Close Menu
Philstar Tech
    • Deals
    • Contact Us
    • About Us
    Philstar Tech
    • Home
    • All Post
    • News
      • Features
    • Tech @Life
    • Reviews
      • Fitness
      • Laptops
      • Mobility
      • Smartphones
      • Wearables
    • Opinion
    Philstar Tech
    Home » Identity theft is when someone pretends to be you without your knowledge
    Opinion

    Identity theft is when someone pretends to be you without your knowledge

    Bernard Theo JandaBy Bernard Theo JandaJanuary 4, 2024Updated:January 4, 20243 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    In my previous article, I discussed measures to protect your Facebook account. Now, let’s delve into one of the primary ways Facebook accounts, other social media accounts, even bank accounts for that matter, get compromised. Over the past few years, we’ve heard about accounts being “hacked”. However, it’s important to note that real hackers typically won’t spend time and effort to steal your accounts. 99% of stolen accounts are not due to individuals being “hacked”, but rather, they are a result of identity theft.

    Identity theft is when someone else pretends to be you without your knowledge. They use your personal information, like your name, email address, or other personal information that can be freely compiled from various sources.  Below are freely available sources of information that can be used to perform identity theft:

    1. Social Media: People knowingly or unknowingly post personal information on social media platforms, which can be used for identity theft. This includes details like full name, date of birth, address, and even answers to security questions like your mother’s maiden name or your first pet’s name.
    2. Phishing: Emails from a supposed trusted source, like your bank, email provider or even social media site, that will make you click on a link that brings you to a website that will ask for your user id and password.
    3. Trash/Dumpster Diving: Discarded documents such as bank statements, credit card bills, or even junk mail can contain personal information. Identity thieves may go through someone’s trash to find this information.
    4. Phone Scams/Vishing: Identity thieves may call pretending to be from a legitimate organization like your bank and ask you to confirm your personal information.
    5. Lost or Stolen Wallet/Cellphones: If your wallet or cellphone is lost or stolen, it can provide a wealth of information to an identity thief, including your driver’s license, credit cards, contact list, even your photographs.

    Once enough information has been gathered from an intended target, malicious parties can continue with stealing their target’s information.  With enough information, a fraudster can do any of these:

    1. Access and drain your bank account: They can use your banking details to withdraw money without your knowledge.
    2. Open new bank accounts or take out loans in your name: With enough information, they can create new accounts or borrow money, leaving you to deal with the debt.
    3. Purchase expensive goods in your name: They can buy items using your credit card information or open store accounts in your name.
    4. Access your email or social media accounts: They can use these to gather more information about you or to scam your friends and family.
    5. Apply for credit in your name: They can use your personal details to apply for credit cards or loans.

    As seen above, it is not that difficult to steal social media accounts and real money from potential victims. All that needs to happen is for people to be careless with their personal information, which opens them up to becoming victims of fraud – no hacking required. 

    identity theft
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Bernard Theo Janda

    Related Posts

    Let the digital bulls run: How tech can finally wake up our capital markets

    January 9, 2026

    Why connectivity is no longer a luxury—it’s the new face of bayanihan

    January 9, 2026

    When law students turn to Reddit for advice

    January 7, 2026

    Most Popular

    Stephen Cheng’s winning playbook

    December 22, 20253 Mins Read

    NVIDIA unveils better upscaling and frame generation with DLSS 4.5

    January 7, 20263 Mins Read

    realme returns under Oppo in BBK brand consolidation

    January 8, 20261 Min Read

    Here’s where you can officially buy the Nintendo Switch 2 in the Philippines (with 2 years warranty perks to match)

    July 8, 20253 Mins Read

    The top 10 coolest new tech we spotted at Samsung’s The First Look @ CES 2026

    January 5, 20263 Mins Read

    Samsung’s open ecosystem makes AI belong in your life

    January 8, 20265 Mins Read

    Latest

    HONOR X9d review: beyond the durability hype, a new standard in “midrange” capability

    By Jayvee FernandezJanuary 9, 20265 Mins Read

    Let the digital bulls run: How tech can finally wake up our capital markets

    By Henry Rhoel AgudaJanuary 9, 20263 Mins Read

    Why connectivity is no longer a luxury—it’s the new face of bayanihan

    By Henry Rhoel AgudaJanuary 9, 20263 Mins Read

    Samsung’s open ecosystem makes AI belong in your life

    By Vianca GamboaJanuary 8, 20265 Mins Read

    realme returns under Oppo in BBK brand consolidation

    By Dawn SolanoJanuary 8, 20261 Min Read

    NVIDIA unveils better upscaling and frame generation with DLSS 4.5

    By Jianzen DeananeasJanuary 7, 20263 Mins Read
    Copyright © 2026 Philstar Tech | Powered by The Philippine STAR

    Type above and press Enter to search. Press Esc to cancel.