{"id":121,"date":"2020-11-23T07:00:00","date_gmt":"2020-11-23T07:00:00","guid":{"rendered":"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/"},"modified":"2025-03-13T01:59:15","modified_gmt":"2025-03-13T01:59:15","slug":"10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it","status":"publish","type":"post","link":"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/","title":{"rendered":"10 Ways Hackers Can Steal Your Personal Identity and How to Prevent It"},"content":{"rendered":"<p style=\"text-align: justify;\">Consumers are often asked to share valuable personal data in order to receive goods and services, and these exchanges increasingly occur online. This puts them at increased risk for online identity theft\u2014a threat that is only growing across global economies. But even classic, \u201coffline\u201d versions of identity theft remain a prevalent issue.<\/p>\n<p><!--more--><\/p>\n<p style=\"text-align: justify;\">According to the US government, \u201c<a href=\"https:\/\/www.usa.gov\/identity-theft\"><strong>Identity (ID) theft happens when someone steals your personal information to commit fraud.<\/strong><\/a>\u201d ID fraud itself can take several forms\u2014use of credit card information to acquire products and services, for example, or even to receive medical treatment. These opportunities make anyone\u2019s identity valuable to criminals; Stealing someone\u2019s identity becomes a \u201cfree ticket\u201d for any number of fraudulent activities.<\/p>\n<p style=\"text-align: justify;\">Fraudsters can use multiple types of personal identification for nefarious purposes. Passports, driver\u2019s licenses, passwords, and of course credit cards or bank account information can all be exploited for criminal behavior, putting individual consumers at risk. No matter who you are, your personal information has value to criminals.<\/p>\n<p style=\"text-align: justify;\">ID theft and fraud are growing at frightening rates as well. A June 2020 analysis found an&nbsp;<a href=\"https:\/\/www.cifas.org.uk\/newsroom\/identity-fraud-up-one-third\"><strong>18% increase in instances of identity fraud in the UK in 2019<\/strong><\/a>&nbsp;when compared to the previous year.<\/p>\n<p style=\"text-align: justify;\">It\u2019s up to each of us to learn what are the most common types of identity fraud, for we as individuals are most often the last line of defense. In fact, several forms of ID theft depend on voluntary behaviors on the part of the victim. Here we take a closer look at what methods criminals use to hack into people\u2019s data in order to steal their IDs.<\/p>\n<p style=\"text-align: justify;\">The Israeli company&nbsp;<a href=\"https:\/\/www.naturalint.com\/people-and-culture\/\">Natural Intelligence<\/a>, which created detailed &#8220;best of&#8221; and &#8220;<a href=\"https:\/\/www.top10.com\/\">top 10<\/a>&#8221; lists built a detailed list of the 10 most common methods hackers and crooks use to steal identities, and what you can do to prevent it from happening to you:<\/p>\n<p style=\"text-align: justify;\">Just as the ways we use our personal information to acquire goods and services have evolved, so have criminals\u2019 methods for exploiting them. Here we review ten of the most common types of ID theft, starting with four types of \u2018\u201d<a href=\"https:\/\/www.top10.com\/id-theft\/protect-yourself-from-phishing-cyber-attacks\"><strong>phishing<\/strong><\/a>\u201d schemes: pharming, vishing, search engine phishing, and SMiShing.<\/p>\n<p><strong>Pharming<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>Hackers method:<\/strong>&nbsp;Pharming is a method of ID theft that uses falsified websites to capture personal information. Hackers will lead you to believe that websites serve a recognizable and legitimate capacity\u2014a website made to look like an official government website, for example\u2014to trick you into sharing their personal information.<\/p>\n<p style=\"text-align: justify;\"><strong>Hack to avoid it:<\/strong>&nbsp;You should check the legitimacy of any website before sharing consumer information. A simple Google search will often tell you if a website is fake. Certain \u201cgiveaways\u201d like misspellings, incorrect logos, strange URLs, and suspicious requests on the website can suggest something is wrong as well.<\/p>\n<p><strong>Vishing<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>Hackers method:<\/strong>&nbsp;Vishing, or \u201cvoice fishing,\u201d is conducted via phone calls. Thieves often automate phone calls that trick consumers into thinking there is an urgent need for them to share personal information over the phone. The crooks may impersonate government agencies or financial institutions, for example, then request personal information like social security numbers or bank account information.