Target Shoppers: 4 Ways Hackers Will Come After You


What's Hot


2 Types of Black Marks Might Vanish From Your Credit File SoonBorrow

6 Ways the Obamacare Overhaul Might Impact Your WalletInsurance

7 Dumb and Costly Moves Homebuyers MakeBorrow

This Free Software Brings Old Laptops Back to LifeMore

Obamacare Replacement Plan Gets ‘F’ Rating from Consumer ReportsFamily

Beware These 12 Common Money MistakesCredit & Debt

21 Restaurants Offering Free Food Right NowSaving Money

17 Ways to Have More Fun for Less MoneySave

House Hunters: Beware of These 6 Mortgage MistakesBorrow

30 Household Uses for Baby OilSave

25 Ways to Spend Less on FoodMore

Nearly Half of Heart-Related Deaths Linked to These 10 Foods and IngredientsFamily

5 Surprising Benefits of Exercising Outdoors in WinterFamily

10 Ways to Save When You’re Making Minimum WageSave

Boost Your Credit Score Fast With These 7 MovesCredit & Debt

7 Painless Ways to Pay Off Your Mortgage Years EarlierBorrow

The Most Sinful City in the U.S. Is … (Hint: It’s Not Vegas)Family

The True Cost of Bad CreditCredit & Debt

10 Companies With the Best 401(k) PlansGrow

This Scam Now Tops ID Theft as the No. 2 Consumer ComplaintFamily

6 Stores With Awesome Reward ProgramsFamily

6 Ways to Save More at Lowe’s and The Home DepotSave

6 Healthful Treats for Your DogFamily

New Study Ranks the Best States in the U.S.Family

Thousands of Millionaires Moving to 1 Country — and Leaving AnotherGrow

Strapped for College Costs? How to Get the Most From FAFSABorrow

6 Overlooked Ways to Save at Chick-fil-AFamily

Ask Stacy: What’s the Fastest Way to Pay Off My Mortgage?Borrow

Where to Sell Your Stuff for Top DollarAround The House

8 Ways to Get a Good Price on a Shiny New AutoCars

Ask Stacy: How Do I Start Over?Credit & Debt

Secret Cell Plans: Savings Verizon, AT&T, T-Mobile and Sprint Don’t Want You to Know AboutFamily

30 Awesome Things to Do in RetirementCollege

14 Super Smart Ways to Save on TravelSave

The Rich Prefer Modest Cars — Should You Join Them?Cars

You’ll Soon Pay More to Shop at CostcoSave

10 Ways to Save When Your Teen Starts DrivingFamily

Scammers can use the information stolen from Target to try to get you to share more personal information or attempt to take over your computer. Here's what to look for.

This post comes from Adam Levin at partner site Credit.com.

Amid all the news that hackers gave gotten their hands on millions of credit card numbers and contact information from at least five retailers — including Target and Neiman Marcus — many of you might be wondering what those thieves could really net from just an email address, home address, phone number or credit card number.

The answer depends on you, and what kind of “ish” you could get sucked in by.

On the one hand, you’re technically right: Once a credit card is canceled and without your Social Security number, there’s not much left for an identity thief to directly profit from. But with a little extra work and some programming ingenuity, identity thieves can use this information to engage in what I like to call the pantheon of “ishing” – phishing, spear-phishing, vishing and smishing – and still turn a tidy profit from their crimes with your inadvertent help.

So, what are these four big ishes? Let’s go through them, shall we?

1. Phishing

If you have an email account, you’re probably already familiar with phishing, which is when you (and thousands of other people) get an email claiming to be “your” financial company, email provider or best friend (among other identities) in an effort to get you to give them sensitive financial information or personal information (like your Social Security number), or even to click on a link that will collect that information or install a virus or malware onto your computer.

What you might not know is that phishermen’s trawling tactics are increasingly sophisticated and their emails look more and more like they’ve come from reputable sources, which is why you have to retrain yourself not to click, no matter how initially important or worrisome the email might seem.

If you think you do need to be in touch with your financial institution, email provider or best buddy, type that email address directly in a new window, or Web address in a new browser.

2. Spear-phishing

Spear-phishing is, as it sounds, just a more targeted form of phishing. Hackers will go through lists of contact data looking for people who seem either more vulnerable to phishing tactics or more important – like people who work at financial services companies – and send them tailored emails that appear to come from specific, important people they know. They’re often asked to click on links or download seemingly innocuous files and – bam – the hackers are in.

3. Vishing

Vishing is how hackers take advantage of phone number databases – like the ones accessed in the SnapChat hack. They’ll call you and claim to be from your bank (they just need your account number and routing information), the IRS (just confirm your Social Security number) or even Microsoft (just let them log into your PC remotely) to try to gain access to your personal or financial information or even install malware on your devices.

4. Smishing

Perhaps the newest identity theft technique is smishing – and, no, this isn’t what Snooki and the gang were talking about on “Jersey Shore.” Instead, hackers use cellphone numbers they’ve obtained – through everything from the SnapChat hack to the Target hack – to text people unawares. They can disguise their numbers, pretend to be companies with which you are affiliated or simply encourage you to open a link that can install malware or viruses on your smartphone.

But all these techniques require one thing: that consumers fall for it. They require you to let your guard down, assume your spam filter will catch it, be distracted when so-and-so from “your bank” calls worried about your account security, or wondering who would text you a link to something and what it could all mean.

They require you to think that Target’s offer of free credit monitoring is all you need to protect yourself, that a hacker having your email address isn’t a big deal, and that once your credit card is replaced, you need not closely monitor your accounts after that.

The truth is that all of us – regardless of whether we think we’ve been caught up in a data breach – need to be vigilant when it comes to our information. Check your accounts regularly. Check your credit reports for free once a year with each of the major credit bureaus. Ensure the reports are accurate and that you recognize all the accounts.

If you even suspect they have mistakes, reach out to the bureaus (Experian, Equifax and TransUnion). To monitor your credit more regularly, you can use a free tool like Credit.com’s Credit Report Card for a breakdown, updated monthly, of the information in your credit report along with free credit scores. If you see your score drop for no reason, you know something could be up.

The hackers want you to let your own issues overcome your healthy skepticism when it’s time for their “ish.” Don’t grant their wish.

More on Credit.com:

Stacy Johnson

It's not the usual blah, blah, blah

I know... every site you visit wants you to subscribe to their newsletter. But our news and advice is actually worth reading! For 25 years, I've been making people richer without making their eyes glaze over. You'll be glad you did. I guarantee it!

💰🗣📰

Read Next: Considering a Fixer-Upper? 15 Ways to Avoid a Money Pit

Check Out Our Hottest Deals!

We're always adding new deals and coupons that'll save you big bucks. See the deals to the right and hundreds more in our Deals section.

Click here to explore 1,981 more deals!