Skip to Main Content

5 Ways Hackers Can Steal Your Identity

A shadowy figure representing a hacker attempting to steal someone's identity.

 

Fraudsters are looking for new ways to hack into computers to steal your personal information and—in the worst cases—your identity. This can range from intercepting a company’s chat system to trying to swipe someone’s frequent flyer miles.

If you stay informed and learn about some of the latest methods, you’re taking a step to help protect your identity.

Here's a look at some of the ways hackers are taking advantage of potential victims and what you can do about it.

1. Coffee shop hackers

Cyber thieves sometimes target computers being used at a coffee shop or another public place, and users don't even have to be connected to Wi-Fi to be affected. That’s according to the Georgia Institute of Technology. The thieves look for low-power electronic signals from your computer or smartphone, which could expose your online activity, passwords and other personal information, even if you’re not connected to the Internet.

It takes a "side channel" intercept, through a receiver that monitors and records information, to steal sensitive information from your computer or phone.

These side-channel emissions can be measured several feet away from a computer using a variety of spying methods. For instance, antennas hidden in a briefcase can receive electromagnetic emissions. Microphones hidden beneath tables can pick up acoustic emissions.

Advice: When you're on your computer or other electronic device in a public space, pay attention to people around you and take note of suspicious behavior. If your instinct tells you something is wrong, turn off your devices. Leaks are only possible to tap into when your devices are on.

2. Targeting your company's chat system

Group chat apps are common in office settings. At times, they’ve been hacked. The type of information accessed has included names, usernames, email addresses passwords and phone numbers.

Advice: If you use a group chat app at work, it’s smart to use one that’s “end-to-end” encrypted. Messages should only be readable on the sender’s and recipient’s devices. It’s a good idea to check with your company to see if your chat service is “end-to-end” encrypted. If not, it could be time for your company to consider changing its chat platform.

Also, create complex passwords that are more difficult to decode. For added security, remember to never include sensitive information in an email or a chatting.

3. Targeting customer loyalty accounts

Frequent shoppers have had their data targeted in schemes pinned to customers’ loyalty accounts. For example, one retailer saw an attempt to gain unauthorized access to reward accounts containing user information.

Advice: Use complex passwords and update your passwords regularly. Monitor your credit card purchases for suspicious charges and be mindful of where you keep your rewards cards. Also, provide only the minimal amount of information required when opening customer loyalty accounts, rather than providing every piece of information that is asked for.

4. Stealing frequent flyer miles

Fraudsters sometimes have hacked into frequent-flyer accounts and even used victims’ miles to book free flights and request upgrades.

Advice: Monitor your accounts regularly, use complex passwords and update your passwords frequently.

5. Targeting your tax refund

Thieves can commit tax refund fraud in a variety of ways, but here are two of the most common methods:

  • Using a victim's Social Security number to file a fraudulent return.
  • Stealing tax refund checks out of the mail.

Advice: File your taxes as soon as possible and choose to have your refund directly deposited into your bank account. Also, be sure to use secure networks if filing electronically and consider using an identity protection PIN, a preventative measure intended to combat identity theft, for added protection. An identity protection PIN is a six-digit number assigned to eligible taxpayers that helps prevent the misuse of Social Security numbers on fraudulent federal income tax refunds.

Get LifeLock Identity Theft Protection 30 DAYS FREE*

There's a victim of identity theft every 3 seconds.° LifeLock makes identity theft protection easy. Start your protection now.

It only takes minutes to enroll.

Editor’s note: Our articles provide educational information. LifeLock offerings may not cover or protect against every type of crime, fraud, or threat we write about.

This article contains

    What Is the Dark Web and Other Deep Web Terms
    Check out this expansive glossary of terms to gain a better understanding of how the dark web works.
    Read More
    Warning Signs That You're a Victim of Tax Refund Identity Theft
    The IRS says that if you receive one of these notices, it could be the first sign that you're a victim of tax refund identity theft.
    Read More
    Steps to Help You Recover from 5 Kinds of Identity Theft
    If you are a victim of identity theft, you need to take action—and quickly. Learn some of the steps to consider as you take on the task of restoring your identity.
    Read More
    Seniors: Victims of Identity Theft
    Stay informed about the latest identity theft news and stories about what law enforcement and elected officials are doing to protect consumers from becoming victims.
    Read More

    Start your protection,
    enroll in minutes.

    Get discounts, info, protection tips, and more.

    Sign up for promotional emails.