*
Image: guy looking out a window with suspicion, wondering just how hackers are going to usage his steal information
In a Nutshell

Hackers are getting more an innovative with exactly how they usage your information. From using for credit cards in your name come stealing wellness insurance, the influence of identification theft has reached brand-new heights.

You are watching: How can someone steal my identity


Editorial Note: credit transaction Karma obtain compensation indigenous third-party advertisers, but that doesn’t impact our editors’ opinions. Our marketing partners don’t review, grant or endorse our editorial content. It’s precise to the best of our understanding when posted.

We think it"s important for you to understand how we do money. It"s nice simple, actually. The uses for financial products you watch on our communication come from providers who pay us. The money we make help us give you accessibility to cost-free credit scores and reports and helps us create our other an excellent tools and educational materials.

Compensation may element into how and where products appear on our platform (and in what order). But because we normally make money as soon as you find an offer you like and also get, we try to present you offers we think are a good match because that you. That"s why we carry out features like your Approval Odds and also savings estimates.

Of course, the provides on our platform don"t stand for all financial products out there, but our goal is to show you together many an excellent options together we can.


Whenever you hear news around a data breach, you may wonder precisely what hackers have the right to do v your information. Together it turns out, quite a lot.

Unfortunately, hackers work fast, too. According to may 2017research through the Federal trade Commission, it took only nine minutes prior to the hackers make the efforts to access the info from a fake data breach.

If you’ve recently found out your data to be compromised, climate you should know the miscellaneous ways identification thieves can use your information. This knowledge have the right to prepare you for controlling the effects of identity theft as soon as that happens.

What is identity theft?

Identity theft is the process of thefts your an individual information — choose your name, address, Social security number and also email resolve — and also using that without her consent. Identification theft can occur to anyone, and also the impacts can be more than simply an inconvenience.

Hackers may attain your details in a data breach. But they may additionally be may be to gain your info if you get in it ~ above a public computer system or walk to an unsecured website — and also these are simply some instances of exactly how hackers deserve to steal your information.

They deserve to then usage your an individual information in a range of methods for their own gain and also at your expense.

Stay on height of your details with credit transaction Karma identification monitoringLearn More

Here are 5 ways hackers deserve to take benefit of you and also your information.

1. Your info could be supplied to open credit cards or take out loans

If hackers have actually your Social defense number, name, birthdate and address, they have the right to open credit transaction cards or use for loans in your name.

“Hackers obtaining an individual information, consisting of Social defense numbers, can enable someone come pose as their victim and get credit or take the end loans that they never ever pay back,” states Steven J.J. Weisman, a lawyer and also author of “Identity Theft Alert: 10 rules You must Follow to safeguard Yourself indigenous America’s #1 Crime“.

2. Hackers can intercept your tax refund

If you’re like most people, you’re excited to gain your taxation refund. Yet sadly, hackers deserve to intercept your taxes refund by submit a fake taxes return, making use of your Social protection number, birthdate and also name.

Consumers who wait till the critical minute to document may be much more vulnerable. You’d likely only find out once you document your tax return and also it it s okay rejected.

To aid prevent this, the IRS proposal the following precautions:

Learn come recognize and avoid phishing emails, threaten calls and also texts native thieves posing together legitimate establishments such together your bank, credit transaction card companies and even the IRS.Don’t click on links or download attachments indigenous unknown or suspicious emails.Protect your an individual data. Nothing routinely bring your Social protection card, and also make certain your tax documents are secure.Stay on height of your information with credit Karma identification monitoringLearn More

3. Your info can be offered to cover clinical treatment

People that steal your details aren’t just using it come buy lavish items. Lock can likewise use it to receive clinical treatment by utilizing your Social defense number and also health insurance allowance account numbers.

“In many cases, (identity thieves) use your exact same address, phone number… everything. Your goal is to gain treatment and/or medications, and also then they are gone, leaving very little time for them to be uncovered out,” states Justin Lavelle, chief interactions officer in ~ background checking business BeenVerified.com.

In fact, follow to study from Michigan State University, there were virtually 1,800 incidents of clinical data breaches through patients’ information from October 2009 come December 2016.

Hackers can receive treatments, prescriptions and more by utilizing your benefits. In enhancement to increased prices for you, this can also put your own health at risk as the thief’s medical details will now be mixed up through yours.

Be sure to thoroughly evaluation your medical bills and insurance statements together these may present signs of identity theft. Girlfriend can examine if the insurance claim description matches the care you received.

If you check out a discrepancy, speak to your health provider come report it.

Also make a habit of frequently checking your credit transaction reports to inspect for delinquent (unpaid) medical bills top top your credit transaction reports.

4. Hackers can take flight with her airline miles

Using her email and passwords, hackers have the right to get accessibility to her airline mile to publication trips or even redeem because that cash.

“Airline miles can be converted to cash as quickly as going come websites that buy miles,” Lavelle says.

To assist prevent this, usage a various password 보다 the one you have actually on other accounts, and also keep track of your mile task regularly.

5. Your info can be provided to open utility accounts

According come the Federal profession Commission (FTC), 13% the fraud occurrences in 2016 developed with phone and also utility accounts.

In these cases, hackers may have actually opened an account through an electric, gas or cellphone agency by using a steal Social defense number. They then have the right to run increase tabs ~ above the account, i m sorry is under your name, there is no you knowing.

There’s an additional scam to be aware of together well. Identification thieves can speak to you and also pretend to be the energy company, threaten to rotate off your power if friend don’t pay up. However, this fraudsters are simply trying to steal your money.

If your utility firm is questioning you to pay up, make certain you’re talking to the real deal and verify your repayment status.

You have the right to do this by checking the energy company’s call number and also checking your online account come verify your status.

How deserve to you prevent identity theft?

While girlfriend can’t avoid a large data breach or ever completely protect yourself versus identity theft, there space some measures you have the right to take to do yourself less vulnerable. Below are some fast tips:

Make sure you have a solid password that has actually many personalities (including a mix the lower- and upper-case letters, numbers and also symbols) and has no personally identifiable information or thesaurus words.When you’re online, make certain the sites you visit room secure. The URL will usually have a lock in the left-hand corner and start v “https”.Enable two-factor authentication, so you’ll need to get in a password from her phone to access your accounts.

Credit Karma has additionally created another way to assist you detect identification theft.

With the ID security feature, you have the right to use your email resolve to search for any kind of accounts that space in any kind of public data breaches. If her information has been exposed in a breach, we’ll allow you know some tips and also tools to aid you take it the right next steps.

Stay on optimal of your details with credit Karma identity monitoringLearn More

We’ll also continue to screen your credit transaction for free.

What’s next

There’s no shortage of methods hackers deserve to use her information, and also they seem to be acquiring ever an ext creative.

If you’re a victim of identification theft, you deserve to follow the steps detailed by the FTC to help you get through it. You can additionally submit a complaint v the FTC.

See more: How Did Mary Tyler Moore’S Son Die, Actress' Son Dies

Of course, there space no foolproof methods to preventing identity theft. Yet taking precautions and also catching indicators of identification theft as at an early stage as feasible can aid immensely.