%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R 16 0 R ] /Count 2 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20240519004544+00'00') /ModDate (D:20240519004544+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 8445 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 67.649 521.469 679.085 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 746.734 m 566.734 746.734 l 565.984 745.984 l 46.016 745.984 l f 566.734 746.734 m 566.734 67.649 l 565.984 67.649 l 565.984 745.984 l f 45.266 746.734 m 45.266 67.649 l 46.016 67.649 l 46.016 745.984 l f 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(CYBERSECURITY AWARENESS MONTH: IDENTITY THIEVES’ MODUS )] TJ ET BT 61.016 566.258 Td /F1 14.4 Tf [(OPERANDI – PART 1)] TJ ET 0.373 0.169 0.255 rg BT 61.016 546.451 Td /F3 9.0 Tf [(Identity Theft)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 61.016 545.300 m 113.045 545.300 l S 0.400 0.400 0.400 rg BT 113.045 546.451 Td /F3 9.0 Tf [( takes place whenever a criminal gets hold of a piece of your information and uses that information for their )] TJ ET BT 61.016 535.462 Td /F3 9.0 Tf [(own personal gain.)] TJ ET BT 61.016 515.473 Td /F3 9.0 Tf [(While a lost or stolen wallet, purse or cell phone may simply mean the loss of your cash and credit cards, it may also be )] TJ ET BT 61.016 504.484 Td /F3 9.0 Tf [(the beginning of an identity theft case. The return of the item does not guarantee cards were not copied or that your )] TJ ET BT 61.016 493.495 Td /F3 9.0 Tf [(personal information was not used to commit identity theft.)] TJ ET BT 61.016 473.506 Td /F3 9.0 Tf [(In the )] TJ ET 0.373 0.169 0.255 rg BT 86.036 473.506 Td /F3 9.0 Tf [(previous article)] TJ ET 0.18 w 0 J [ ] 0 d 86.036 472.355 m 146.552 472.355 l S 0.400 0.400 0.400 rg BT 146.552 473.506 Td /F3 9.0 Tf [( we pointed out 5 low-tech areas in your world where identity theft could take place.)] TJ ET 0.400 0.400 0.400 RG 85.866 456.333 m 85.866 456.745 85.696 457.155 85.404 457.447 c 85.113 457.738 84.703 457.908 84.291 457.908 c 83.878 457.908 83.469 457.738 83.177 457.447 c 82.885 457.155 82.716 456.745 82.716 456.333 c 82.716 455.921 82.885 455.511 83.177 455.219 c 83.469 454.928 83.878 454.758 84.291 454.758 c 84.703 454.758 85.113 454.928 85.404 455.219 c 85.696 455.511 85.866 455.921 85.866 456.333 c f BT 91.016 453.517 Td /F3 9.0 Tf [(Old-fashioned letters \(including junk-mail\))] TJ ET 85.866 445.344 m 85.866 445.756 85.696 446.166 85.404 446.458 c 85.113 446.749 84.703 446.919 84.291 446.919 c 83.878 446.919 83.469 446.749 83.177 446.458 c 82.885 446.166 82.716 445.756 82.716 445.344 c 82.716 444.932 82.885 444.522 83.177 444.230 c 83.469 443.939 83.878 443.769 84.291 443.769 c 84.703 443.769 85.113 443.939 85.404 444.230 c 85.696 444.522 85.866 444.932 85.866 445.344 c f BT 91.016 442.528 Td /F3 9.0 Tf [(The trash can)] TJ ET 85.866 434.355 m 85.866 434.767 85.696 435.177 85.404 435.469 c 85.113 435.760 84.703 435.930 84.291 435.930 c 83.878 435.930 83.469 435.760 83.177 435.469 c 82.885 435.177 82.716 434.767 82.716 434.355 c 82.716 433.943 82.885 433.533 83.177 433.241 c 83.469 432.950 83.878 432.780 84.291 432.780 c 84.703 432.780 85.113 432.950 85.404 433.241 c 85.696 433.533 85.866 433.943 85.866 434.355 c f BT 91.016 431.539 Td /F3 9.0 Tf [(Flash disks)] TJ ET 85.866 423.366 m 85.866 423.778 85.696 424.188 85.404 424.480 c 85.113 424.771 84.703 424.941 