We are independent & ad-supported. We may earn a commission for purchases made through our links.

Advertiser Disclosure

Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.

How We Make Money

We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently from our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.

What is Internet Identity Theft?

Jessica Ellis
By
Updated May 17, 2024
Our promise to you
WiseGEEK is dedicated to creating trustworthy, high-quality content that always prioritizes transparency, integrity, and inclusivity above all else. Our ensure that our content creation and review process includes rigorous fact-checking, evidence-based, and continual updates to ensure accuracy and reliability.

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

Editorial Standards

At WiseGEEK, we are committed to creating content that you can trust. Our editorial process is designed to ensure that every piece of content we publish is accurate, reliable, and informative.

Our team of experienced writers and editors follows a strict set of guidelines to ensure the highest quality content. We conduct thorough research, fact-check all information, and rely on credible sources to back up our claims. Our content is reviewed by subject matter experts to ensure accuracy and clarity.

We believe in transparency and maintain editorial independence from our advertisers. Our team does not receive direct compensation from advertisers, allowing us to create unbiased content that prioritizes your interests.

Identity theft is a serious crime that can destroy the financial reputation of a victim and lead to serious breaches of personal privacy. Much as a person locks his or her car to keep it from getting stolen, Internet users must try to lock their their computers to keep the valuable personal information inside from being exploited or stolen. Internet identity theft is a large problem in the 21st century, as thieves and hackers use increasingly sophisticated tactics to gain access to personal data.

Though people may not realize it, the age of the Internet means that a great deal of personal information is kept on a computer. Any person who buys an MP3 or signs up for online banking, uses a social networking site, or even opens an email account places personal data online. To protect against all possible threats of Internet identity theft is difficult, requiring constant vigilance and computer literacy.

One of the most common ways to become exposed to Internet identity theft is through phishing. Phishers send out emails that look as if they are sent by a reputable and well-known organization, such as the government, a personal bank, or credit card company. These emails contain links that will transport the user to the main website to enter personal data under the threat that an account needs to be updates or consequences will follow. Although the websites may look genuine, clicking the email link will allow a virus to install on the computer and gain access to personal data, including that entered into the fake website.

A key to avoiding phishing schemes is to avoid clicking on the link in the email. If unsure whether the mail is for real or not, type out the address of the link by hand rather than clicking the link. Remember that no reputable organization will require personal information by email. If the email claims to be from a bank or company the user has accounts with, call the company to confirm that the email is not a phishing attempt.

Social networking sites are extremely popular, but the unwary user can leave him or herself vulnerable to Internet identity theft by posting too much personal information. Do not include information such as address, phone number, or anything that could lead a thief to guess a password. If possible, check the security settings of the website and set the page so that only user-accepted friends and contacts can view photos and any information. Do not accept contacts that are unfamiliar.

Internet identity theft can also easily occur on public computers. If a person does not sign out completely, any purchases or saved passwords can be seen and used by the next user. Public, unsecured wireless connections also make users vulnerable to Internet identity theft, as spy programs can easily tap into unprotected connections and view the user's actions.

To help identify spying viruses that help gain information for Internet identity fraud, download or purchase a well-reviewed anti-virus program and run it regularly. If possible, set it to run each time the computer starts up. A good thief needs only a few minutes to lift information off a computer through a virus, so don't give him or her the chance.

WiseGEEK is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
Jessica Ellis
By Jessica Ellis
With a B.A. in theater from UCLA and a graduate degree in screenwriting from the American Film Institute, Jessica Ellis brings a unique perspective to her work as a writer for WiseGEEK. While passionate about drama and film, Jessica enjoys learning and writing about a wide range of topics, creating content that is both informative and engaging for readers.

Discussion Comments

Jessica Ellis

Jessica Ellis

With a B.A. in theater from UCLA and a graduate degree in screenwriting from the American Film Institute, Jessica Ellis...
Read more
WiseGEEK, in your inbox

Our latest articles, guides, and more, delivered daily.

WiseGEEK, in your inbox

Our latest articles, guides, and more, delivered daily.