Difference between revisions of "Identity Theft"

Jump to navigation Jump to search
39 bytes removed ,  23:35, 24 March 2014
no edit summary
Line 17: Line 17:
==How do they get the information?==  
==How do they get the information?==  


{{#ev:youtube|mvbxcgKRL5Q|400|right|What is Identity Theft?}}
{{#ev:youtube|mvbxcgKRL5Q|350|right}}
Identity thieves can obtain your personal and financial information in a range of ways. For example, they may:
Identity thieves can obtain your personal and financial information in a range of ways. For example, they may:
* Steal the information from your computer, smartphone, wallet or purse, home, or vehicle.
* Steal the information from your computer, smartphone, wallet or purse, home, or vehicle.
Line 28: Line 28:
* Place bogus advertisements for employment in <span class="noglossary">order</span> to obtain your information.
* Place bogus advertisements for employment in <span class="noglossary">order</span> to obtain your information.
* Pretend they need your personal details to send you “winnings”.
* Pretend they need your personal details to send you “winnings”.
{{#ev:youtube|K9hvYMQA_HM&list=PL85-ey03yaql5gWPrZdhT-3sAPVOKmIfI|400|right|Identity Theft}}
{{#ev:youtube|K9hvYMQA_HM&list=PL85-ey03yaql5gWPrZdhT-3sAPVOKmIfI|350|right}}


==Warning signs==  
==Warning signs==  
9,075

edits

Navigation menu