Skip to main content

Identity theft techniques used by thieves

posted onJuly 21, 2010
by hitbsecnews

Name the vulnerability and thieves will use it to steal access to their electronically stored funds or to pose as their victims when they establish credit using purloined credentials.

Imagine a thief who hangs out in a supermarket, looking for the most harried and ditzy shopper. That individual falls in line behind the shopper, watching as the ATM card is used and as the PIN is entered. "Somehow", the card falls to the floor and the helpful thief picks up the card and hands it back to the distracted customer. Only it is another card that looks the same. Now the thief has the card and the PIN. The bank only wants the card and the PIN, making the thief identical to the true owner of the card. Expand the list to those who have access to security camera records of a person as they are entering their PIN.

Source

Tags

Privacy

You May Also Like

Recent News

Friday, November 29th

Tuesday, November 19th

Friday, November 8th

Friday, November 1st

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th