84.291 424.941 c 83.878 424.941 83.469 424.771 83.177 424.480 c 82.885 424.188 82.716 423.778 82.716 423.366 c 82.716 422.954 82.885 422.544 83.177 422.252 c 83.469 421.961 83.878 421.791 84.291 421.791 c 84.703 421.791 85.113 421.961 85.404 422.252 c 85.696 422.544 85.866 422.954 85.866 423.366 c f BT 91.016 420.550 Td /F3 9.0 Tf [(Your driver's license or ID Document)] TJ ET 85.866 412.377 m 85.866 412.789 85.696 413.199 85.404 413.491 c 85.113 413.782 84.703 413.952 84.291 413.952 c 83.878 413.952 83.469 413.782 83.177 413.491 c 82.885 413.199 82.716 412.789 82.716 412.377 c 82.716 411.965 82.885 411.555 83.177 411.263 c 83.469 410.972 83.878 410.802 84.291 410.802 c 84.703 410.802 85.113 410.972 85.404 411.263 c 85.696 411.555 85.866 411.965 85.866 412.377 c f BT 91.016 409.561 Td /F3 9.0 Tf [(Household paperwork.)] TJ ET BT 61.016 389.572 Td /F3 9.0 Tf [(Identity theft isn't always )] TJ ET BT 160.781 389.572 Td /F3 9.0 Tf [("high-tech")] TJ ET BT 204.188 389.572 Td /F3 9.0 Tf [(. It can happen to anyone, even if they don't have a computer or cell phone or don't )] TJ ET BT 61.016 378.583 Td /F3 9.0 Tf [(use social media.)] TJ ET BT 61.016 358.594 Td /F4 9.0 Tf [(Dumpster diving)] TJ ET BT 132.026 358.594 Td /F3 9.0 Tf [( – literally digging through your trash – remains a popular method for stealing large amounts of your )] TJ ET BT 61.016 347.605 Td /F3 9.0 Tf [(personal information. South Africans receive over 1.2 million tons of junk mail every year and much of this mail, such as )] TJ ET BT 61.016 336.616 Td /F3 9.0 Tf [(pre-approved credit cards, credit card bills, and bank statements, includes your personal information. Dumpster-diving )] TJ ET BT 61.016 325.627 Td /F3 9.0 Tf [(identity thieves root through your trash because they know the documents you discard as garbage contain personal )] TJ ET BT 61.016 314.638 Td /F3 9.0 Tf [(identity information they can use in a variety of illegal manners, such as employment-related, loan, bank, benefits and tax )] TJ ET BT 61.016 303.649 Td /F3 9.0 Tf [(fraud.)] TJ ET BT 61.016 283.660 Td /F4 9.0 Tf [(Mail theft)] TJ ET BT 100.517 283.660 Td /F3 9.0 Tf [( - Mail theft is the number 1 white collar crime in the USA today. Mail theft is defined as anyone taking mail, be it )] TJ ET BT 61.016 272.671 Td /F3 9.0 Tf [(a letter or a package, for any purpose. This includes stealing from post office workers, private mailboxes, collection boxes )] TJ ET BT 61.016 261.682 Td /F3 9.0 Tf [(and even from mail trucks. One of the main motivators in mail theft is to steal a person's identity and gain access to private )] TJ ET BT 61.016 250.693 Td /F3 9.0 Tf [(information, including bank accounts and credit cards.)] TJ ET BT 61.016 230.704 Td /F4 9.0 Tf [(Social engineering)] TJ ET BT 141.044 230.704 Td /F3 9.0 Tf [( - Social engineering is the art of manipulating people to give up confidential information. The types of )] TJ ET BT 61.016 219.715 Td /F3 9.0 Tf [(information these criminals are seeking can vary, but when individuals are targeted, the criminals are usually trying to trick )] TJ ET BT 61.016 208.726 Td /F3 9.0 Tf [(you into giving them your passwords or bank information. Criminals use social engineering tactics because it is usually )] TJ ET BT 61.016 197.737 Td /F3 9.0 Tf [(easier to exploit your natural inclination to trust than it is to find ways to hack your software. )] TJ ET BT 425.678 