There are a multitude of techniques to "steal" the personal information without the knowledge of the victim or abusing his good faith or naivety ... Who would have ever thought? Identity thieves sometimes rummage in our waste! ...
To get the data, sometimes the criminals steal your wallet or correspondence from the letter boxes (utility bills, bank statements, insurance documents and social security, tax assessments etc.); sometimes rummage in the trash; others get the data directly from us, registration, maybe attracting us with some free service or gadgets; other times, finally, tracking us through social networks or false work offers (on the CV there is a lot of personal information).
Among the most common techniques used for fraudulent theft of data, there is phishing, often implemented by e-mails that appear to be coming apparently from your bank or credit card company and invite you to click on a link that leads to clone a page of the institution in question, which then will be prompted to type information on some pretext. Other times the phishing email communicates supposed winnings and other circumstances, in relation to which our data would be needed to enable some supposed gain or other.
Our data can also be stolen by interception (when transferring online data, if it occurs in a non-protected encryption or if your computer or other device used is infected with malware) or intrusion (hacking) in databases that legally hold our data, for example, because they provide a service, but this requires skills and quite sophisticated equipment.
Part of the vulnerability is inherent in the adoption of technologies that will open up wide possibilities of communication and sharing (think about What’s App) and which are sometimes using in a too casual way. No tools are good or bad, but just the way we use them can be wise or imprudent. The Smartphone is now already a computer, which allows us to surf the Internet, download software and send / receive messages of all types (SMS, MMS, email, IM), to chat and more. Among these useful and pleasant activities, identity thieves can creep through malware and various forms of deception stealing user data. Very little is needed to open the door to the malicious: it is known that the operating system for tablets, smart phones, game consoles and televisions is more susceptible and vulnerable to intrusion than the one installed on computers. It may be only a single online access via smartphone (on which perhaps we download cheerfully dozens of more or less reliable APP sites) to the bank account, to "give away" our credentials to identity thieves..
Soon the smart phone will also be a very common payment instrument, like a credit card: in this, revolutionary and potentiality new security risks are naturally inherent.