
     
     
     TOO GOOD TO BE TRUE: TINDER SCAMS TO…
     
     Safety
     
     
     HOW TO TELL IF YOU’RE BEING CATFISHED (EVEN…
     
     Safety
     
     
     BUY, SELL, CHEAT: MERCARI SCAMS TO WATCH OUT…
 * Phone Lookup


Home Advice & How-ToIdentity 8 Types of Identity Theft and How To Protect
Against Them

Home Advice & How-ToIdentity 8 Types of Identity Theft and How To Protect
Against Them
Identity


8 TYPES OF IDENTITY THEFT AND HOW TO PROTECT AGAINST THEM

by Fred Decker June 9, 2021
by Fred Decker June 9, 2021
FacebookTwitterLinkedinEmail

Identity theft didn’t begin with the digital era — con artists have impersonated
others for centuries — but the computer age, especially the rise of the
internet, has created a number of new ways for criminals to steal your identity
and profit from it. 

There are more types of identity theft than you might think, using methods from
sophisticated hacking to old-fashioned physical thievery.  This quick reference
guide breaks down the most common forms of identity theft, how to recognize them
and what you can do about them. 


1. THE BIG DATA BREACH

These are the kind of hacks that garner the most headlines because they can
affect thousands or even millions of users at once.  Notorious hacks at Yahoo,
Target, Equifax, and even the federal government’s own Office of Personnel
Management exposed millions of Americans’ personal information. 


WHO'S CALLING ME?

Search any phone number to learn more about the owner!




What To Do About It: 

 * Watch for news stories about data breaches, especially those involving
   companies you deal with.  Setting up a Google alert for phrases such as “data
   breach” and “major hack” can help. 
 * Change any passwords, PINs, or usernames you’d used with that company.  If
   you have reused the same credentials on other sites, change them there as
   well. 
 * Reach out to the company that was breached and find out what services (if
   any) they’re providing to victims.  The OPM, for example, offered a pretty
   good range of them. 
 * Limit the number of sites used where you sign up for an account/membership to
   gain access or use disposable email addresses for that purpose. 


2. ADDRESS FRAUD AND MAIL THEFT

Good old-fashioned physical “snail mail” is a rich source of raw material for
criminals.  If your home has an exterior mailbox, thieves can simply take the
actual envelopes.  Those with a lower tolerance for risk can also put in a bogus
change of address with the USPS and have your mail delivered right to them. 
Once they’ve gotten your bank or credit card statements, preapproved credit
offers, or perhaps even credit cards you’ve legitimately ordered, they can loot
your good name for all it’s worth. 

What To Do About It: 

 * If you own your home, consider having a mail slot in the door rather than
   using an outside mailbox.  If that’s not a practical option, get yourself a
   post office box and have your mail delivered there. 
 * Be vigilant.  If a bill or statement doesn’t arrive when you expect it, reach
   out to the company and see if there’s a problem.  If they show you at a new
   address, or if it was mailed but didn’t reach you, that’s a big red flag. 
   Change your passwords and PINs immediately, and have a new card issued. 
 * Get electronic bills or statements.  They can’t be physically stolen, and —
   as a bonus — you’ll be reducing paper waste. 
 * Check your mail every day and place a hold on mail delivery if you’ll be away
   for a while. 


3. TAX-RELATED IDENTITY THEFT

One of the particularly sneaky ways criminals can misuse your identity is within
the taxation system.  Most people use their credit and debit cards daily but
only interact with the IRS once a year.  That means scammers with your social
security number can use it to file a bogus return (and claim your refund!) or to
claim your dependents for a deduction on their return.  You often won’t know
until you file your return and are refused. 

What To Do About It: 

File an Identity Theft Affidavit, Form 14039, with the IRS.  Work through the
IRS victim assistance process to establish your identity and verify that you
are, in fact who you say you are.  You may need to go to a Taxpayer Assistance
Center in person.


4. MEDICAL/INSURANCE IDENTITY THEFT

A similar form of identity theft takes advantage of your medical coverage to
cover the cost of treatment, medications, medical devices and other benefits. 
This can happen if thieves manage to secure your SSN, steal mail containing your
benefits information, or breach your provider’s computer system.  Again, you
won’t know until you submit a claim and learn that your benefits are
mysteriously maxed out. 

What To Do About It: 

Immediately query any refused claims with your insurance company.  Have receipts
or bank records ready when you call, so you can immediately identify which
claims are (and are not) legitimate. 

If you’re on Medicare, submit a fraud complaint to the HHS’ Office of the
Inspector General. 


5. CHILD/DEPENDENT IDENTITY THEFT

This is another subtle form of identity theft that can “fly under the radar” for
extended periods.  Criminals steal (or buy) your minor child’s SSN and then use
it to create a synthetic identity.  In this scenario, the fraudster uses a real
person’s SSN to create a fake persona that can be used to launder money, apply
for benefits or open up new credit accounts.  Aside from those of children, SSNs
belonging to elderly relatives or those living in care for other reasons can
also be misused in this way. 

