IDENTITY THEFT ON THE INTERNET: HOW AND WHY IT OCCURS

MEANING OF IDENTITY THEFT

Identity theft on the internet happens when an unauthorized person gains access into any of your online account and perform any activity (both legal and illegal). It is a fraudulent act that is punishable under various laws in different parts of the world. There are various kinds of identity theft e.g. medical identity theft and financial identity theft.

Identity theft on the internet is a threat to the teeming population that joins the internet community on a daily basis. People need to be educated on the modus operandi of these online scammers. Hence, this hub is given birth to.

 

HOW IDENTITY THEFT ON THE INTERNET IS PERPETRATED

Online scammers or thieves can employ any of the following techniques to collect your online identity:

PHISHING AND PHARMING

Phishing and pharming are examples of social engineering. Social engineering in the context of internet or online security is the use of social skills (persuasion) to convince people to unwittingly disclose their internet credentials. A lot of people have lost access to their online account by simply supplying their login information to the wrong people (online identity thieves) thinking they are verifying their accounts. You will be provided with a form to fill. And once the form is filled, the perpetrators of this scam will grab your login details and bingo- your login details will be changed. You will be bewildered in your next login attempt when you are told that your password is incorrect. Below is a shot screen shot of a mail purportedly coming from yahoo.

EXAMPLE OF PHISHING E-MAIL
EXAMPLE OF PHISHING E-MAIL

Notice the urgency in the last line of the content of this mail. Also notice that the recipient is undisclosed, meaning that the sender of this email didn’t particularly target you but so many people. To instill fear in you and to create sense of urgency are the main aim of phishers and pharmers. They will start by telling you that your account is in danger of being deactivated if you don’t take action before certain time. Your best protection here is to ignore them. You can read up a true life story of a fellow hubber who had been phished in the past titled phishing and me for more insight. Edit: the link was removed because it no longer exist.

SPOOFING

Spoofing in the context of internet identity theft is a technique employed by online identity thieves to gain unauthorized access into the database of a website that contains the login details of its members. This is a form of hacking where the hacker spoofs an IP (internet protocol) address of a trusted host or within the network. The login detail of every member of hubpages can be collected through this means if hubpages does not have adequate security on their website. You however don’t need to worry yourself much about this as it principally falls into the jurisdiction of site administrators to take care of this threat by deploying and installing latest website and network protection technologies as they are released. At the basic, websites administrators should have IDS (intrusion detection system) and firewall security technology. Again, your best protection here is to vary your passwords from site to site.

HACKING AND VIRUS ATTACK

Hacking can either be positive or negative. It is positive when a program that enhances life is written and it becomes negative when access is illegally gained into a system. Hacking can take various forms which include: spoofing as explained above, brute force, DOS or DDOS (denial of service or distributed denial of service), password crack, dictionary, malicious code, sniffing, hoaxes, spam, man-in-the-middle, mail bombing, buffer overflow, cross scripting, timing attack, social engineering, etc.

Most of these hacking methods are no longer feasible in today’s advanced world of technology but, you still need to know about their existence.

Special note of man-in-the-middle Trojan should be taken as this still cause havoc on the internet especially “internet banking”. Man-in-the-middle Trojan is a newer version of Trojans that is deadlier than its predecessors. It is a high level virus that does not cause any harm to your computer or the host. But stays dormant and silently gather and transmit information from the host to a remote computer. This virus is so intelligent that it can mimic any webpage just to fool the end users. Any online form you open will be mimicked by this virus once your system is infested by it. Man-in-the-middle Trojan is so intelligently programmed to gather your online login data, send them to a remote site and return a “cannot find server” message to you on first attempt after which it goes back to its dormant status and allow you to complete your online form. This will give you an insight into what antivirus companies go through. Your best protection in this regard is to have strong and constantly updated antivirus software installed on your computer.

WHY INTERNET IDENTITY THEFT IS PERPETRATED

The main motive behind the activities of online scammers is to get financial benefits. A lot of people tend to resort to stealing people’s online identity just to cushion the effect(s) (both present and potential) of the crunch in the financial sector. Lazy people that are relieved of their appointments see online scamming as the nearest viable opportunity of making easy money. Fear of the unknown push those that are still working into perpetrating identity theft on the internet.

Greed on the part of the victim is one of the reasons why online scammers succeed. Or how can you explain the wisdom behind someone supplying his financial data online to an unknown destination with the hope of getting one form of financial incentive or the other? knowing fully well that he/she has not done anything in the past to warrant this kind of benefit. Ignorance is another ‘why’ online identity thieves succeed. The probability that you will fall for any of these social engineering techniques is low if you are well informed of the activities of these online and internet miscreants.

