Close Menu
Philstar Tech
    • Deals
    • Contact Us
    • About Us
    Philstar Tech
    • Home
    • All Post
    • News
      • Features
    • Tech @Life
    • Reviews
      • Fitness
      • Laptops
      • Mobility
      • Smartphones
      • Wearables
    • Opinion
    Philstar Tech
    Home » Identity theft is when someone pretends to be you without your knowledge
    Opinion

    Identity theft is when someone pretends to be you without your knowledge

    Bernard Theo JandaBy Bernard Theo JandaJanuary 4, 2024Updated:January 4, 20243 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    In my previous article, I discussed measures to protect your Facebook account. Now, let’s delve into one of the primary ways Facebook accounts, other social media accounts, even bank accounts for that matter, get compromised. Over the past few years, we’ve heard about accounts being “hacked”. However, it’s important to note that real hackers typically won’t spend time and effort to steal your accounts. 99% of stolen accounts are not due to individuals being “hacked”, but rather, they are a result of identity theft.

    Identity theft is when someone else pretends to be you without your knowledge. They use your personal information, like your name, email address, or other personal information that can be freely compiled from various sources.  Below are freely available sources of information that can be used to perform identity theft:

    1. Social Media: People knowingly or unknowingly post personal information on social media platforms, which can be used for identity theft. This includes details like full name, date of birth, address, and even answers to security questions like your mother’s maiden name or your first pet’s name.
    2. Phishing: Emails from a supposed trusted source, like your bank, email provider or even social media site, that will make you click on a link that brings you to a website that will ask for your user id and password.
    3. Trash/Dumpster Diving: Discarded documents such as bank statements, credit card bills, or even junk mail can contain personal information. Identity thieves may go through someone’s trash to find this information.
    4. Phone Scams/Vishing: Identity thieves may call pretending to be from a legitimate organization like your bank and ask you to confirm your personal information.
    5. Lost or Stolen Wallet/Cellphones: If your wallet or cellphone is lost or stolen, it can provide a wealth of information to an identity thief, including your driver’s license, credit cards, contact list, even your photographs.

    Once enough information has been gathered from an intended target, malicious parties can continue with stealing their target’s information.  With enough information, a fraudster can do any of these:

    1. Access and drain your bank account: They can use your banking details to withdraw money without your knowledge.
    2. Open new bank accounts or take out loans in your name: With enough information, they can create new accounts or borrow money, leaving you to deal with the debt.
    3. Purchase expensive goods in your name: They can buy items using your credit card information or open store accounts in your name.
    4. Access your email or social media accounts: They can use these to gather more information about you or to scam your friends and family.
    5. Apply for credit in your name: They can use your personal details to apply for credit cards or loans.

    As seen above, it is not that difficult to steal social media accounts and real money from potential victims. All that needs to happen is for people to be careless with their personal information, which opens them up to becoming victims of fraud – no hacking required. 

    identity theft
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Bernard Theo Janda

    Related Posts

    Your own personal hell: Why you should play Silent Hill 2

    January 28, 2026

    Let the digital bulls run: How tech can finally wake up our capital markets

    January 9, 2026

    Why connectivity is no longer a luxury—it’s the new face of bayanihan

    January 9, 2026

    Most Popular

    RCBC enables first nationwide cardless withdrawals for GCash users

    January 27, 20262 Mins Read

    Cebu is home to largest cold storage run by AI and robotics

    June 27, 20256 Mins Read

    Here’s where you can officially buy the Nintendo Switch 2 in the Philippines (with 2 years warranty perks to match)

    July 8, 20253 Mins Read

    Yes, you can still use Google on a HUAWEI phone. I tried it. Here’s what actually works

    July 29, 20254 Mins Read

    ASUS NUC 15 Pro Review: small form factor PC that can rival some gaming handhelds

    January 27, 20264 Mins Read

    HONOR X9d review: beyond the durability hype, a new standard in “midrange” capability

    January 9, 20265 Mins Read

    Latest

    GRAMMYs, IBM bring AI to music fans

    By Dawn SolanoJanuary 30, 20261 Min Read

    OPPO deepens Google Cloud partnership to power next-gen AI system

    By Dawn SolanoJanuary 30, 20262 Mins Read

    TCL launches AI-powered air conditioners to cut energy use

    By Dawn SolanoJanuary 30, 20262 Mins Read

    Aurora Gaming Philippines shocks the world and reigns supreme at M7

    By PhilSTAR Tech TeamJanuary 28, 20266 Mins Read

    Your own personal hell: Why you should play Silent Hill 2

    By Jianzen DeananeasJanuary 28, 20265 Mins Read

    Mapúa University secures strategic partnership with Capcom and Prime Manpower for Philippine game industry growth

    By Danie BravoJanuary 28, 20264 Mins Read
    Copyright © 2026 Philstar Tech | Powered by The Philippine STAR

    Type above and press Enter to search. Press Esc to cancel.