IDENTITY WHICH THEY CAN USE FOR ILLICIT PURPOSE, LIKE ONLINE PAYMENTS OR ANY OTHER FRAUD. HOW CYBERCRIMINALS AND SCAMMERS OPERARE Collect and Compile publicly available information about you. Use your leaked data to gain access to your vulnerable accounts. Contact you via email or social media and impersonate institutions or employees to find out more information about you. Try common and leaked username/password combinations to break into your accounts. KINDS OF IDENTITY THEFT
CHILD IDENTITY THEFT
IDENTITY CLONING FINANCIAL IDENTITY THEFT MEDICAL IDENTITY THEFT TAX IDENTITY THEFT HOW TO PROTECT YOURSELF FROM IDENTITY THEFT
Keep tract of your Internet connected devices.
Use strong, unique password for your accounts. Avoid Public WIFI Invest in Security Software. Monitor your Credit Reports.