<\/p>\n<p style=\"text-align: justify;\"><strong>Hack to avoid it:<\/strong>&nbsp;Avoid providing personal information over the phone in any context. Only do so if the phone call has been facilitated by legitimate means. This most often means you instigated the call yourself with a trustworthy entity.<\/p>\n<p><strong>SMiShing<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>Hackers method:<\/strong>&nbsp;This name is based on the abbreviation \u201cSMS\u201d for \u201cShort Message Service,\u201d the common functionality behind everyday text messages. SMiShing is when criminals send text messages encouraging consumers to share personal information. Bad actors often pose as legitimate institutions, and can be difficult to trace.<\/p>\n<p style=\"text-align: justify;\"><strong>Hack to avoid it:<\/strong>&nbsp;You should never under any circumstances share personal information via SMS. Most legitimate companies will rarely ask for personal information using SMS\u2014More often they provide information this way upon consumer requests, such as confirmation codes when logging into a legitimate account.&nbsp;<\/p>\n<p><strong>Search Engine Phishing<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>Hackers method:<\/strong>&nbsp;Search Engine Phishing resembles pharming since it involves the fraudulent use of websites. In this case, the websites do not impersonate legitimate ones; they are designed to make offers consumers \u201ccan\u2019t refuse,\u201d such as unrealistically affordable goods or services.<\/p>\n<p style=\"text-align: justify;\"><strong>Hack to avoid it:<\/strong>&nbsp;If you encounter a deal that seems \u201ctoo good to be true\u201d and don\u2019t recognize the retailer, it is likely a phishing attempt. Running a Google search like \u201cIs [website] legitimate?\u201d and reading several of the results is a good rule of thumb to identify these websites for what they are.<\/p>\n<p><strong>Man-in-the-Middle Attack<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>Hackers method:<\/strong>&nbsp;Man-in-the-middle attacks also involve fraudulent websites, but they are even more nefarious. These attacks actually reroute consumers looking to visit legitimate websites to identical, illegitimate ones.<\/p>\n<p style=\"text-align: justify;\"><strong>Hack to avoid it:<\/strong>&nbsp;The simplest solution to this problem is checking the URL in your browser. Bad actors will create websites with similar URLs to mislead you. For example, if your bank is at www.mybank.com, the criminal may use mybank.co as the URL. Your browser\u2019s functions, such as its history or auto-populating functions, should give you some indication as to whether or not you are on the correct website as well.<\/p>\n<p><strong>Dumpster Diving and Theft of Personal Objects<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>Hackers method:<\/strong>&nbsp;Theft of personal objects like driver\u2019s licenses, social security cards, and even garbage with personal information are still common risks.&nbsp;<\/p>\n<p style=\"text-align: justify;\"><strong>Hack to avoid it:<\/strong>&nbsp;Avoid these crude forms of identity theft by securing valuable documents and shredding those you wish to throw away. You can cut up credit cards with scissors before discarding, for example, and keep social security cards in a secure location at home.<\/p>\n<p><strong>Credit or Debit Card Theft<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>Hackers method:<\/strong>&nbsp;Although credit and debit cards are also \u201cpersonal objects,\u201d their information is often stolen online or via photography, as well as in person. Many of the methods described above are means for capturing credit or debit card information, but thieves can steal physical cards or photograph their numbers in public places as well.<\/p>\n<p style=\"text-align: justify;\"><strong>Hack to avoid it:<\/strong>&nbsp;Fortunately, in addition to keeping this information secure, you can count on modern banks to take action and even return funds lost to credit or debit card theft. They can quickly change your account information rendering the stolen data useless as well. Be cautious, though, as thieves may steal personal information in addition to credit or debit card information when theft occurs.<\/p>\n<p><strong>Skimming<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>Hackers method:<\/strong>&nbsp;Skimming is another means of capturing credit card information, though with greater technological sophistication. Skimming takes place when a card-reading machine transmits credit card information via nefarious means. Thieves may manipulate card-reading machines of otherwise legitimate merchants to do this.