197.737 Td /F3 9.0 Tf [(For example, it is much easier )] TJ ET BT 61.016 186.748 Td /F3 9.0 Tf [(to fool someone into giving you their password than it is for you to try hacking their password. That is why phishing is so )] TJ ET BT 61.016 175.759 Td /F3 9.0 Tf [(successful, often victims willingly give their personal information to the scammers, as they feel they can trust the person )] TJ ET BT 61.016 164.770 Td /F3 9.0 Tf [(asking for the information.)] TJ ET BT 61.016 144.781 Td /F4 9.0 Tf [(Shoulder surfing)] TJ ET BT 133.025 144.781 Td /F3 9.0 Tf [( - Shoulder surfing occurs when someone watches over your shoulder as you key it into a device such )] TJ ET BT 61.016 133.792 Td /F3 9.0 Tf [(as an ATM or tablet, to steal valuable information, such as your password, ATM PIN, or credit card number. When the )] TJ ET BT 61.016 122.803 Td /F3 9.0 Tf [(shoulder surfer uses your information for his financial gain, it becomes identity theft.)] TJ ET BT 61.016 102.814 Td /F4 9.0 Tf [(Theft of personal items)] TJ ET BT 160.034 102.814 Td /F3 9.0 Tf [( - When a personal item like a handbag, a wallet or purse, a cell phone, or a laptop is stolen, all )] TJ ET BT 61.016 91.825 Td /F3 9.0 Tf [(the information can potentially be used for identity theft. The value of the stolen items is often not much, and replacement )] TJ ET BT 61.016 80.836 Td /F3 9.0 Tf [(is an inconvenience to many of us. However, your personal information can never be recovered, and is intrinsically more )] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 545.6182 113.0447 554.7757 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (https://en.wikipedia.org/wiki/Identity_theft) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 86.0357 472.6732 146.5517 481.8307 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/gergablog/2018/10/10/cyber-security-awareness-month-where-do-scammers-get-your-information/) >> endobj 16 0 obj << /Type /Page /Parent 3 0 R /Contents 17 0 R >> endobj 17 0 obj << /Length 4310 >> stream 0.400 0.400 0.400 rg 0.400 0.400 0.400 RG 0.18 w 0 J [ ] 0 d 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 566.866 521.469 191.118 re f 0.773 0.773 0.773 rg 0.773 0.773 0.773 RG 45.266 566.866 m 566.734 566.866 l 565.984 567.616 l 46.016 567.616 l f 566.734 757.984 m 566.734 566.866 l 565.984 567.616 l 565.984 757.984 l f 45.266 757.984 m 45.266 566.866 l 46.016 567.616 l 46.016 757.984 l f 0.400 0.400 0.400 rg BT 61.016 749.193 Td /F3 9.0 Tf [(valuable than the stolen item.)] TJ ET BT 61.016 729.204 Td /F4 9.0 Tf [(What can you do to minimize)] TJ ET BT 185.036 729.204 Td /F4 9.0 Tf [("low-tech)] TJ ET BT 225.806 729.204 Td /F4 9.0 Tf [(" identity theft?)] TJ ET 0.400 0.400 0.400 RG 85.866 712.031 m 85.866 712.444 85.696 712.853 85.404 713.145 c 85.113 713.437 84.703 713.606 84.291 713.606 c 83.878 713.606 83.469 713.437 83.177 713.145 c 82.885 712.853 82.716 712.444 82.716 712.031 c 82.716 711.619 82.885 711.209 83.177 710.918 c 83.469 710.626 83.878 710.456 84.291 710.456 c 84.703 710.456 85.113 710.626 85.404 710.918 c 85.696 711.209 85.866 711.619 85.866 712.031 c f BT 91.016 709.215 Td /F3 9.0 Tf [(Never give out personal or financial information over the phone or in an email.)] TJ ET 85.866 701.042 m 85.866 701.455 85.696 701.864 85.404 702.156 c 85.113 702.448 84.703 702.617 84.291 702.617 c 83.878 702.617 83.469 702.448 83.177 702.156 c 82.885 701.864 