9,075
edits
Drew Jackson (talk | contribs) |
Drew Jackson (talk | contribs) |
||
Line 17: | Line 17: | ||
==How do they get the information?== | ==How do they get the information?== | ||
{{#ev:youtube|mvbxcgKRL5Q| | {{#ev:youtube|mvbxcgKRL5Q|350|right}} | ||
Identity thieves can obtain your personal and financial information in a range of ways. For example, they may: | Identity thieves can obtain your personal and financial information in a range of ways. For example, they may: | ||
* Steal the information from your computer, smartphone, wallet or purse, home, or vehicle. | * Steal the information from your computer, smartphone, wallet or purse, home, or vehicle. | ||
Line 28: | Line 28: | ||
* Place bogus advertisements for employment in <span class="noglossary">order</span> to obtain your information. | * Place bogus advertisements for employment in <span class="noglossary">order</span> to obtain your information. | ||
* Pretend they need your personal details to send you “winnings”. | * Pretend they need your personal details to send you “winnings”. | ||
{{#ev:youtube|K9hvYMQA_HM&list=PL85-ey03yaql5gWPrZdhT-3sAPVOKmIfI| | {{#ev:youtube|K9hvYMQA_HM&list=PL85-ey03yaql5gWPrZdhT-3sAPVOKmIfI|350|right}} | ||
==Warning signs== | ==Warning signs== |
edits