Cybernews Team Updated on: 11 August 2022

identity theft: why oversharing your data online could put your quality of life in jeopardy

Image by Shutterstock

The repercussions of having your identity stolen could be huge, and aren’t necessarily just monetary.

Identity theft is a form of digital fraud where a criminal not only steals your data but also impersonates you with it. Impersonators then use stolen social security numbers, passports, or bank details to do whatever they want.

A Gallup poll found that 67% of respondents admitted to being afraid of identity theft. After all, statistics show that active social media users are 30% more likely to fall prey to identity fraud.

For those with Facebook, Snapchat, and Instagram accounts that percentage rises to 46%. With their personally identifiable information (PII) on the surface, it’s easy to steal it and assume the victim’s identity. This is why data theft targets this information first.

Fraudsters don’t even need that much information to go with. Any two or three out of this list will allow them to figure out most of the relevant data about you.

Over 42 million people in the US fell victim to identity theft last year, at a total cost of more than $53 billion. That’s a mean average of more than $1,000 per victim.

Worst-case scenario

In one of the worst cases that finally went to trial in 2016, an identity thief lived under a stolen persona for 26 years.

The impersonated victim lost his driver’s license, house, and even his family, while racking up a serious criminal record for crimes he didn’t commit. For decades, he was harassed by loan sharks. Eventually, he cleared his name, but that’s perhaps the scariest part of digital fraud: not everyone does.

Back in 2010, another case of identity theft quickly cost a Maryland citizen close to $1 million. David Crouse, 56, lost his retirement savings and ended up owing on a debt he expected would take at least five years to clear. It is not known what happened to the man in the end, but even after publicizing the identity theft, criminals continued using his identity around the country.

And while these cases are some of the worst ones, even the mild ones have proved devastating.

Not even celebrities can avoid identity theft. In 2014, a 19-year-old boy was convicted for running an identity fraud scam. He had PII on multiple celebrities such as Kim Kardashian, Tom Cruise, and Paris Hilton.

But both cases happened years ago, when identity thieves had to hack or actively steal data to do their crimes. Today, you might end up giving your PII away yourself.

Beware of phishers

Phishing emails have become one of the ways identity fraud is perpetrated. Threat actors behind these will pose as credible entities, asking you to fill out a form or click on a link. This will often lead you to a fake website designed to steal your data.

Another attack vector prevalent today is malware. Not so long ago, a Trojan variant called Emotet was found secretly gathering and transferring credit card data from Google Chrome. One can imagine how much more data such a virus could extract from activity on the popular browser if left unchecked.

A weak password can also often negate identity-theft protection. Data shows that six-to-eight character passwords, even those including numbers as well as letters, can take mere seconds to crack. Once a password falls into a cybercriminal’s hands, data will follow.

Of course, let’s not forget about data breaches. One more Facebook data leak, and the dark web will be flooded with personal data. The harshest part is that this information is laughably cheap for criminals. Social security number? Up to $8. Digital passport scan? Only $15 apiece. Potential damages? Those are rated in the thousands on average.

One factor is common across cybercrime cases featuring malware, weak passwords, and phishing: lack of knowledge. Identity-theft victims are often ill-informed and therefore ill-prepared when it comes to protecting their data.

Make sure you use two-factor authentication. Consider investing in cybersecurity software, such as antivirus programs, password managers, or virtual private networks (VPNs). Antiviruses will take care of malware, managers can reduce the risk of your passwords being cracked, and VPNs provide secure browsing connections.

That said, you should always be careful of any third-party software you install. And, of course, remember to manage your privacy settings on social media.


Australia demands Optus pay for new customer ID documents

An Optus phone sign hangs above its store in Sydney, Australia, Thursday, Oct. 7, 2021. Australia’s federal and state governments on Wednesday, Sept. 28, 2022, called for Optus to pay for replacing identification documents including passports and driver’s licenses to avoid identity fraud after 9.8 million of the telecommunications ...

View more: Australia demands Optus pay for new customer ID documents

Cyberattacks a top concern across all business sizes, economic uncertainty a close second, new survey shows

Credit: Pixabay/CC0 Public Domain Cyberattacks are now so common that the majority of businesses responding to a new survey not only viewed them as their top concern but a majority saw a future attack on their organization as inevitable. An annual survey of businesses by insurance giant Travelers Cos., ...

View more: Cyberattacks a top concern across all business sizes, economic uncertainty a close second, new survey shows

Australian board directors urged to boost cybersecurity skills

Credit: Pixabay/CC0 Public Domain A University of Queensland study has identified a need to prioritize cybersecurity training for board directors, to better protect Australian organizations from cyber-attacks. Dr. Ivano Bongiovanni from the UQ Business School said his research found board directors were not always sure about their duties and ...

View more: Australian board directors urged to boost cybersecurity skills

Australian police probe purported hacker's ransom demand

A customer waits for service at a Optus phone store in Sydney, Australia, Thursday, Oct. 7, 2021. The Australian government said on Monday, Sept. 26, 2022, it was considering tougher cybersecurity rules for telecommunications companies after Optus, the nation’s second-largest wireless carrier, reported personal data of 9.8 million customers ...

View more: Australian police probe purported hacker's ransom demand

New report offers blueprint for regulation of facial recognition technology

Credit: Pixabay/CC0 Public Domain A new report from the University of Technology Sydney (UTS) Human Technology Institute outlines a model law for facial recognition technology to protect against harmful use of this technology, but also foster innovation for public benefit. Australian law was not drafted with widespread use of ...

View more: New report offers blueprint for regulation of facial recognition technology

Hackers leak French hospital patient data in ransom fight

Hackers who crippled a French hospital and stole a trove of data last month have released personal records of patients online, officials have confirmed. The cyberattackers demanded a multimillion dollar ransom from the Corbeil-Essonnes hospital near Paris a month ago, but the institution refused to pay. The hospital said the ...

View more: Hackers leak French hospital patient data in ransom fight

Python affected by 15-year-old bug that keeps on giving

In brief: The Python programming language is being impacted by security issue programmers have know about for a while. Trellix researchers recently rediscovered a bug, highlighting the risk for hundreds of thousands of software projects and creating patches for tens of thousands of them. Being one of the most ...

View more: Python affected by 15-year-old bug that keeps on giving

Quantum encryption to boost European autonomy

Credit: European Space Agency Cyberattacks and geopolitics threaten today’s increasingly digital world, leading to the disruption of essential supplies such as power and water. ESA, the European Commission and space companies in Europe are teaming up to work towards a highly secure, satellite-enabled connectivity system for the EU—based on ...

View more: Quantum encryption to boost European autonomy

Cyberattack steals passenger data from Portuguese airline

'Bad buzz': Gaming industry reels from 'Grand Theft Auto' hack

LA Unified cyberattackers demand ransom

Deepfake audio has a tell: Researchers use fluid dynamics to spot artificial imposter voices

Hackers accessed data on some American Airlines customers

'Grand Theft Auto' maker says game code stolen

Hackers are spreading malware through YouTube channels promoting game cheats

Color image encryption using an improved version of stream cipher and chaos

Hacker claims to breach Uber, security researcher says

Three questions about quantum computing and secure communications

EU wants to toughen cybersecurity rules for smart devices

FIFA 23 and other EA titles will come with controversial "kernel-mode" anti-cheat software


Top Car News Car News