What To Do About It: 

Until your children reach the age of needing credit in their names, the single
biggest step you can take is to place a credit freeze in their name with the
three credit reporting agencies.  The same holds for adult dependents under your
care, as long as:  a) You hold a power of attorney, and b) their existing credit
is adequate to their needs.  Most new credit requires a credit report, and a
freeze blocks those.  It can later be lifted as or when necessary. 


6. IDENTITY THEFT FROM PHISHING

As scams go, this is one of the all-time classics.  It’s a simple concept: 
Someone sends you an email (or text or social media message) with a link in it. 
Once you click the link, you’re taken to a malicious site where many things can
happen, none of them good for you.  Malicious software might be loaded to your
computer or phone, for example, or you might see what looks like a legit login
screen asking for your username and password (or a “verification” page asking
for your personal information or banking information). 

What To Do About It: 

 * First and foremost, don’t click on a link in an email!  Even if it appears to
   come from a company you legitimately deal with, go to the company’s site
   instead and look for the corresponding page.  Alternatively, just call them
   to confirm that they’ve sent this particular email (this works with friends,
   too). 
 * Learn to view the sender’s actual email address.  Depending on your email
   software, it may already be visible, or you may have to hover over the
   sender’s name or choose a menu option that says “show original” or “view
   headers” or something like that.  If the email comes from a Gmail account, an
   account that appears to be a random collection of letters, or from a
   different country, don’t open it. 
 * If the email address doesn’t look right, use Spokeo’s Reverse Email Search to
   look up who owns it.  Alternatively, use the Reverse Phone Lookup if the
   message came by text or chat app. 


7. IDENTITY THEFT THROUGH WALLET/PHONE ACCESS

This one can really hurt because it means someone close to you has taken
advantage of that proximity.  It may be a complete stranger, not someone who’s
part of your circle, but it’s still a pretty major violation.  It basically
means that someone either steals or accesses your wallet, your ID, or your
personal devices and steals the personally identifying information they find
there. 

Even worse, many sites verify your identity through a code sent to your phone. 
With hands-on your phone, even briefly, someone can use it to gain entry to your
accounts, receive a verification code and then use it to change the passwords
and lock you out of your own accounts. 

What To Do About It: 

 * Keep your wallet and devices secure.  Don’t leave a wallet, purse, phone,
   tablet, or laptop unattended with people around, or, at the very least,
   password protect your devices. 
 * Use biometric tools — fingerprint unlock or face unlock — if your device
   offers them.  It’s not foolproof, but it’s safer than a password (or not
   locking the device at all). 
 * Instead of using a text message for verifications, buy a hardware key.  It’s
   a small USB device you can keep on your keychain and — once it’s set up —
   sites can use that as a second form of authentication when you log in. 


8. BLUETOOTH AND NETWORK VULNERABILITIES

Sometimes physical access to your devices isn’t even necessary.  Most devices
now can connect through Wi-Fi or Bluetooth, and criminals haven’t been slow to
exploit vulnerabilities in those wireless connections.  The same Bluetooth
connection you use for your wireless headphones can be used to pillage your
phone, for example, and there are many well-established vulnerabilities in Wi-Fi
as well. 

What To Do About It: 

 * Turn off your Bluetooth when you’re in crowded public places.  It’s
   inconvenient but a lot less so than identity theft. 
 * Don’t use public Wi-Fi networks for anything sensitive, like your banking
   website.  Wait until you’re home or use your cellular data instead. 
 * Learn to secure your home network against external threats (it’s easier than
   you think). 
 * If you’re at least moderately tech-savvy, consider using a VPN to protect
   your online activities. 


SOME FINAL IDENTITY THEFT TIPS

No matter how identity theft occurs, there are some universal steps you can (and
should!) take to limit its potential impact on your life and improve the
likelihood of the criminals being caught.  In no particular order, here are
several of the most important: 

 * Regularly check your bank and credit card statements for suspicious activity,
   and also check your credit reports (you’re entitled to a free one every year
   from each of the three reporting agencies, so if you stagger them, you can
   have a fresh report every four months).  
 * Take advantage of Spokeo Protect’s dark web monitoring feature to receive
   alerts if your personal information is mentioned, bought or sold on the dark
   web.
 * Educate yourself.  Government sites, including the FTC and USA.gov offer
   excellent information about identity theft in general. A variety of internet
   security sites (including this humble blog) contain a wealth of advice about
   current scams and identity theft prevention.  Forewarned is forearmed, right?
 * If you discover that you have been the victim of identity theft, report it
   online at IdentityTheft.gov or by telephone at 1-877-438-4338.  You can
   create an account on the website to create a recovery plan, which walks you
   through the process of notifying your creditors of the theft and
   reestablishing your good name. 
 * Report the incident to local law enforcement, if appropriate, or to the FBI’s
   Internet Crime Complaint Center (IC3) if the identity theft happened online. 


