privacy

share

 

Identity theft occurs when someone steals personal information such as your name, identity card number or credit card number, so that they can pretend to be someone else. This is usually done to gain access to finances, get medical benefits, to avoid the police, or to commit other crimes. 

 

How do identity thieves find your personal information? 

share

 

ATM skimming is like identity theft for debit cards. It is an illegal activity that involves installing hidden devices that secretly record bank account details when a user inserts an ATM card into the machine. Criminals can then use the stolen data to create a cloned card to withdraw money from the victim’s bank account either locally or overseas. 

 

Skimming typically requires two separate components to work. 

share

Social Engineering is a technique of deceiving people to reveal sensitive information which they would usually not share. It typically involves trickery for the purpose of information gathering, fraud, or access to computer systems. 

 

What methods are used by social engineers? 

share

Social media have dramatically changed the way we communicate. It’s easy to access the latest information about your friends and share updates about your own life. It also creates added responsibility to protect yourself and others. 

 

Think before you post anything online 

share

Online games are easily available for download or to play through game consoles, computers and mobile devices. While games can be entertaining, you should be aware of the potential dangers to children. 

 

Risks of online gaming 

Pages