Home > Case Studies

Case Studies...

Below are our articles on the subject of Case Studies. If you can't see what you are looking for our other categories are displayed on the left under 'Our Quick Links'...
A Phone Scam Almost Cost Me Money: Case Studies
A Phone Scam Almost Cost Me Money: Case Studies
If someone calls you and asks for personal or banking details, be very wary. If you are not sure the company is legitimate, hang up and look up the correct phone number yourself - then phone them back...
About Advance Fee Scams
About Advance Fee Scams
Advance fee scams are becoming more and more common, usually promising untold wealth for a small fee upfront. Unfortunately, they are all bogus and designed to get cash from unsuspecting and, more oft...
An ID Fraud Cost Me Money: A Case Study
An ID Fraud Cost Me Money: A Case Study
When two new yet unauthorised direct debits appeared on his bank account, John Dawe knew something was up. Yet he took him ages to clear up what obviously was an identity theft fraud, and he still doe...
ATM Skimming: Copying your Details
ATM Skimming: Copying your Details
This article looks at skimming and how it is used to obtain details of your credit and debit cards and also your bank details...
Avoid Becoming a Money Mule
Avoid Becoming a Money Mule
Some people are delighted to receive an email asking them to help transfer money out of the country for a business in need of help. But they have inadvertently become money mules, and can land up in v...
Bank Account Details and Security
Bank Account Details and Security
This article looks at how an identity thief can use your bank details to defraud you and how you can combat this problem....
Buying Goods Online and Identity Theft
Buying Goods Online and Identity Theft
This article looks at purchasing goods or services online and how best to do it...
Caller ID and Personal Security
Caller ID and Personal Security
This article looks at the uses for Caller ID in screening unwanted and potentially fraudulent calls...
Can a Notice of Correction Protect Against I.D Theft?
Can a Notice of Correction Protect Against I.D Theft?
If your credit report is suffering due to fraudulent activity as the result of identity theft, contact your credit reference agency. If you get no joy immediately, then putting a Notice of Correction ...
Can My CV Expose Me to Identity Theft?
Can My CV Expose Me to Identity Theft?
A reader would like to know the possible dangers of her CV being obtained by scam artists....
Check Your Own Credit Score
Check Your Own Credit Score
This article looks at how to check your own credit score and what you can do to improve it....
Chip and Pin Fraud Prevention
Chip and Pin Fraud Prevention
This article looks at Chip and PIN and how it works...
Cold Calls and the Law
Cold Calls and the Law
This article looks at cold calling and the laws in place to prevent and reduce the instances of it happening...
Computer Hackers and Identity Theft
Computer Hackers and Identity Theft
This article looks at hacking, what it is and how it can affect the safety of your identity and details...
Computer Repair and Security
Computer Repair and Security
This article looks at the steps you can take to protect your computer if it is to be sent off site for repair...
Criminal Checks: The DBS (was CRB)
Criminal Checks: The DBS (was CRB)
This article looks at the disclosure and barring service, what it does and what checks are carried out before offers of employment are made...
Data Breaches and Public Security
Data Breaches and Public Security
This article looks at what constitutes a data breach and what you as an individual can do to find out how information about you is stored and accessed...
Don't Fall for Job Offer Scams
Don't Fall for Job Offer Scams
More and more people these days are receiving emails promising lucrative jobs for little or no work. In reality these are simply identity theft scams, the goal being to get as much personal informatio...
Don't Fall for the iPad Tester Scam
Don't Fall for the iPad Tester Scam
The iPad tester scam sounds like such an obvious scam it’s hard to believe that anyone could ever fall for it. But the sad thing is that people do fall for it, again and again, and as a result they ar...
Door Step Callers and Your Safety
Door Step Callers and Your Safety
This article looks at the risk bogus door step callers pose when it comes to identity fraud...
Fake Charities And Identity Theft
Fake Charities And Identity Theft
Identity theft is prevalent among fraudsters pretending to represent a legitimate charity, who then keep the profits for themselves. Sadly, it's the real charities who lose out - so do your research b...
Firewalls and Anti-Virus Protection
Firewalls and Anti-Virus Protection
This article looks at the uses of firewalls and anti-virus software in order to reduce the risk of viruses and data loss...
Gadgets to Help You Protect Your Data
Gadgets to Help You Protect Your Data
About Identity Theft gives advice on the gadgets available on the open market to help you protect your important and personal data...
High Street Lending & Personal Details
High Street Lending & Personal Details
This article looks at how high street lending and other high street institutions use and maintain your personal information...
How Computer Hackers Stole My Identity: A Case Study
How Computer Hackers Stole My Identity: A Case Study
Computer hackers can take advantage of weak firewalls to access sensitive personal information, as Katie Nimmo explains......
