Under the Identity Theft and Assumption Deterrence Act (ITADA), identity theft is defined as the knowing transfer, possession, or usage of any name or number that identifies another person, with the intent of committing or aiding or abetting a crime. This kind of crime can generate substantial losses to consumers which include the opportunity costs of time spent disputing fraudulent claims, closing existing accounts, and opening new accounts. Still, these may be only part of the costs incurred by the victim (Barker et al. 2008; Eisenstein 2008).
Method One: Googlehacking
Googlehacking is a technique that hackers use to get personal information about certain people. This is possible as Google robots web crawlers collect information that’s already provided. Those pieces of information are provided by others when they use Google’s tools such as SQL Hunter, GooDork …show more content…
Through Googlehacking they use software such as SQL Hunter. SQL hunter detects weaknesses in websites and it’s a technique that attacks websites using malicious SQL statements, this gives the hacker more access to their databases. This is done through the administrator pages and they can be easily found just by searching up inurl:admin.
Another method used by hackers is through pentest-tools.com. Hackers use this website because it provides Google search results after it searches for up to nine types of Googlehacking when a user enters a desired URL. Also hackers use GoogleDork, it’s a tool that enables automatic and easier Googling of such Google hackings.
Method two: Spyware
It’s difficult to define what exactly is spyware precisely as there is not clean line between good and bad behaviour. But spyware is a software parasite that collects information of value, it will hijack resources or functions of a pc, installs without the user’s consent and is really stubborn as it resists detection and