Friday, January 28, 2011

How to recognize scams to identity theft


If you do not want to be a victim of identity theft scams, if you can help them. One way to avoid them is to recognize a scam when you see it. If you're like most consumers, stands in front of scams on a regular basis. You get them in your email, or you can hear the ads on radio and television and not realize that these are scams. Here are some ways to identify them so that you can protect yourself.

Phishing scams

When you receive emails asking you to help someone who transfer money to you do not know, is a scam. For example, an e-mail message that claims that you are a winner of the lottery, but that you must send your bank account information so that the premium can be transferred to your account is a scam.

A less obvious scam is one in which a company Sends an email that appears to come from an online business that you have an account with. The email asks you to click a link and provide the password or other sensitive information. You should always go directly to the company's Web site to see if you have any messages to take an action, for example to change the password.

Call to get lists

Some companies to obtain personal information by pretending to offer an advantage. Among the most popular scams to identity theft is to entice the listeners of radio or television viewers to call to get a list, such as a list of foreclosed homes or a list of banks that offer pre-approved credit cards, even if you have a bad credit history. What happens is that you need to provide information before receiving the list, which is often useless or you may have studied the information yourself on the Internet. The problem is that the scam artists are stealing your information to open fraudulent accounts.

You can protect yourself from identity theft scams being very selective about who they give you the information. It is also important to install the security software on your computer, such as anti-spyware, so that accidentally not allow others to log on to the computer as a result of your online business.

You found this article helpful?

No comments:

Post a Comment