Social media: two words that have become synonymous with how we connect ourselves to our fellow humans in the 21st century.

Relationships can be formed and broken all inside a virtual world. We post pictures of our children, food, likes and dislikes for the world to see. While this technical revolution of the past decade can be viewed as exciting and innovative, it also leaves us vulnerable, particularly to identity theft.

What Is Identity Theft?

According to the FBI’s Internet Crime Complaint Center (IC3), identity theft “occurs when someone appropriates another’s personal information without their knowledge to commit theft or fraud.”

The Federal Trade Commission (FTC) reported that debt collection, identity theft and impostor scams were the most common categories of consumer complaints received by the agency’s Consumer Sentinel Network in 2015. Identity theft complaints were the second most reported, increasing more than 47 percent from 2014, in part due to tax identity theft. Per the FTC, impostor scams — in which criminals impersonate someone else to commit fraud — remained the third most common complaint in 2015.

A Tale as Old as Time

Identity theft is not new. It is a tale as old as time, from biblical stories of one brother posing as another to receive their dying father’s inheritance to fraudsters who pose as someone else to gain trust and disclose personally identifiable information.

In the fall of 1998, Congress passed the Identity Theft and Assumption Deterrence Act. This legislation created a new offense for identity theft, which prohibits “transfers or uses, without lawful authority, [of] a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of federal law or that constitutes a felony under any applicable state or local law.”

The Identity Theft Resource Center, a San Diego-based nonprofit organization founded to provide victim assistance and consumer education, reported that the use of some social media sites can leave you vulnerable to identity theft if not used properly.

What Is Social Media?

Social media sites function on the personal information users provide. This can expose the consumer to fraud and abuse. If your mobile banking app is on your phone, for instance, cybercriminals can access your online banking information through an app that is unrelated to your online banking.

What you post online for friends, family and the internet to see can also leave you vulnerable. For instance, when you post that you are going on vacation, you alert potential burglars that you are away.

Accepting “connections” or “friendships” with people you are not somehow familiar with in your everyday life can put you at risk. Cybercriminals can guess your passwords simply by the items you post online, such as your pets’ names, children’s names or details regarding your former schools or current city.

A Playground for Cybercriminals

The unregulated nature of social media platforms provides cybercriminals and fraudsters a veritable playground of criminal activity to choose from.

If you accept an invitation from unfamiliar people and they send you an email with a link in the text, this may be an attempt to place malicious malware on your computer. This would allow attackers to extract your personal information, particularly online banking information.

Not only can fraudsters take over bank accounts via online messaging, but consumers should be wary of impostors creating fake accounts in their name and posting messages under their ID. Celebrities are especially vulnerable to this trend.

Back in 2011, for example, former governor of Alaska Sarah Palin’s official Twitter account was breached and exposed to fraud. In one incident, a fraudster tweeted an open invite to Palin’s family home for a barbecue. Palin’s security staff had to be dispatched to her Alaska residence. Many public figures have fallen victim to this method of identity theft.

Protect Your Identity

Below are some tips to protect your identity in the age of social media:

  • Create strong, multicharacter passwords for your email and all apps on your phone, and remember to change them often.
  • When utilizing apps, enter as little personal information as possible.
  • Be cautious about what you post online. Never use personal information such as your Social Security number, current address or telephone number.
  • Make sure your privacy settings are set to the highest level. Check these settings often since they may be affected by upgrades.
  • Avoid downloading free applications for use on your social media profiles.
  • Avoid accepting connections or friendships with people you are not familiar with.
  • Verify any link sent to you was sent from your connection or friend.
  • Google your own name, as well as any social media handles you utilize, to track any possible forged accounts.

More from Fraud Protection

Virtual credit card fraud: An old scam reinvented

3 min read - In today's rapidly evolving financial landscape, as banks continue to broaden their range of services and embrace innovative technologies, they find themselves at the forefront of a dual-edged sword. While these advancements promise greater convenience and accessibility for customers, they also inadvertently expose the financial industry to an ever-shifting spectrum of emerging fraud trends. This delicate balance between new offerings and security controls is a key part of the modern banking challenges. In this blog, we explore such an example.…

Remote access detection in 2023: Unmasking invisible fraud

3 min read - In the ever-evolving fraud landscape, fraudsters have shifted their tactics from using third-party devices to on-device fraud. Now, users face the rising threat of fraud involving remote access tools (RATs), while banks and fraud detection vendors struggle with new challenges in detecting this invisible threat. Let’s examine the modus operandi of fraudsters, prevalence rates across different regions, classic detection methods and Trusteer’s innovative approach to RAT detection through behavioral analysis. A rising threat As Fraud detection methods become more and…

Gozi strikes again, targeting banks, cryptocurrency and more

3 min read - In the world of cybercrime, malware plays a prominent role. One such malware, Gozi, emerged in 2006 as Gozi CRM, also known as CRM or Papras. Initially offered as a crime-as-a-service (CaaS) platform called 76Service, Gozi quickly gained notoriety for its advanced capabilities. Over time, Gozi underwent a significant transformation and became associated with other malware strains, such as Ursnif (Snifula) and Vawtrak/Neverquest. Now, in a recent campaign, Gozi has set its sights on banks, financial services and cryptocurrency platforms,…

The rise of malicious Chrome extensions targeting Latin America

9 min read - This post was made possible through the research contributions provided by Amir Gendler and Michael  Gal. In its latest research, IBM Security Lab has observed a noticeable increase in campaigns related to malicious Chrome extensions, targeting  Latin America with a focus on financial institutions, booking sites, and instant messaging. This trend is particularly concerning considering Chrome is one of the most widely used web browsers globally, with a market share of over 80% using the Chromium engine. As such, malicious…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today