Identity Theft

/Identity Theft
­

How Can You Protect Your Online Accounts from Hackers?

Some great advice from WSJ (subscription) as identity thieves continue to develop more sophisticated strategies to steal your identity. Moral of the story: You are your own worst enemy when it comes to giving up information when you should not be.

A few highlights and some strategies to protect oneself:

  • Phishing is the most common online scam:
By |February 28th, 2017|Article, Current Events, Identity Theft|

WebQuest: How To Protect that Credit (and Debit) Card!

I am always amazed when I am searching Google for interesting news stories about credit cards how frequently the articles detail how the “bad guys” manage to steal credit card information. Identity theft can seem like an adult problem to many teens (unless their parents or they have been personally victimized), so I thought this quick WebQuest might bring the topic home to them.  I thought it would be interesting to provide an update to my earlier 2015 post titled (apologies to Paul Simon) “50 Ways to Swipe Your Credit Card (or Debit Card) Number.”

So, here’s the assignment:

Question: What Are The Ten Most Popular Passwords?

download (4)

 

 

 

 

 

Before I answer, please let your students know if their password shows up below on this list, they better change it NOW!

Answer (from Consumerist):

By |January 19th, 2017|Current Events, Identity Theft, Question of the Day, Research|

Chart: How Is Card Fraud Committed In US Compared to Rest of the World?

From Federal Reserve Payment Study 2016:

screen-shot-2017-01-10-at-3-12-39-pm

Questions for your students:

Question: How Long Does It Take a Hacker To Steal Your Credit Card Information Online?

Answer (from Newcastle University research): About 6 seconds (yikes!) [This should grab your students attention!]

From Thrillist:

According to new a paper authored by Newcastle University researchers, hackers can mine your financial information using simple guesswork, spread out across multiple websites. When the process, known as a Distributed Guessing Attack, is coupled with a specifically designed toolkit, it isn’t very hard to exploit the security systems of major e-commerce sites…

Here’s a 31 second video explaining the technique:

Question: What’s the Difference Between Debit And Credit Cards?

Students are often confused about this distinction between debit and credit cards. Here are some resources that help show the ways in which they differ:

Question: What Is Fastest Growing Area for Credit Card Fraud?

Hint: Crooks have figured out ways to circumvent the chip cards.

Answer (from WSJ): “Card-not-present” fraud.

Interactive: Have You Been Hacked?

Answer: Yes, your personal information has likely been compromised.

With the recent news of the massive Yahoo breach (500 million people), NYTimes created this interactive so an individual can see how often they are likely to have been hacked and their personal information that is out there on the dark web. Your students will select the websites that they have accounts on and discover what personal information has been exposed to hackers.

Good reminder for students about the importance of 1) protecting your information 2) checking your credit report regularly to ensure no new accounts are being set up in your name (I prefer the freeze  myself).  The simulation includes some good tips on both of these points. Enjoy!

Here’s the graphic: