Learning Center
Plans & pricing Sign in
Sign Out

Identity theft and credit card fraud


  • pg 1
									                      Identity theft and credit card fraud!

Identity thieves others to use personal information for many things. The most common
use is the credit card fraud. After obtaining a target of personal details, thieves can open
new lines of credit, to divert the credit card accounts available, and go on spending sprees
with other people's money. Here is an overview of the many tactics thieves use to commit
identity fraud by credit card.

The opening of new accounts
Armed with personal information such as name, date of birth and social security number,
thieves can impersonate someone else to open new lines of credit. They can apply for
credit cards on behalf of the victim, or steal prequalified credit offers from the target, the
mailbox or trash. These sometimes contain preselected credit cards that thieves can
activate it by calling a toll-free number. Many victims do not know that someone has
taken the credit cards in their name until they receive calls from debt collectors or obtain
loans fell due to a low credit score.

Misuse of existing accounts
In addition to opening new lines of credit, identity thieves can use them adequate
information to make the audit. They are using their personal information from the victim
to "verify" the thief of identity as the true account holder. Then the thief changes the
account details such as PINs, passwords, billing and mailing address. Once an identity
thief has control of any accounts it may be difficult to return to the proper owner before
the thief wreaks financial havoc.

Through the use of palm-sized devices for reading cards, thieves can drag all of their
victims' information card in no time at all. Skimming is a subtle, which typically crime is
not detected until the victim notices of fraudulent credit card. Anyone who hands their
card to an employee in the stores or restaurants is a potential target for scavengers. Some
courses are also located in the gas pump and ATM card reader slots. This information
card collection for identity thieves to use, and most devices are impossible for casual
observers to detect.

Phishing and Vishing
Phishing is a scam that thieves use to trick victims into providing personal information.
Some thieves send e-mails that appear to come from banks or popular websites. They
provide a link for the recipient to follow. The link takes the victim to a login page where
they enter their information to verify it. What they really do is give their contact
information for identity thieves. This scam can also be stored on the phone. This variant
is known as vishing. Scammers claim to be representatives of the IRS or the victim's
personal bank. They ask the victim to verify the account information and personal data,
or providing a telephone number where information can be entered from a telephone
Anytime someone uses a credit card without the permission of the cardholder, the fraud
was committed. Credit card fraud is very popular and profitable type of identity theft and
possibly cause more financial harm to the victim. To protect yourself, never give personal
information over the phone. Avoid clicking on links in e-mails. Only pay with a credit
card when you have, and stick to reputable companies that you are familiar. Well look at
your credit card statements each month. Some crooks are many small charges that do not
trigger alerts of fraud. If you see suspicious activity on your monthly bill, contact your
card issuer immediately.

The best way to protect against credit card fraud is to take proactive steps to reduce your
exposure to theft and possible diligently monitor your credit file. Although these
measures may be carried out free of charge, we recommend some type of protection
against identity theft including theft insurance. Many of us do not have the time or energy
to regularly check our credit history and identity protection services are becoming more
affordable. The protection industry of identity theft has really evolved, research,
products, services and approaches vary greatly.

To top