LCWD LogoLearn Code With DurgeshLCWD
HomeCoursesTutorialsBlogsContact
About LCWDAbout Durgesh Tiwari
Flex Box Hero
LearnCodeWithDurgesh Logo

Learn Code With Durgesh

Offering free & premium coding courses to lakhs of students via YouTube and our platform.

Explore

  • About Us
  • Courses
  • Blog
  • Contact
  • FlexBox Game

Legal

  • Privacy Policy
  • Terms & Conditions
  • Refund Policy
  • Support

Contact

  • 📞 +91-9839466732
  • [email protected]
  • Substring Technologies, 633/D/P256 B R Dubey Enclave Dhanwa Deva Road Matiyari Chinhat, Lucknow, UP, INDIA 226028
© 2025 Made with ❤️ by Substring Technologies. All rights reserved.
What is identity theft?

What is identity theft?

By durgeshkumar8896 • Fri Dec 09 2022

What is identity theft?

image

Identity theft is deliberate use of somebody's personal information such as their name, date of birth, social security number, driver's license number, bank account or credit card numbers,Pins,electronic signatures, fingerprints, passwords, or any other information that can be used to access a person's financial resources, without their permission, to commit fraud or other crimes.

Identity theft may be used to facilitate or fund other crimes including Illegal immigration, terrorism, phishing and espionage. There are cases of identity cloning to attack payment systems, including online credit card processing and medical insurance

It's a global problem, approximately millions of identities are stolen every year which leads to financial loss of billions of dollars.

The U.S. Federal Trade Commission (FTC) received more than 5.88 million fraud reports in 2021, a 19% increase from the year prior. Reports of associated financial losses topped $6.1 billion, an increase of more than 77% compared with 2020.

In the first half of 2022, identity theft complaints across the country slowed somewhat compared with their pace during the first half of 2021. According to the FTC, Credit card-related fraud is once again the most common type of fraud now that the wave of government-benefits fraud in 2020 and 2021 has subsided.

How does identity theft happen?

  1. Phishing: Phishing is a practice of sending emails  pretending to be from reputable companies such as a bank or an online retailer in order to induce individuals to reveal personal information, such as passwords and credit card numbers by clicking a link or opening an attachment.

  2. Smishing: Similar to phishing, smishing is a practice of sending text messages  pretending to be from reputable companies such as a bank or even friends in order to induce individuals to reveal personal information that can be used to commit crimes

  3. Vishing: Similar to phishing and smishing, vishing is a practice of voice calling people to give them fake offers on different products to prompt victims into giving up personal information.

  4. Fake Websites: Fake websites often look like legitimate and trustworthy sites to make people more apt to provide their personal information. Some online shopping scams use a bogus website or mobile app that mimics a trusted retailer, including a familiar logo and similar URL. Purchases made on these fraudulent sites will likely never arrive, or worse, scammers may seed the website with malware that infects the victim’s device and harvests personal or financial information.

  5. Data Breaches: Data breach is theft of information of a system or company database without the knowledge or authorisation of systems/companies owner.Stolen data may involve sensitive, proprietary, or confidential information such as credit card numbers, customer data, trade secrets, or matters of national security.

  6. Carelessness of people: Using public wifi/Charging stations or disposing of electronic devices without clearing the data or not protecting their devices with passwords or accidentally downloading any file or attachment from the internet or uploading the image of their driving license or flight tickets on social media may cause identity theft.

Consequences of Identity Theft?

Once the personal information is stolen, thieves can use it in many ways to commit crimes. Such as:

  • Taking a loan on your information, taking the money from your account.

  • Buy expensive items.

  • Taking over existing accounts of yours.

  • Obtained genuine documents of yours.

  • Commit serious crimes like murder or money laundring.

How to protect yourself from identity theft?

  • Change passwords of your accounts frequently.

  • Be aware of phishing/smishing/vishing and never share your personal data to scammers.

  • Wipe of the data completely before disposing of your electronic devices.

  • Be aware of what you are posting on social media.

By following these steps and being aware you can avoid being a victim of identity theft.

image



 



 

Share this article ...

💬WhatsApp📘Facebook💼LinkedIn🐦X

Trending Blogs...

Expert-Level JavaScript Interview Q&A for 2025: Crack Advanced JS Interviews

Expert-Level JavaScript Interview Q&A for 2025: Crack Advanced JS Interviews

Get ready for tough coding interviews with this collection of advanced JavaScript interview questions and answers. Designed for experienced developers who want to master complex JS concepts and impress recruiters.

Ace Your Coding Interview: JavaScript Q&A for Intermediate Learners

Ace Your Coding Interview: JavaScript Q&A for Intermediate Learners

Prepare for your next coding interview with this collection of JavaScript interview questions and answers for intermediate developers. Strengthen your JS concepts and boost your confidence.

Most Asked JavaScript Interview Questions with Answers

Most Asked JavaScript Interview Questions with Answers

Q1. What is JavaScript? JavaScript is a programming language mainly used to make web pages interactive and dynamic. It runs in the browser, and with Node.js, it can also run on the server.

The 5 ChatGPT Prompts That Saved Me From Burnout

The 5 ChatGPT Prompts That Saved Me From Burnout

Here’s what I discovered: It wasn’t about working less. It was about working smarter. When I gave ChatGPT the right prompts, everything changed. Here are the 5 prompts that transformed my productivity:

Mastering JavaScript: Functions, Objects, Classes & Prototypes Explained Like Never Before

Mastering JavaScript: Functions, Objects, Classes & Prototypes Explained Like Never Before

If you’re learning JavaScript, you’ve probably heard terms like functions, objects, classes, constructors, inheritance, and prototypes being thrown around. But what do they really mean? And why are they so important in JavaScript? In this blog, we’ll break down these concepts step by step, with clear explanations, examples, comparisons, and diagrams. By the end, you’ll have a solid understanding of how these features work together — and why they are the backbone of modern JavaScript.

Google Tools for College Students to boost Productivity

Google Tools for College Students to boost Productivity

College life can feel like a roller coaster — assignments, exams, group projects, internships, and of course, trying to squeeze in a social life. The good news? You don’t have to do it all alone. Google has built a whole ecosystem of tools that can help students stay productive, organized, and even a little more stress-free. From taking notes to collaborating on projects, Google’s apps are like a digital toolkit every student should know about. Let’s explore how these tools can make your college journey smoother.

Share this article ...

💬WhatsApp📘Facebook💼LinkedIn🐦X