The best security measure you can take in order to be free from internet identity theft is to be constantly educated on the activities of these online scammers. Note also that your online data or information can easily leak through people that are close to you. So, take proactive measure today by sharing this hub with them. You can do that by clicking on the ‘share this’ link at the bottom of this hub. Identity theft on the internet is real and ever increasing as more people embrace the internet world of opportunities.

To your internet and online security!

More by this Author


Comments 17 comments

lorlie6 profile image

lorlie6 6 years ago from Bishop, Ca

Chinweike-this is a fantastically written hub about the dangers online. I think you came by my hub on phishing not too long ago-I was naive enough to fall for a similar letter. I've only had a computer for a year now and I am grateful to people like you who write about things to look for.

Thanks!


chinweike profile image

chinweike 6 years ago from Glasgow, UK Author

lorlie6, Thanks for investing your valued time to read this hub and subsequently commenting on it.

Yes, i did read your hub titled 'phishing and me'. In fact, i was wondering if i could link that hub to this one.

Thanks once again for your mind blowing comment.

Cheers!


lorlie6 profile image

lorlie6 6 years ago from Bishop, Ca

Absolutely, chinweike-I would be honored!


chinweike profile image

chinweike 6 years ago from Glasgow, UK Author

Lorlie6, I have linked to your hub from this. People must be constantly informed of the activities of online identity thieves.

Cheers!


daisyjae profile image

daisyjae 6 years ago from Canada

Good info here. I am paranoid about this kind of thing. I will stumble this one,too. Thanks for writing it.


chinweike profile image

chinweike 6 years ago from Glasgow, UK Author

daisyjae, thanks for finding time to read this hub, commenting on it and finally stumbling it. I really appreciate you.

Cheers!


Richieb799 profile image

Richieb799 6 years ago from Cardiff, Wales UK

It worries me that host's can be spoofed, I only just got a great norton anti virus the other day, i don't know why these hackers target the average Joe :/


chinweike profile image

chinweike 6 years ago from Glasgow, UK Author

Richieb799 , I equally get worried by this development. But the best i can do about this is to vary my passwords from site to site. I don't think antivirus can do much to prevent you and your login details from being stolen from a site that has been compromised.

Thanks for the comment.

Cheers!


Sandyspider profile image

Sandyspider 6 years ago from Wisconsin, USA

It is sad that there are people out there like this. Thanks for the information.


chinweike profile image

chinweike 6 years ago from Glasgow, UK Author

Sandyspider, yes, there are people like this every where and that is why we should all join the fight against internet and online identity theft. Hope you shared this hub with your loved ones.

Thanks for sharing.

cheers!


chinweike profile image

chinweike 6 years ago from Glasgow, UK Author

countrystarr, thanks for the encouraging commet.

Cheers!


SafeCard 6 years ago from Charlotte, NC

Hi,

Just thought I would stop by and tell you that you have a great hub page!1

I can learn a lot form you. We can never be to safe when it somes to our ID. It is crazy that we have to worry about this kind of stuff but we do. thanks for the helpful info!


chinweike profile image

chinweike 6 years ago from Glasgow, UK Author

SafeCard, thanks for stoping over and investing your valuable time into this hub reading it.

Cheers!


chinweike profile image

chinweike 6 years ago from Glasgow, UK Author

There is this latest worm that all e-mail users need to be aware of; your system gets infected as soon as you open the mail.

You must not click on any link before your account is hacked and used to send message to all your contacts with 'hi' as the subject.

And once your contacts open the mail, they become infected too and it goes on and on.

This virus is hard to remove. the best way around it that I have come to notice is to disable your restore point of your computer, scan your computer with good internet security software and then open a new email account, gradually transfer all your contact, send email to all your contacts urging them to ignore any email coming from the other account. Then deactivate this account.


oriqueMaria 3 years ago

We utilized to get at the top of life although lately I've truly piled up a amount of resistance.


affimbfug 16 months ago

and find a relaxing and peaceful nightÕs sleep.


gepeTooRs 8 months ago

These are in fact enormous ideas in about blogging. You have touched some fastidious things here. Any way keep up wrinting.

    Sign in or sign up and post using a HubPages Network account.

    0 of 8192 characters used
    Post Comment

    No HTML is allowed in comments, but URLs will be hyperlinked. Comments are not for promoting your articles or other sites.


    Click to Rate This Article
    working