<\/p>\n<p style=\"text-align: justify;\"><strong>Hack to avoid it:<\/strong>&nbsp;One easy way to protect against skimming is to ensure the merchants you visit in person are trustworthy. But you can also protect yourself by simply reviewing your transaction history and credit reports. Your bank will often flag suspicious activity which occurs when this information is stolen as well.<\/p>\n<p><strong>Pretexting<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>Hackers method:<\/strong>&nbsp;Pretexting is a more involved form of ID theft, where criminals do research on individuals ahead of time to identify vulnerabilities. If you have a sick relative in the hospital, for example, a thief might claim to be a hospital representative calling on behalf of that family member and ask for personal information.<\/p>\n<p style=\"text-align: justify;\"><strong>Hack to avoid it:<\/strong>&nbsp;Pretexting can throw you off because of the thieves\u2019 apparent \u201cinside knowledge,\u201d but these thieves will most often use one of the methods above to make their attempt. Avoid sharing personal information over the phone, via the mail, via SMS, and online unless you are certain about the recipients.<\/p>\n<p><strong>Social Engineering&nbsp;<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>Hackers method:<\/strong>&nbsp;Social engineering, also known as \u201ca con,\u201d is a much more involved identity theft method often requiring several layers of deception to steal personal information. Social engineering often involves pretexting and one of methods for identity theft; they often involve more than one bad actor as well.<\/p>\n<p style=\"text-align: justify;\"><strong>Hack to avoid it:<\/strong>&nbsp;It can be especially difficult to identify a con. Simply keep in mind the context in which you shouldn\u2019t provide personal information\u2014unwarranted phone calls, individuals approaching you whom you do not know, or websites you cannot confirm are legitimate are examples. Cons require a lot of work and often require a big \u201cpayoff\u201d as a result. If you have anything of particularly high value that comes into focus, you might be a victim.<\/p>\n<p style=\"text-align: left;\"><a href=\"https:\/\/www.top10.com\/\" style=\"font-style: italic;\">Top10.com<\/a><span style=\"font-style: italic;\"> offers hundreds of Top10 shortlists to help consumers make informed decisions and easily compare their purchasing options online. Trusted by millions, the team shortlists are enriched with editorial reviews and deep-dive, informational articles\u2014all with the goal of turning online purchasing decision into a breeze.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Consumers are often asked to share valuable personal data in order to receive goods and services, and these exchanges increasingly occur online. This puts them at increased risk for online identity theft\u2014a threat that is only growing across global economies. But even classic, \u201coffline\u201d versions of identity theft remain a prevalent issue.<\/p>\n","protected":false},"author":15353,"featured_media":4822,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3255],"tags":[],"coauthors":[],"class_list":["post-121","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-archive"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.4 (Yoast SEO v26.8) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>10 Ways Hackers Can Steal Your Personal Identity and How to Prevent It<\/title>\n<meta name=\"description\" content=\"Top 10 Ways Hackers Can Steal Your Personal Identity and How to Prevent Them from Doing So\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 Ways Hackers Can Steal Your Personal Identity and How to Prevent It\" \/>\n<meta property=\"og:description\" content=\"Top 10 Ways Hackers Can Steal Your Personal Identity and How to Prevent Them from Doing So\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/\" \/>\n<meta property=\"og:site_name\" content=\"RealTrends - Blog\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.realtrends.com\/blog\/wp-content\/uploads\/sites\/9\/2025\/03\/9ced5ef4-69ab-4ba7-a7cd-ec49be7b274d.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Brent Driggers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brent Driggers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/\"},\"author\":{\"name\":\"Brent Driggers\",\"@id\":\"https:\/\/www.realtrends.com\/blog\/#\/schema\/person\/2bfe46783a3a1e6ed5d7cf6d48b05a1a\"},\"headline\":\"10 Ways Hackers Can Steal Your Personal Identity and How to Prevent It\",\"datePublished\":\"2020-11-23T07:00:00+00:00\",\"dateModified\":\"2025-03-13T01:59:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/\"},\"wordCount\":1484,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.realtrends.