v
They are able to develop viruses in a short
duration such as two minutes.
v
They are able to hack into corporation’s networks
(by use of their own enhanced viruses, Trojans, etc.) and acquire people’s
personal information.
v
Identity thieves create phishing webpages that
deceive people because logging into a website that they believe is legitimate and
secured.
v
They created a system for stealing personal
identities: they purchase their items using the victim’s bank information and
ship it to a specialized address that is used for this illegal act. A middle
man is used for the purpose of signing for the packages that are shipped to the
specific address. Then, the middle man mails the packages to another address
that is regionally close to the identity thief. Finally, the identity thief
picks up the packages from that point on. This is how identity thieves remain anonymous
and are hard to track down.
v
Identity thieves created underground websites
for selling their victim’s personal information. They sell the victim’s
personal information to other identity thieves for as low as five dollars.
The following video also explains how identity thieves steal their victim's identity.
The following video also explains how identity thieves steal their victim's identity.
No comments:
Post a Comment