How Do We Check a Credit Report is not Duplicated?
How Do We Check a Credit Report is not Duplicated?
How to go about correcting mistakes on your credit file including duplications...
How the Mailing Preference Service Works
How the Mailing Preference Service Works
This article looks at the Mailing Preference Service and how it can help alleviate the problem of unsolicited mail...
How to Avoid Email Scams
How to Avoid Email Scams
This article looks at Email Scams and how to avoid them...
How to Avoid Online Fraud
How to Avoid Online Fraud
This article looks at online fraud and how best to protect yourself from it...
How to Check the ID of an Individual at your Door?
How to Check the ID of an Individual at your Door?
Information on how to protect yourself and check the validity of an individual's ID when they knock at your door...
How to Choose the Right Shredder
How to Choose the Right Shredder
How to choose a shredder for your home and business...
How to Create a Secure Password to Protect your Identity
How to Create a Secure Password to Protect your Identity
How to create a secure password to protect your identity...
I Fell for a Fake Website: A Case Study
I Fell for a Fake Website: A Case Study
Amber Harrison was subject to a fake website site scam when she purchased an expensive charm bracelet online for her daughter's 13th birthday. But the bracelet never arrived......
I Fell for a Phishing Scam: A Case Study
I Fell for a Phishing Scam: A Case Study
in phishing scams unscrupulous fraudsters target victims by sending legitimate looking emails requesting bank details...
Identity Theft and Money Laundering
Identity Theft and Money Laundering
Criminals need to launder dirty money to either get it out of the country or simply to cover up the trail that leads back to them. Stealing your identity is one way to do it....
Identity Theft and Online Banking
Identity Theft and Online Banking
Online banking is very convenient, but can it guarantee data security and be free of identity theft?...
Identity Theft as a Crime
Identity Theft as a Crime
This article looks at Identity theft and what constitutes Identity theft as a crime...
Identity Theft Facts and Figures
Identity Theft Facts and Figures
There are various types of identity theft which takes place using personally identifiable information. The scale of identity theft in the UK is being tackled by various agencies....
Identity Theft of the Deceased
Identity Theft of the Deceased
There’s an old saying that you cannot libel the dead. While that may be true, it certainly is possible for thieves to steal the identity of a deceased individual, and use it to their advantage. Take s...
Importance of Destroying Household Bills
Importance of Destroying Household Bills
This article looks at how to best destroy household bills and reduce the risk of your information being extracted from them by identity thieves...
Insurance Policies and Your Personal Details
Insurance Policies and Your Personal Details
This article looks at the information contained on your insurance policy and what use it could be to an identity thief...
Intercepting Emails and Your Security
Intercepting Emails and Your Security
This article looks at why emails are intercepted and how they can be intercepted by individuals who have no reason to intercept them...
Internet Histories and Cookies
Internet Histories and Cookies
Internet histories and cookies can be useful to hackers who gain access to your computer; here we explain what they are and how to delete them...
Is Identity Theft Insurance Just a Scam?
Is Identity Theft Insurance Just a Scam?
People often wonder about how they could cope, both financially and practically, if they had their identity stolen. Identity theft insurance now promises to help you cope better, but is it really wort...
Key Issues in Identity Theft: Top Tips to Protect Yourself
Key Issues in Identity Theft: Top Tips to Protect Yourself
Identity Theft can affect anyone however you can take simple precautions to protect your personal data and reduce the risks....
Mail Theft and Personal Security
Mail Theft and Personal Security
This article looks at mail theft and what can be done to avoid it happening to you...
Mobile Telephones and Data Theft
Mobile Telephones and Data Theft
This article looks at mobile telephones and the theft of data from them...
My Bad Experience on Social Networking Site: A Case Study
My Bad Experience on Social Networking Site: A Case Study
Be wary of online scams and people accessing sensitive personal details from your social networking site profile....
My Computer Was Hacked: A Case Study
My Computer Was Hacked: A Case Study
A recent survey claims that 25 per cent of all computer spam comes from infected LinkedIn emails, which can install malicious malware on your computer. Writer Melanie Hudson thinks that's what happene...
My Credit Card Was Cloned: A Case Study
My Credit Card Was Cloned: A Case Study
Cassandra Taylor was surprised to check her bank account and discover she had no funds. Then she learnt she had been the victim of a credit card cloning......
Organised Crime and Identity Fraud
Organised Crime and Identity Fraud
This article looks at organised crime and how it uses identity fraud as a means to obtain money...
Passport Details and Date of Birth Can they be Used?
Passport Details and Date of Birth Can they be Used?
Passport Details and Date of Birth Can they be Used?...
Paying Bills Online: Is it Safe?