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.realtrends.com\/blog\/wp-content\/uploads\/sites\/9\/2025\/03\/9ced5ef4-69ab-4ba7-a7cd-ec49be7b274d.png\",\"articleSection\":[\"Archive\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/#respond\"]}],\"isAccessibleForFree\":\"False\",\"hasPart\":{\"@type\":\"WebPageElement\",\"isAccessibleForFree\":\"False\",\"cssSelector\":\".wp-block-housingwire-piano-member\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/\",\"url\":\"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/\",\"name\":\"10 Ways Hackers Can Steal Your Personal Identity and How to Prevent It\",\"isPartOf\":{\"@id\":\"https:\/\/www.realtrends.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.realtrends.com\/blog\/wp-content\/uploads\/sites\/9\/2025\/03\/9ced5ef4-69ab-4ba7-a7cd-ec49be7b274d.png\",\"datePublished\":\"2020-11-23T07:00:00+00:00\",\"dateModified\":\"2025-03-13T01:59:15+00:00\",\"description\":\"Top 10 Ways Hackers Can Steal Your Personal Identity and How to Prevent Them from Doing So\",\"breadcrumb\":{\"@id\":\"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/#primaryimage\",\"url\":\"https:\/\/www.realtrends.com\/blog\/wp-content\/uploads\/sites\/9\/2025\/03\/9ced5ef4-69ab-4ba7-a7cd-ec49be7b274d.png\",\"contentUrl\":\"https:\/\/www.realtrends.com\/blog\/wp-content\/uploads\/sites\/9\/2025\/03\/9ced5ef4-69ab-4ba7-a7cd-ec49be7b274d.png\",\"width\":1200,\"height\":675,\"caption\":\"9ced5ef4-69ab-4ba7-a7cd-ec49be7b274d\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.realtrends.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 Ways Hackers Can Steal Your Personal Identity and How to Prevent It\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.realtrends.com\/blog\/#website\",\"url\":\"https:\/\/www.realtrends.com\/blog\/\",\"name\":\"RealTrends - Blog\",\"description\":\"Empowering Real Estate Decisions with Trusted Insights.\",\"publisher\":{\"@id\":\"https:\/\/www.realtrends.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.realtrends.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.realtrends.com\/blog\/#organization\",\"name\":\"RealTrends - Blog\",\"url\":\"https:\/\/www.realtrends.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.realtrends.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.realtrends.com\/blog\/wp-content\/uploads\/sites\/9\/2025\/03\/cropped-RTV_Horizontal_logo_Blue.png\",\"contentUrl\":\"https:\/\/www.realtrends.com\/blog\/wp-content\/uploads\/sites\/9\/2025\/03\/cropped-RTV_Horizontal_logo_Blue.png\",\"width\":2321,\"height\":227,\"caption\":\"RealTrends - Blog\"},\"image\":{\"@id\":\"https:\/\/www.realtrends.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.realtrends.com\/blog\/#\/schema\/person\/2bfe46783a3a1e6ed5d7cf6d48b05a1a\",\"name\":\"Brent Driggers\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.realtrends.com\/blog\/#\/schema\/person\/image\/326446125cfe5e8f2944f9ce9cceae31\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0df23545df0aaa68e693cffdf43800899d9005ea10bae9536946da57e5d3eb25?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0df23545df0aaa68e693cffdf43800899d9005ea10bae9536946da57e5d3eb25?s=96&d=mm&r=g\",\"caption\":\"Brent Driggers\"},\"description\":\"Brent Driggers is Web Director of HW Media.\",\"url\":\"https:\/\/www.realtrends.com\/blog\/author\/bdriggers\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"10 Ways Hackers Can Steal Your Personal Identity and How to Prevent It","description":"Top 10 Ways Hackers Can Steal Your Personal Identity and How to Prevent Them from Doing So","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/","og_locale":"en_US","og_type":"article","og_title":"10 Ways Hackers Can Steal Your Personal Identity and How to Prevent It","og_description":"Top 10 Ways Hackers Can Steal Your Personal Identity and How to Prevent Them from Doing So","og_url":"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/","og_site_name":"RealTrends - Blog","og_image":[{"width":1200,"height":675,"url":"https:\/\/www.realtrends.com\/blog\/wp-content\/uploads\/sites\/9\/2025\/03\/9ced5ef4-69ab-4ba7-a7cd-ec49be7b274d.png","type":"image\/png"}],"author":"Brent Driggers","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Brent Driggers","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/#article","isPartOf":{"@id":"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/"},"author":{"name":"Brent Driggers","@id":"https:\/\/www.realtrends.com\/blog\/#\/schema\/person\/2bfe46783a3a1e6ed5d7cf6d48b05a1a"},"headline":"10 Ways Hackers Can Steal Your Personal Identity and How to Prevent It","datePublished":"2020-11-23T07:00:00+00:00","dateModified":"2025-03-13T01:59:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/"},"wordCount":1484,"commentCount":0,"publisher":{"@id":"https:\/\/www.realtrends.