Calendar An icon of a desk calendar. Cancel An icon of a circle with a diagonal line across. Caret An icon of a block arrow pointing to the right. Email An icon of a paper envelope. Facebook An icon of the Facebook "f" mark. Google An icon of the Google "G" mark. Linked In An icon of the Linked In "in" mark. Logout An icon representing logout. Profile An icon that resembles human head and shoulders. Telephone An icon of a traditional telephone receiver. Tick An icon of a tick mark. Is Public An icon of a human eye and eyelashes. Is Not Public An icon of a human eye and eyelashes with a diagonal line through it. Pause Icon A two-lined pause icon for stopping interactions. Quote Mark A opening quote mark. Quote Mark A closing quote mark. Arrow An icon of an arrow. Folder An icon of a paper folder. Breaking An icon of an exclamation mark on a circular background. Camera An icon of a digital camera. Caret An icon of a caret arrow. Clock An icon of a clock face. Close An icon of the an X shape. Close Icon An icon used to represent where to interact to collapse or dismiss a component Comment An icon of a speech bubble. Comments An icon of a speech bubble, denoting user comments. Comments An icon of a speech bubble, denoting user comments. Ellipsis An icon of 3 horizontal dots. Envelope An icon of a paper envelope. Facebook An icon of a facebook f logo. Camera An icon of a digital camera. Home An icon of a house. Instagram An icon of the Instagram logo. LinkedIn An icon of the LinkedIn logo. Magnifying Glass An icon of a magnifying glass. Search Icon A magnifying glass icon that is used to represent the function of searching. Menu An icon of 3 horizontal lines. Hamburger Menu Icon An icon used to represent a collapsed menu. Next An icon of an arrow pointing to the right. Notice An explanation mark centred inside a circle. Previous An icon of an arrow pointing to the left. Rating An icon of a star. Tag An icon of a tag. Twitter An icon of the Twitter logo. Video Camera An icon of a video camera shape. Speech Bubble Icon A icon displaying a speech bubble WhatsApp An icon of the WhatsApp logo. Information An icon of an information logo. Plus A mathematical 'plus' symbol. Duration An icon indicating Time. Success Tick An icon of a green tick. Success Tick Timeout An icon of a greyed out success tick. Loading Spinner An icon of a loading spinner. Facebook Messenger An icon of the facebook messenger app logo. Facebook An icon of a facebook f logo. Facebook Messenger An icon of the Twitter app logo. LinkedIn An icon of the LinkedIn logo. WhatsApp Messenger An icon of the Whatsapp messenger app logo. Email An icon of an mail envelope. Copy link A decentered black square over a white square.

Identity theft: How to avoid becoming a victim

Post Thumbnail

Identity theft has grown so fast that some experts reckon none of us will get through life without becoming victims at some point.

Adam Levin, who’s spent his lengthy career as a consumer advocate and identity fraud expert, has now written a book about the subject, and it makes fascinating reading.

Whether they hack into your computer and find your personal details, or steal your credit card, or spy on you via a web camera, there are many unscrupulous criminals out there, intent on stealing all your information and then posing as you to make an illicit fortune.

“One company is a nameless firm located in Russia,” says Adam, “which has a trove of more than a billion internet passwords.”

If one of them is yours, they can be in and out of your bank account, helping themselves to small or large amounts of your life savings.

“Another set up a website with live streams of hacked web cameras, showing everything from people’s offices and lobbies to the feeds from baby monitors,” he adds.

“Even purchases made in person are still logged by retailers such as the US one Target, which is vulnerable to hackers.

“And, of course, the recent hacking of the Ashley Madison site has exposed millions of people worldwide to the threat of blackmail and public humiliation.”

That one, in case you missed it, was when a site for cheating couples was hacked, and the details of many supposedly- happily-married men and women were revealed to the world.

Adam, in his book, has some very handy advice to avoid being the next victim.

Beware of the cyber crooks targeting you while you’re Christmas shopping – click here to read more

When using social media such as Facebook, for instance, he makes the following recommendations.

“Change your name,” he says. “If you tweak your name just a little or use a nickname, life will be easier.

“Open more than once account.

Yes, it violates Facebook’s terms of service, but 80 million accounts do it, says privacy expert John Sileo.

“Stop geotagging your photos! This includes the latitude and longitude where a picture was taken, that is, your home.

“Right-click the photo, go to Properties, Privacy, then turn off Location Services.”

While this will cover your tracks, as it were, you can also beat the thieves by playing them at their own game — simply put, start telling lies!

“Lie about your age,” Adam advises.

“While it’s fun to get birthday greetings, your birth date is a key piece of information needed to steal your identity.

“Less is more — while we all have pride in the things we’ve done and places we’ve lived, the more you tell the world about it, the more likely that information will bring you to the attention of an identity thief.

“There is no wisdom in placing so much trust and personal data in their hands.”

Swiped, by Adam Levin, is published by Public Affairs, price £16.99, ISBN No. 9781610395878.