Paying Bills Online: Is it Safe?
Is paying your bills online as safe as you think it is? And what can you do to make sure that your details and personal information don't fall into the wrong hands in cyberspace...
PDA's and Your Personal Information
PDA's and Your Personal Information
This article looks at hand held devices and their use in relation to your personal information...
Personal Security and Your PC's Cache File
Personal Security and Your PC's Cache File
What are cache files and what information do they store on your computer - we look at these hidden files and offer straightforward advice on how to delete them and keep your computer free from the adv...
Phishing: Emails that Appear to be from Genuine Institutions
Phishing: Emails that Appear to be from Genuine Institutions
This article looks at Phishing, what is it and how it is used to find out information about you...
Photographic ID and ID Cards
Photographic ID and ID Cards
This article looks at the various types of photograhpic ID and what they are used for...
Prosecuting Identity Fraud
Prosecuting Identity Fraud
This article looks at how identity fraud is prosecuted and the likelihood of such a prosecution ever taking place...
Protecting Your Birth Certificate
Protecting Your Birth Certificate
This article looks at your birth certificate and how important a document it is especially if it falls into the hands of an identity thief...
Protecting Your Identity While Abroad
Protecting Your Identity While Abroad
This article examines how you can protect your identity whilst abroad and what to do if you lose important paperwork...
Protecting Your Mobile Phone From Identity Theft
Protecting Your Mobile Phone From Identity Theft
This article looks at mobile phone fraud, what it is and how it can be avoided...
Protecting your Passport Information
Protecting your Passport Information
This article looks at the information that can be obtained from your passport...
Proving Your Identity
Proving Your Identity
Being able to prove your identity is as important as being able to protect it; here we examine how you can do both....
Q & A: Getting Hold of Your Credit File
Q & A: Getting Hold of Your Credit File
A credit file contains details of your personal financial history and is used by lenders to assess your credit risk....
Q & A: Reporting Identity Theft
Q & A: Reporting Identity Theft
If you discover yourself a victim of identity theft then act quickly to report it to the appropriate agencies....
Q & A: What is RFID?
Q & A: What is RFID?
RFID uses radio frequency to provide automatic identification for people, animals and objects....
Rebuilding Your Credit Record After Identity Theft
Rebuilding Your Credit Record After Identity Theft
Victims of identity theft may spend countless hours trying to clear their name and rebuild their credit record. While at times that may seem like a thankless task, you'll be glad you did it next time ...
Register With the Telephone Preference Service
Register With the Telephone Preference Service
This article looks at the telephone preference service and how it can reduce the number of unwanted sales calls...
Safely Storing your Documents
Safely Storing your Documents
This article looks at how to safely store documents without them falling into the wrong hands...
Security Risks of Peer to Peer File Sharing
Security Risks of Peer to Peer File Sharing
Peer to Peer file sharing is commonplace, but can pose a danger to your computer, letting spyware in that can take control of your machine....
Should We Report Our Stolen Birth Certificates?
Should We Report Our Stolen Birth Certificates?
A stolen birth certificate may be used by thieves to undertake identity theft and fraud. It is important to report the theft....
Social Networking Sites and Chat Rooms
Social Networking Sites and Chat Rooms
This article looks at social networking sites and how they can be used by identity fraudsters...
Social Networking: How Can I Protect Myself?
Social Networking: How Can I Protect Myself?
How to protect your identity when using social networking websites...
Spotting a Website Goods Scam
Spotting a Website Goods Scam
If you spot a website selling incredibly cheap designer goods, chances are it's a scam. Learn to spot the scammers, before they con you out of your hard-earned cash......
Spyware: Downloaded Programs or Viruses
Spyware: Downloaded Programs or Viruses
This article looks at spyware and discusses how it can be used to access information stored on your computer...
Teaching Children About Identity Theft
Teaching Children About Identity Theft
Even very young children are becoming victims of identity theft, which means it's never too early to teach your children about protecting themselves from this type of fraud......
The Bereavement Register and Personal Safety
The Bereavement Register and Personal Safety
This article looks at the bereavement register and how it is used to reduce the amount of unsolicited mail sent to the addresses of the deceased...
The National Identity Service
The National Identity Service
The National Identity Service is responsible for issuing passports and identity cards....
The Work of CIFAS
The Work of CIFAS
CIFAS is not a credit reference agency, it is a non-profit organisation dedicated to combatting financial fraud in the UK....
Tick 'NO' to Third Party Advertising
Tick 'NO' to Third Party Advertising
We examine why ticking the box on company paperwork is important if you want to avoid having your details passed on, as well as what you can do yourself to reduce the chances of your details falling i...
