ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

IDENTITY THEFT ON THE INTERNET: HOW AND WHY IT OCCURS

Updated on September 4, 2013

MEANING OF IDENTITY THEFT

Identity theft on the internet happens when an unauthorized person gains access into any of your online account and perform any activity (both legal and illegal). It is a fraudulent act that is punishable under various laws in different parts of the world. There are various kinds of identity theft e.g. medical identity theft and financial identity theft.

Identity theft on the internet is a threat to the teeming population that joins the internet community on a daily basis. People need to be educated on the modus operandi of these online scammers. Hence, this hub is given birth to.

 

HOW IDENTITY THEFT ON THE INTERNET IS PERPETRATED

Online scammers or thieves can employ any of the following techniques to collect your online identity:

PHISHING AND PHARMING

Phishing and pharming are examples of social engineering. Social engineering in the context of internet or online security is the use of social skills (persuasion) to convince people to unwittingly disclose their internet credentials. A lot of people have lost access to their online account by simply supplying their login information to the wrong people (online identity thieves) thinking they are verifying their accounts. You will be provided with a form to fill. And once the form is filled, the perpetrators of this scam will grab your login details and bingo- your login details will be changed. You will be bewildered in your next login attempt when you are told that your password is incorrect. Below is a shot screen shot of a mail purportedly coming from yahoo.

EXAMPLE OF PHISHING E-MAIL
EXAMPLE OF PHISHING E-MAIL

BUY IDENTITY THEFT BOOK ONLINE

Notice the urgency in the last line of the content of this mail. Also notice that the recipient is undisclosed, meaning that the sender of this email didn’t particularly target you but so many people. To instill fear in you and to create sense of urgency are the main aim of phishers and pharmers. They will start by telling you that your account is in danger of being deactivated if you don’t take action before certain time. Your best protection here is to ignore them. You can read up a true life story of a fellow hubber who had been phished in the past titled phishing and me for more insight. Edit: the link was removed because it no longer exist.

SPOOFING

Spoofing in the context of internet identity theft is a technique employed by online identity thieves to gain unauthorized access into the database of a website that contains the login details of its members. This is a form of hacking where the hacker spoofs an IP (internet protocol) address of a trusted host or within the network. The login detail of every member of hubpages can be collected through this means if hubpages does not have adequate security on their website. You however don’t need to worry yourself much about this as it principally falls into the jurisdiction of site administrators to take care of this threat by deploying and installing latest website and network protection technologies as they are released. At the basic, websites administrators should have IDS (intrusion detection system) and firewall security technology. Again, your best protection here is to vary your passwords from site to site.

HACKING AND VIRUS ATTACK

Hacking can either be positive or negative. It is positive when a program that enhances life is written and it becomes negative when access is illegally gained into a system. Hacking can take various forms which include: spoofing as explained above, brute force, DOS or DDOS (denial of service or distributed denial of service), password crack, dictionary, malicious code, sniffing, hoaxes, spam, man-in-the-middle, mail bombing, buffer overflow, cross scripting, timing attack, social engineering, etc.

Most of these hacking methods are no longer feasible in today’s advanced world of technology but, you still need to know about their existence.

Special note of man-in-the-middle Trojan should be taken as this still cause havoc on the internet especially “internet banking”. Man-in-the-middle Trojan is a newer version of Trojans that is deadlier than its predecessors. It is a high level virus that does not cause any harm to your computer or the host. But stays dormant and silently gather and transmit information from the host to a remote computer. This virus is so intelligent that it can mimic any webpage just to fool the end users. Any online form you open will be mimicked by this virus once your system is infested by it. Man-in-the-middle Trojan is so intelligently programmed to gather your online login data, send them to a remote site and return a “cannot find server” message to you on first attempt after which it goes back to its dormant status and allow you to complete your online form. This will give you an insight into what antivirus companies go through. Your best protection in this regard is to have strong and constantly updated antivirus software installed on your computer.

WHY INTERNET IDENTITY THEFT IS PERPETRATED

The main motive behind the activities of online scammers is to get financial benefits. A lot of people tend to resort to stealing people’s online identity just to cushion the effect(s) (both present and potential) of the crunch in the financial sector. Lazy people that are relieved of their appointments see online scamming as the nearest viable opportunity of making easy money. Fear of the unknown push those that are still working into perpetrating identity theft on the internet.

Greed on the part of the victim is one of the reasons why online scammers succeed. Or how can you explain the wisdom behind someone supplying his financial data online to an unknown destination with the hope of getting one form of financial incentive or the other? knowing fully well that he/she has not done anything in the past to warrant this kind of benefit. Ignorance is another ‘why’ online identity thieves succeed. The probability that you will fall for any of these social engineering techniques is low if you are well informed of the activities of these online and internet miscreants.

