Menu

Best 5 Ways Cyber Hackers Can Steal Your Identity

Steal Fraudsters are looking for new ways to hack into computers to steal your personal information and—in the worst cases—your identity. This can range from intercepting a company’s chat system to trying to swipe someone’s frequent flyer miles.

Steal

If you stay informed and learn about some of the latest methods, you’re taking a step to help protect your identity.

Here’s a look at some of the ways hackers are taking advantage of potential victims and what you can do about it.

1. Coffee shop hackers

Cyber thieves sometimes target computers being used at a coffee shop or another public place, and users don’t even have to be connected to Wi-Fi to be affected. That’s according to the Georgia Institute of Technology. The thieves look for low-power electronic signals from your computer or smartphone, which could expose your online activity, passwords and other personal information, even if you’re not connected to the Internet.

It takes a “side channel” intercept, through a receiver that monitors and records information, to steal sensitive information from your computer or phone.

These side-channel emissions can be measured several feet away from a computer using a variety of spying methods. For instance, antennas hidden in a briefcase can receive electromagnetic emissions. Microphones hidden beneath tables can pick up acoustic emissions.

Advice: When you’re on your computer or other electronic device in a public space, pay attention to people around you and take note of suspicious behavior. If your instinct tells you something is wrong, turn off your devices. Leaks are only possible to tap into when your devices are on.

Related:- Does Tattoo Numbing Cream Work?

2. Targeting your company’s chat system

Group chat apps are common in office settings. At times, they’ve been hacked. The type of information accessed has included names, usernames, email addresses passwords and phone numbers.

Advice: If you use a group chat app at work, it’s smart to use one that’s “end-to-end” encrypted. Messages should only be readable on the sender’s and recipient’s devices. It’s a good idea to check with your company to see if your chat service is “end-to-end” encrypted. If not, it could be time for your company to consider changing its chat platform.

Also, create complex passwords that are more difficult to decode. For added security, remember to never include sensitive information in an email or a chatting.

3. Targeting customer loyalty accounts

Frequent shoppers have had their data targeted in schemes pinned to customers’ loyalty accounts. For example, one retailer saw an attempt to gain unauthorized access to reward accounts containing user information.

Advice: Use complex passwords and update your passwords regularly. Monitor your credit card purchases for suspicious charges and be mindful of where you keep your rewards cards. Also, provide only the minimal amount of information required when opening customer loyalty accounts, rather than providing every piece of information that is asked for.

Related:- Lease/tenancy Options for Dealing In Real Estates

4. Stealing frequent flyer miles

Fraudsters sometimes have hacked into frequent-flyer accounts and even used victims’ miles to book free flights and request upgrades.

Advice: Monitor your accounts regularly, use complex passwords and update your passwords frequently.

5. Targeting your tax refund

Thieves can commit tax refund fraud in a variety of ways, but here are two of the most common methods:

  • Using a victim’s Social Security number to file a fraudulent return.
  • Stealing tax refund checks out of the mail.
Tags: ,