- Terrorism and Identity Theft
- Who Are Identity Thieves?
- What Do Identity Thieves Do?
- College Students and Identity Theft
- Malware and Macs
- Dumpster Diving
- You Are Only As Safe As the Places That Have Your Information
- They Should Know Better
- Hackers
- Identity Theft Risk in Old Gaming Consoles
- The Drug Connection
- Phishing
- Federal Express Phishing Scam
- Newegg Phishing Scam
- Former Good Advice
- More Good Advice to Avoid Becoming a Victim of Phishing
- The Dangers of Aquaman
- Iron Man 3
- Nude Photos of Carla Bruni
- Debit Card Phishing Scam
- Another Debit Card Phishing Scam
- Phishing with a Large Net
- Phishing Around the World
- Spearphishing
- How Do You Know That You Have Become a Victim of Phishing?
- Reloading
- Identity Theft Through Internet Phone Calls
- What Do Kim Kardashian and Michelle Obama Have in Common?
- USB Sticks and Identity Theft
- Internet of Things
- What You Can Do to Prevent Identity Theft
Former Good Advice
Smug consumers used to be able to identify a phishing expedition by merely looking at the Web browser’s address window to determine whether the e-mail purporting to be from some company with which they generally dealt was legitimate. If the sender’s e-mail address began with an unusual number configuration or had random letters, this indicated that it was phony. The e-mail addresses of legitimate companies are usually simple and direct. Unfortunately, this is not always the case. Now computer-savvy identity thieves are able to mimic the legitimate e-mail addresses of legitimate companies.