82.716 701.455 82.716 701.042 c 82.716 700.630 82.885 700.220 83.177 699.929 c 83.469 699.637 83.878 699.467 84.291 699.467 c 84.703 699.467 85.113 699.637 85.404 699.929 c 85.696 700.220 85.866 700.630 85.866 701.042 c f BT 91.016 698.226 Td /F3 9.0 Tf [(Password-protect your cell phone.)] TJ ET 85.866 690.053 m 85.866 690.466 85.696 690.875 85.404 691.167 c 85.113 691.459 84.703 691.628 84.291 691.628 c 83.878 691.628 83.469 691.459 83.177 691.167 c 82.885 690.875 82.716 690.466 82.716 690.053 c 82.716 689.641 82.885 689.231 83.177 688.940 c 83.469 688.648 83.878 688.478 84.291 688.478 c 84.703 688.478 85.113 688.648 85.404 688.940 c 85.696 689.231 85.866 689.641 85.866 690.053 c f BT 91.016 687.237 Td /F3 9.0 Tf [(Shred credit card receipts, junk mail and other such documents with sensitive personal or financial information.)] TJ ET 85.866 679.064 m 85.866 679.477 85.696 679.886 85.404 680.178 c 85.113 680.470 84.703 680.639 84.291 680.639 c 83.878 680.639 83.469 680.470 83.177 680.178 c 82.885 679.886 82.716 679.477 82.716 679.064 c 82.716 678.652 82.885 678.242 83.177 677.951 c 83.469 677.659 83.878 677.489 84.291 677.489 c 84.703 677.489 85.113 677.659 85.404 677.951 c 85.696 678.242 85.866 678.652 85.866 679.064 c f BT 91.016 676.248 Td /F3 9.0 Tf [(Be aware of your surroundings at all time.)] TJ ET 85.866 668.075 m 85.866 668.488 85.696 668.897 85.404 669.189 c 85.113 669.481 84.703 669.650 84.291 669.650 c 83.878 669.650 83.469 669.481 83.177 669.189 c 82.885 668.897 82.716 668.488 82.716 668.075 c 82.716 667.663 82.885 667.253 83.177 666.962 c 83.469 666.670 83.878 666.500 84.291 666.500 c 84.703 666.500 85.113 666.670 85.404 666.962 c 85.696 667.253 85.866 667.663 85.866 668.075 c f BT 91.016 665.259 Td /F3 9.0 Tf [(Tilt the screen of your cell phone screen away from the person next to you and don't work in crowded airplanes, )] TJ ET BT 91.016 654.270 Td /F3 9.0 Tf [(trains, airports, cafes, hotel lobbies and other public spaces.)] TJ ET 85.866 646.097 m 85.866 646.510 85.696 646.919 85.404 647.211 c 85.113 647.503 84.703 647.672 84.291 647.672 c 83.878 647.672 83.469 647.503 83.177 647.211 c 82.885 646.919 82.716 646.510 82.716 646.097 c 82.716 645.685 82.885 645.275 83.177 644.984 c 83.469 644.692 83.878 644.522 84.291 644.522 c 84.703 644.522 85.113 644.692 85.404 644.984 c 85.696 645.275 85.866 645.685 85.866 646.097 c f BT 91.016 643.281 Td /F3 9.0 Tf [(Work with your back to a wall, preventing others from standing behind you and looking over your shoulder.)] TJ ET BT 61.016 623.292 Td /F3 9.0 Tf [(Next time we will look at the )] TJ ET BT 174.551 623.292 Td /F3 9.0 Tf [(modus operandi)] TJ ET BT 239.081 623.292 Td /F3 9.0 Tf [( of high-tech identity thieves.)] TJ ET BT 61.016 603.303 Td /F3 9.0 Tf [( )] TJ ET BT 61.016 584.814 Td /F3 9.0 Tf [(Posted in:Security,Tips | | With 0 comments)] TJ ET endstream endobj xref 0 18 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000312 00000 n 0000000341 00000 n 0000000476 00000 n 0000000565 00000 n 0000009062 00000 n 0000009174 00000 n 0000009281 00000 n 0000009397 00000 n 0000009517 00000 n 0000009644 00000 n 0000009740 00000 n 0000009867 00000 n 0000010033 00000 n 0000010098 00000 n trailer << /Size 18 /Root 1 0 R /Info 5 0 R >> startxref 14461 %%EOF Cybersecurity Awareness Month: Identity thieves’ modus operandi – Part 1 « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