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realtrends.com\/blog\/wp-content\/uploads\/sites\/9\/2025\/03\/9ced5ef4-69ab-4ba7-a7cd-ec49be7b274d.png","articleSection":["Archive"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/#respond"]}],"isAccessibleForFree":"False","hasPart":{"@type":"WebPageElement","isAccessibleForFree":"False","cssSelector":".wp-block-housingwire-piano-member"}},{"@type":"WebPage","@id":"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/","url":"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/","name":"10 Ways Hackers Can Steal Your Personal Identity and How to Prevent It","isPartOf":{"@id":"https:\/\/www.realtrends.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/#primaryimage"},"image":{"@id":"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.realtrends.com\/blog\/wp-content\/uploads\/sites\/9\/2025\/03\/9ced5ef4-69ab-4ba7-a7cd-ec49be7b274d.png","datePublished":"2020-11-23T07:00:00+00:00","dateModified":"2025-03-13T01:59:15+00:00","description":"Top 10 Ways Hackers Can Steal Your Personal Identity and How to Prevent Them from Doing So","breadcrumb":{"@id":"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/#primaryimage","url":"https:\/\/www.realtrends.com\/blog\/wp-content\/uploads\/sites\/9\/2025\/03\/9ced5ef4-69ab-4ba7-a7cd-ec49be7b274d.png","contentUrl":"https:\/\/www.realtrends.com\/blog\/wp-content\/uploads\/sites\/9\/2025\/03\/9ced5ef4-69ab-4ba7-a7cd-ec49be7b274d.png","width":1200,"height":675,"caption":"9ced5ef4-69ab-4ba7-a7cd-ec49be7b274d"},{"@type":"BreadcrumbList","@id":"https:\/\/www.realtrends.com\/blog\/2020\/11\/23\/10-ways-hackers-can-steal-your-personal-identity-and-how-to-prevent-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.realtrends.com\/blog\/"},{"@type":"ListItem","position":2,"name":"10 Ways Hackers Can Steal Your Personal Identity and How to Prevent It"}]},{"@type":"WebSite","@id":"https:\/\/www.realtrends.com\/blog\/#website","url":"https:\/\/www.realtrends.com\/blog\/","name":"RealTrends - Blog","description":"Empowering Real Estate Decisions with Trusted Insights.","publisher":{"@id":"https:\/\/www.realtrends.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.realtrends.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.realtrends.com\/blog\/#organization","name":"RealTrends - Blog","url":"https:\/\/www.realtrends.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realtrends.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.realtrends.com\/blog\/wp-content\/uploads\/sites\/9\/2025\/03\/cropped-RTV_Horizontal_logo_Blue.png","contentUrl":"https:\/\/www.realtrends.com\/blog\/wp-content\/uploads\/sites\/9\/2025\/03\/cropped-RTV_Horizontal_logo_Blue.png","width":2321,"height":227,"caption":"RealTrends - Blog"},"image":{"@id":"https:\/\/www.realtrends.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.realtrends.com\/blog\/#\/schema\/person\/2bfe46783a3a1e6ed5d7cf6d48b05a1a","name":"Brent Driggers","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.realtrends.com\/blog\/#\/schema\/person\/image\/326446125cfe5e8f2944f9ce9cceae31","url":"https:\/\/secure.gravatar.com\/avatar\/0df23545df0aaa68e693cffdf43800899d9005ea10bae9536946da57e5d3eb25?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0df23545df0aaa68e693cffdf43800899d9005ea10bae9536946da57e5d3eb25?s=96&d=mm&r=g","caption":"Brent Driggers"},"description":"Brent Driggers is Web Director of HW Media.","url":"https:\/\/www.realtrends.com\/blog\/author\/bdriggers\/"}]}},"jetpack_featured_media_url":"https:\/\/www.realtrends.com\/blog\/wp-content\/uploads\/sites\/9\/2025\/03\/9ced5ef4-69ab-4ba7-a7cd-ec49be7b274d.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.realtrends.com\/blog\/wp-json\/wp\/v2\/posts\/121","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.realtrends.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.realtrends.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.realtrends.com\/blog\/wp-json\/wp\/v2\/users\/15353"}],"replies":[{"embeddable":true,"href":"https:\/\/www.realtrends.com\/blog\/wp-json\/wp\/v2\/comments?post=121"}],"version-history":[{"count":1,"href":"https:\/\/www.realtrends.com\/blog\/wp-json\/wp\/v2\/posts\/121\/revisions"}],"predecessor-version":[{"id":4909,"href":"https:\/\/www.realtrends.com\/blog\/wp-json\/wp\/v2\/posts\/121\/revisions\/4909"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.realtrends.com\/blog\/wp-json\/wp\/v2\/media\/4822"}],"wp:attachment":[{"href":"https:\/\/www.realtrends.com\/blog\/wp-json\/wp\/v2\/media?parent=121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.realtrends.com\/blog\/wp-json\/wp\/v2\/categories?post=121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.realtrends.com\/blog\/wp-json\/wp\/v2\/tags?post=121"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.realtrends.com\/blog\/wp-json\/wp\/v2\/coauthors?post=121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}