Maintain your old Siemens Hipath system

Identity Theft - Dont Blame The Internet

Identity theft ? also known as ID theft, identity fraud and ID fraud ? describes a type of fraud where a criminal adopts someone else's identity in order to profit illegally. It is one of the fastest growing forms of fraud in many developed countries.

In the UK identity theft is increasing at the rate of 500% each year and, according to Which Magazine, 25% of the population have either suffered from identity theft or know someone who has.

In the USA, a report issued by the Better Business Bureau revealed that, in 2004, over 9 million Americans became victims of identity theft with the total sum defrauded being $52.6 billion.

With figures like this, it's no surprise that there is a certain amount of concern regarding computer and internet security. After all, the internet is basically a mechanism for exchanging information and the possibility that some of the information exchanged may be more than intended is never far from many internet user's minds.

It's easy to imagine criminal masterminds worldwide using the internet to hack into computers in order to gain access to information with which to advance their devilishly cunning schemes. However, as revealed in the report, the facts of the matter are a little more down to earth and the internet, far from making you more at risk to identity theft, can help to significantly cut your losses if you do fall victim this form of fraud.

According to the Better Business Bureau's research the main methods by which criminals gain access to information used for identity theft fraud are as below:

  • Lost or stolen wallet, chequebook or credit card. 28.8%
  • Accessed as part of a transaction. 12.9%*
  • Accessed by friend, acquaintance or relative. 11.4%
  • Don't know, refused, no answer. 11.1%
  • Information accessed by corrupt employee. 8.7%
  • Stolen paper mail or fraudulent change of address. 8.0%
  • Obtained some other way. 7.4%
  • Computer spyware. 5.2%
  • Information stolen from garbage. 2.6%
  • Computer viruses and/or hackers. 2.2%
  • Emails sent by criminals posing as legitimate business. 1.7%
  • * 12.9% due to transactions ? 10.4% offline transactions, 2.5% online transactions.

    In total, when the instances where information was accessed during transactions are subdivided into online and offline transactions, only 11.6% of the information used to carry out identity theft fraud was obtained from computers.

    Of this more than half was obtained by the use of spyware, viruses or hacking ? the risk of which can be greatly reduced by installing the appropriate protection software and ensuring that this is kept up to date.

    Not only did the survey reveal that the internet was not a major source of illegally obtained personal information, but it was also found that those fraud victims who checked their financial records using the internet, ATM machines or other electronic methods suffered financial losses which were, on average, 8 times lower than those of victims who used traditional paper statements to monitor their accounts. This very significant reduction was attributed to the rapid discovery of the fraud due to "real time" monitoring.

    Of course, that's not to say that you shouldn't exercise caution when using the internet or take care to protect the personal information which you may have stored on your PC. However, as long as you install suitable virus, firewall and spyware protection, and keep this continually updated the internet can should be more of a help than a hindrance when it comes to avoiding identity fraud.

    Hamish Hayward
    Don't become a victim. Find out the facts about identity theft.

    In The News:

    Lockdown protests intensify in China as UK journalist 'beaten and kicked by police' covering unrest
    Sun, 27 Nov 2022 22:16:00 +0000
    Protests against stringent COVID restrictions have intensified across China - as a British journalist was beaten and kicked by police.

    Monkeypox given new name by World Health Organisation
    Mon, 28 Nov 2022 11:27:00 +0000
    Monkeypox has been rebranded 'mpox' by the World Health Organisation.

    Chinese Communist Party faces threat not seen since protests that led to Tiananmen Square massacre
    Sun, 27 Nov 2022 19:11:00 +0000
    These protests are momentous. Wherever they lead, they are already hugely significant.

    What's being done about 'murder-for-hire' sites on the dark web, and how dangerous are they?
    Sun, 27 Nov 2022 05:05:00 +0000
    At some point in our lives most of us have done something to upset someone.

    Plane crashes into live power lines
    Mon, 28 Nov 2022 09:34:00 +0000
    Two people, who spent nearly seven hours trapped 100ft (30 metres) above ground after their plane crashed into live power lines, have been rescued.

    Erfahrungen mit Pallhuber Wein
    Agen Bola SBOBET Terpercaya

    Travel in comfort and at your leisure with CT Airlink Limousine & Car Service for top quality private transportation and exceptional customer service. We operate Sedans, SUVs & Vans for CT Car Services to covering all Connecticut airports including Car Service from CT to Newark Airport , Mohegan Casino Uncasville CT, Foxwoods Casino Mashantucket CT, Manhattan Cruise Terminal NYC, Brooklyn Cruise Terminal NYC and Bayonne Cruise Terminal NJ. CT Airlink hire licensed and friendly chauffeurs who have in-depth knowledge of the Areas.

    How To Cover Your Tracks On The Internet

    Every single time you access a website, you leave tracks.... Read More

    Avoid Internet Theft, Fraud and Phishing

    Since its birth, the Internet has grown and expanded to... Read More

    Online Cell Phone Scams and Spam

    They're out there. Individuals trying to make a quick buck... Read More

    Steganography ? The Art Of Deception & Concealment

    The Message Must Get Through ----------------------------- The year is 300A.D.,... Read More

    Protection for Your PC - Painless and Free!

    Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet... Read More

    The Move to a New Anti-Virus Model

    This is the second in a series of articles highlighting... Read More

    Top 10 tips for Safe Internet Shopping

    Over £5 billion pounds was spent on online shopping in... Read More

    Adware and Spyware: The Problems and Their Solutions

    The Threat10 years ago you could probably have run no... Read More

    Why Corporations Need to Worry About Phishing

    Phishing is a relatively new form of online fraud that... Read More

    Top Ten Spyware and Adware Threats Identified

    On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More

    Personal Firewalls for Home Users

    What is a Firewall?The term "firewall" illustrates a system that... Read More


    Recently I have received email from my bank/credit Card Company,... Read More

    Viruses and Worms, Protection from Disaster

    Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More

    Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers

    I am the victim of an internet scam. It is... Read More

    Lottery Scam, What It is and how to Avoid It?

    Internet scams and frauds are on the rise! The quantity... Read More

    Dont Allow Hackers to Take Out Money from Your Bank Account

    If you know what is the 'Fishing' then it's very... Read More

    How To Avoid Hackers From Destroying Your Site?

    Recently, my site and other internet accounts ( )... Read More

    Sarbanes-Oxley: A Cross-Industry Email Compliance Challenge

    Is your enterprise following the rules?The bulk of financial information... Read More

    I Spy...Something Terribly Wrong (In Your Computer)

    This really chapped my lips...I recently bought a new computer.... Read More

    Blogs as Safe Haven for Cybercriminals?

    To blog or not to blog? Well, why not? Lots... Read More

    Spyware, This Time Its Personal!

    First the basic definition of Spyware: It is a type... Read More

    An Open Letter From a So-called Stupid

    Someone recently told me, "You would have to be a... Read More

    Hacking the Body Via PDA Wireless Device

    First I would like to stress I am condoning the... Read More

    Why you Must Secure your Digital Product and Thank You Web Page

    A couple of years back, I paid my dues the... Read More

    Computer Viruses, Worms, and Hoaxes

    In recent days, I was one of the unfortunate persons... Read More