Cybersecurity Awareness Month: Identity thieves’ modus operandi – Part 1

Identity Theft takes place whenever a criminal gets hold of a piece of your information and uses that information for their own personal gain.

While a lost or stolen wallet, purse or cell phone may simply mean the loss of your cash and credit cards, it may also be the beginning of an identity theft case. The return of the item does not guarantee cards were not copied or that your personal information was not used to commit identity theft.

In the previous article we pointed out 5 low-tech areas in your world where identity theft could take place.

  • Old-fashioned letters (including junk-mail)
  • The trash can
  • Flash disks
  • Your driver’s license or ID Document
  • Household paperwork.

Identity theft isn’t always “high-tech”. It can happen to anyone, even if they don’t have a computer or cell phone or don’t use social media.

Dumpster diving – literally digging through your trash – remains a popular method for stealing large amounts of your personal information. South Africans receive over 1.2 million tons of junk mail every year and much of this mail, such as pre-approved credit cards, credit card bills, and bank statements, includes your personal information. Dumpster-diving identity thieves root through your trash because they know the documents you discard as garbage contain personal identity information they can use in a variety of illegal manners, such as employment-related, loan, bank, benefits and tax fraud.

Mail theft – Mail theft is the number 1 white collar crime in the USA today. Mail theft is defined as anyone taking mail, be it a letter or a package, for any purpose. This includes stealing from post office workers, private mailboxes, collection boxes and even from mail trucks. One of the main motivators in mail theft is to steal a person’s identity and gain access to private information, including bank accounts and credit cards.

Social engineering – Social engineering is the art of manipulating people to give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted, the criminals are usually trying to trick you into giving them your passwords or bank information. Criminals use social engineering tactics because it is usually easier to exploit your natural inclination to trust than it is to find ways to hack your software. For example, it is much easier to fool someone into giving you their password than it is for you to try hacking their password. That is why phishing is so successful, often victims willingly give their personal information to the scammers, as they feel they can trust the person asking for the information.

Shoulder surfing – Shoulder surfing occurs when someone watches over your shoulder as you key it into a device such as an ATM or tablet, to steal valuable information, such as your password, ATM PIN, or credit card number. When the shoulder surfer uses your information for his financial gain, it becomes identity theft.

Theft of personal items – When a personal item like a handbag, a wallet or purse, a cell phone, or a laptop is stolen, all the information can potentially be used for identity theft. The value of the stolen items is often not much, and replacement is an inconvenience to many of us. However, your personal information can never be recovered, and is intrinsically more valuable than the stolen item.

What can you do to minimize “low-tech” identity theft?

  • Never give out personal or financial information over the phone or in an email.
  • Password-protect your cell phone.
  • Shred credit card receipts, junk mail and other such documents with sensitive personal or financial information.
  • Be aware of your surroundings at all time.
  • Tilt the screen of your cell phone screen away from the person next to you and don’t work in crowded airplanes, trains, airports, cafes, hotel lobbies and other public spaces.
  • Work with your back to a wall, preventing others from standing behind you and looking over your shoulder.

Next time we will look at the modus operandi of high-tech identity thieves.

 

Comments are closed.

 

© 2013-2024 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.