The best security measure you can take in order to be free from internet identity theft is to be constantly educated on the activities of these online scammers. Note also that your online data or information can easily leak through people that are close to you. So, take proactive measure today by sharing this hub with them. You can do that by clicking on the ‘share this’ link at the bottom of this hub. Identity theft on the internet is real and ever increasing as more people embrace the internet world of opportunities.

To your internet and online security!

Comments

    0 of 8192 characters used
    Post Comment

    • profile image

      gepeTooRs 

      2 years ago

      These are in fact enormous ideas in about blogging. You have touched some fastidious things here. Any way keep up wrinting.

    • profile image

      affimbfug 

      3 years ago

      and find a relaxing and peaceful nightÕs sleep.

    • profile image

      oriqueMaria 

      5 years ago

      We utilized to get at the top of life although lately I've truly piled up a amount of resistance.

    • chinweike profile imageAUTHOR

      Chinweike 

      7 years ago from Glasgow, UK

      There is this latest worm that all e-mail users need to be aware of; your system gets infected as soon as you open the mail.

      You must not click on any link before your account is hacked and used to send message to all your contacts with 'hi' as the subject.

      And once your contacts open the mail, they become infected too and it goes on and on.

      This virus is hard to remove. the best way around it that I have come to notice is to disable your restore point of your computer, scan your computer with good internet security software and then open a new email account, gradually transfer all your contact, send email to all your contacts urging them to ignore any email coming from the other account. Then deactivate this account.

    • chinweike profile imageAUTHOR

      Chinweike 

      8 years ago from Glasgow, UK

      SafeCard, thanks for stoping over and investing your valuable time into this hub reading it.

      Cheers!

    • profile image

      SafeCard 

      8 years ago from Charlotte, NC

      Hi,

      Just thought I would stop by and tell you that you have a great hub page!1

      I can learn a lot form you. We can never be to safe when it somes to our ID. It is crazy that we have to worry about this kind of stuff but we do. thanks for the helpful info!

    • chinweike profile imageAUTHOR

      Chinweike 

      8 years ago from Glasgow, UK

      countrystarr, thanks for the encouraging commet.

      Cheers!

    • chinweike profile imageAUTHOR

      Chinweike 

      8 years ago from Glasgow, UK

      Sandyspider, yes, there are people like this every where and that is why we should all join the fight against internet and online identity theft. Hope you shared this hub with your loved ones.

      Thanks for sharing.

      cheers!

    • Sandyspider profile image

      Sandy Mertens 

      8 years ago from Wisconsin, USA

      It is sad that there are people out there like this. Thanks for the information.

    • chinweike profile imageAUTHOR

      Chinweike 

      8 years ago from Glasgow, UK

      Richieb799 , I equally get worried by this development. But the best i can do about this is to vary my passwords from site to site. I don't think antivirus can do much to prevent you and your login details from being stolen from a site that has been compromised.

      Thanks for the comment.

      Cheers!

    • Richieb799 profile image

      Richieb799 

      8 years ago from Cardiff, Wales UK

      It worries me that host's can be spoofed, I only just got a great norton anti virus the other day, i don't know why these hackers target the average Joe :/

    • chinweike profile imageAUTHOR

      Chinweike 

      8 years ago from Glasgow, UK

      daisyjae, thanks for finding time to read this hub, commenting on it and finally stumbling it. I really appreciate you.

      Cheers!

    • daisyjae profile image

      daisyjae 

      8 years ago from Canada

      Good info here. I am paranoid about this kind of thing. I will stumble this one,too. Thanks for writing it.

    • chinweike profile imageAUTHOR

      Chinweike 

      8 years ago from Glasgow, UK

      Lorlie6, I have linked to your hub from this. People must be constantly informed of the activities of online identity thieves.

      Cheers!

    • lorlie6 profile image

      Laurel Rogers 

      8 years ago from Bishop, Ca

      Absolutely, chinweike-I would be honored!

    • chinweike profile imageAUTHOR

      Chinweike 

      8 years ago from Glasgow, UK

      lorlie6, Thanks for investing your valued time to read this hub and subsequently commenting on it.

      Yes, i did read your hub titled 'phishing and me'. In fact, i was wondering if i could link that hub to this one.

      Thanks once again for your mind blowing comment.

      Cheers!

    • lorlie6 profile image

      Laurel Rogers 

      8 years ago from Bishop, Ca

      Chinweike-this is a fantastically written hub about the dangers online. I think you came by my hub on phishing not too long ago-I was naive enough to fall for a similar letter. I've only had a computer for a year now and I am grateful to people like you who write about things to look for.

      Thanks!

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://hubpages.com/privacy-policy#gdpr

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)