• ​Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information, such as Social Security or driver's license numbers, in order to impersonate someone else.

  • ​A keylogger or keystroke logger is a type of software that tracks or logs the keys struck on your keyboard, typically in a covert manner so that you don't know that your actions are being monitored.

  • In the United States, mail and wire fraud include any  scheme to intentionally defraud a person using United States Postal Service by through the mail or by telephone call or electronic communication​​.

  • A password manager application supports centralized secure storage of passwords and helps manage using unique passwords across each site.​

  • The fraudulent practice of sending emails purporting to be from reputable companies in order to get individuals to reveal personal information, such as passwords and credit card numbers.​

  • A type of malicious software designed to block access to a computer system until a sum of money is paid.​

  • Spying on the user of an ATM, computer, or other electronic device in order to obtain their personal access information.​

  • The use of deception to manipulate someone into giving away confidential or personal information that may be used for fraud.​

  • Spyware is software that enables a user to obtain covert information about another's computer activities by transmitting data.​

  • Making phone calls or leaving voice messages supposedly from reputable companies in order to get people to reveal their personal information, such as bank details and credit card numbers.​

  • A VPN creates a virtual encrypted tunnel between you and a remote server operated by a VPN service. All external internet traffic is routed through this tunnel, so your data is secure from prying eyes. Use of a VPN computer also gives you the appearance of having an IP address of the VPN server, masking your identity.​

​​​Disclaimer

The content on this page is provided for informational purposes and is not intended to provide authoritative information security, data protection, or other professional or legal advice. Links to third party web sites and content do not constitute an endorsement or sponsorship by Computershare and Computershare does not represent or warrant that the contents of those web sites are accurate, compliant with any applicable law, or compliant with copyright or other intellectual property laws. Any reliance on the contents of a third party web site is at your own risk and you assume all responsibilities and consequences resulting from such reliance.