DON’T FALL VICTIM

Identity theft is a legitimate threat, but it tends to seek easy targets like
any other form of criminal activity.  If you’re familiar with the most common
forms of identity theft and take steps to both minimize your risk and maximize
the chances of detecting it, congratulations!  You’re no longer the “low-hanging
fruit” criminals seek out. 

You may still be victimized — it’s almost impossible to protect yourself
completely — but you’ll have reduced the odds sharply.  That’s a solid win by
any standard.  


REFERENCES:

 * U.S. Securities and Exchange Commission – Altaba, Formerly Known as Yahoo!,
   Charged With Failing to Disclose Massive Cybersecurity Breach; Agrees To Pay
   $35 Million
 * Reuters – Target in $18.5 Million Multi-State Settlement Over Data Breach
 * U.S. Federal Trade Commission – The Equifax Data Breach: What To Do | FTC
 * CSO Online – The OPM Hack Explained: Bad Security Practices Meet China’s
   Captain America
 * Google Support – Create an Alert – Google Search Help
 * U.S. Office of Personnel Management – Cybersecurity Resource Center Sign Up
   for Services
 * Digital Trends – How To Make Disposable Email Addresses
 * U.S. Internal Revenue Service – 
 * How IRS ID Theft Victim Assistance Works
 * U.S. Department of Health and Human Services, Office of Inspector General –
   Submit a Hotline Complaint | Office of Inspector General | US Department of
   Health and Human Services
 * U.S. Government Accountability Office WatchBlog – Watching Out for Synthetic
   Identity Fraud
 * U.S. Federal Trade Commission – Credit Freeze FAQs
 * Hostinger Tutorials – What Are Email Headers? A Comprehensive Guide
 * The Verge – The Best Hardware Security Keys for Two Factor
   AuthenticationGlobalSign – The Top 5 Bluetooth Security Vulnerabilities
 * AT&T Cybersecurity – Wireless Network and Wi-Fi Security Issues to Look Out
   For
 * U.S. Federal Bureau of Investigation – Internet Crime Complaint Center
 * USA Gov – Identity Theft




GET THE LATEST STORIES STRAIGHT TO YOUR INBOX


Please leave this field empty



Thanks for subscribing! Check your inbox or spam folder now to confirm your
subscription.



POPULAR ARTICLES

 * HOW TO TRACK A PHONE NUMBER

 * WHAT CAN A CELL NUMBER LOOKUP FIND?

 * HOW TO FIND SOMEONE’S CELL PHONE NUMBER BY NAME

RELATED ARTICLES

 * Shoulder Surfing Is the Low-Tech Identity Theft Threat You’re Overlooking
 * Fake Letters From Social Security: Mail Fraud Is Still a Thing
 * How Secure Is Your Online Identity? The Answer Might Alarm You

POPULAR TOPICS


 * GUIDES
   
   (133) 


 * DATING
   
   (73) 


 * COMMUNITY
   
   (71) 


 * PRESS
   
   (54) 


 * TEAM
   
   (42) 



FOLLOW US @ SPOKEO

No any image found. Please check it again or try with another instagram account.



ABOUT US

Spokeo is a people search platform helping users know more about the people in
their lives. Spokeo provides access to social media profiles, court records,
criminal records, names, addresses, phone numbers, email addresses, marital
status, and more.

FEATURED ARTICLES

 * SHOULDER SURFING IS THE LOW-TECH IDENTITY THEFT THREAT YOU’RE OVERLOOKING

 * FAKE LETTERS FROM SOCIAL SECURITY: MAIL FRAUD IS STILL A THING


UNCOVER THE TRUTH, SEARCH
SPOKEO NOW



The articles on this site are intended for informational or educational purposes
only, and the photos may not depict the actual people referenced in the
articles. The articles are not intended as legal advice. They do not necessarily
describe the kinds of information available from Spokeo or how information from
Spokeo should be used. Spokeo provides more information on the specifics of its
services and the legal use of the information available from Spokeo in its Terms
of Use. None of the information offered by Spokeo is to be considered for
purposes of determining or making a decision about a person's eligibility for
credit, insurance, employment, rental housing, or for any other purposes covered
under the Fair Credit Reporting Act (FCRA). Spokeo is not a consumer reporting
agency and does not offer consumer reports. Spokeo gathers information from
public sources, which may not be complete, comprehensive, accurate or up to
date, so do not use this service as a substitute for your own due diligence,
especially if you have concerns about a person's criminal history. Spokeo does
not verify or evaluate each piece of data, and makes no warranties or guarantees
about any of the information offered.

Terms Privacy People Search Email Lookup Phone Lookup Address Search

 * Twitter
 * Facebook
 * Linkedin
 * Instagram

Copyright © 2021, Spokeo, Inc.