Top Ten Identity Theft Tricks
Top Ten Identity Theft Tricks
Identity theft is on the rise, and fraudsters are coming up with more and more sophisticated ways to cheat individuals out of their hard-earned money - even dead people! This list of the most common i...
Trojans and the Risk to Your Personal Details
Trojans and the Risk to Your Personal Details
This article looks at trojans, what they are and how their appearance on your computer can be combatted...
Types of Identity Theft
Types of Identity Theft
Identity theft is becoming more and more prevalent, but fraudsters are not just committing this crime for financial reasons. Identity theft is also used by criminals for terrorist activities, illegal ...
Use Your Credit Score to Stop Identity Theft
Use Your Credit Score to Stop Identity Theft
This article looks at credit scoring and how it can be used to identify if you have a good or bad credit rating, and how to use your credit score to stop identity theft....
Using Credit and Debit Cards Safely
Using Credit and Debit Cards Safely
This article looks at how to safely use your credit or debit card both online and in the high street...
What are Biometric Passports?
What are Biometric Passports?
This article looks at the introduction of Biometric Passports as a way of reducing identity theft...
What are Dialler Scams?
What are Dialler Scams?
This article looks at diallers and the damage they can cause as well as their ability to allow access to your computer from a location some distance away...
What Are Phantom Flat Transfers?
What Are Phantom Flat Transfers?
Phantom flat money transfer scams are easy ways to con people, because they are so easy. In fact, you don’t even have to own a flat to make this scam work; all you have to do is post nice photos of on...
What Can I Do To Prevent Mistaken Identity?
What Can I Do To Prevent Mistaken Identity?
How to avoid mistaken identity...
What Information Needs to be on a CV?
What Information Needs to be on a CV?
How to combat identity theft with CV...
What is Data Patrolling?
What is Data Patrolling?
This article looks at data patrolling and how it is used to protect your information online...
What is Identity Theft Fraud Alert?
What is Identity Theft Fraud Alert?
Becoming a victim of identity means you will spend countless hours trying to minimise the damage, and face an uphill battle trying to assess the damage to your credit score. Placing a fraud alert on y...
What is Shoulder Surfing?
What is Shoulder Surfing?
This article looks at shoulder surfing and why so many people dismiss it as a problem...
What is Text Messaging Identity Theft?
What is Text Messaging Identity Theft?
People are, on the whole, alert to email scams. But now a new type of text messaging scam is on the rise, which gives fraudsters access to people's personal information - and eventually their money......
What is the Spanish Identity Theft Scam?
What is the Spanish Identity Theft Scam?
If you receive an email telling you that you have just become a millionaire on the Spanish lottery, your first impulse might be to rejoice. But then ask yourself one simple question: did you even buy ...
What Should I Do Without Official Identification?
What Should I Do Without Official Identification?
Although having different names on a birth certificate and National Insurance record poses a problem it can be resolved by following the correct channels....
What to do if your Identity is Stolen?
What to do if your Identity is Stolen?
This article details a list of things you should do if your identity has been stolen or if you suspect it has...
Who Can See What You Look at on the Internet?
Who Can See What You Look at on the Internet?
We examine the risks inherent with using the Internet for business and personal use and also who may be monitoring the websites we surf whilst online...
Who is at Risk from Forgery?
Who is at Risk from Forgery?
This article looks at forgery, what documents can be forged and what you can do to prevent yourself against this particular identity fraud...
Why Protecting Your Post is Important
Why Protecting Your Post is Important
Identity thieves like nothing more than having access to someone's post, which can allow them to obtain a credit card, get a new passport and even buy a new car in someone else's name. Luckily, there ...
Why Shred Personal Documents?
Why Shred Personal Documents?
This article looks at the importance of shredding your personal details in order to make it harder for the identity thief to succeed in stealing personal information...
Wireless Internet Connections and Security
Wireless Internet Connections and Security
This article looks at wireless internet connections and how they can be used by others if not protected...
Wireless Internet Surfing and the Risks of Identity theft
Wireless Internet Surfing and the Risks of Identity theft
This article looks at the risks of identity theft using wireless internet technology....
Your Consumer Rights Online
Your Consumer Rights Online
This article looks at consumer's rights online...
Your Details and the Electoral Register
Your Details and the Electoral Register
This article looks at the electoral register and discusses how it can be used for the purposes of identity fraud...
Your Driving Licence and your Passport
Your Driving Licence and your Passport
This article looks at passports and driving licences, probably the two most important documents you will ever own....
Your National Insurance Number
Your National Insurance Number
This article looks at your National Insurance number and what it is used for...
Your Website and ID Fraud
Your Website and ID Fraud
This article looks at how to build your own website whilst keeping the amount of information that can be used by an identity thief down to a minimum...
Topics