Job Seekers Targeted By Identity Thieves

Job Seekers Targeted By Identity Thieves

Fake job ads are up 345% over the past three years, according to one U.K. financial security association.

By Thomas Claburn
InformationWeek
March 5, 2009 10:00 AM

Job seekers beware. Identity thieves are looking to steal personal information from those searching for employment.

Fake job ads are up 345% over the past three years, according to the U.K. Association for Payment Clearing Services, and the Identity Theft Resource Center (ITRC) warns that would-be workers should be careful about providing personal information to purported employers.

Microsoft (NSDQ: MSFT) on when to go OneCare versus Forefront The ITRC offers seven tips to help job seekers avoid being scammed:

1. Protect your Social Security number. Don't put it on your resumé and only provide it to a company when you're convinced you're a serious prospect for a legitimate job.

2. Consider creating an e-mail account specifically for your job search. This can help limit possible damage from spam, phishing, and other e-mail scams.

3. Look into companies that place job ads by researching them with the Better Business Bureau or through a state database. Anyone can create a Web site.

4. Avoid any Web site that asks you to preregister using your Social Security number, home address, or driver's license number. You should also be suspicious of sites that ask for payment to view job listings.

5. Make sure your computer security software and settings are up to date before sending out resumés and job-related e-mail. Phishers and scammers look for job seekers to bait with fake job offers because they're receptive opening messages and clicking on links.

6. Make sure your contact at a company actually works there and watch for signs that something isn't right, like an e-mail address that's inconsistent with the company's Web site address.

7. Be wary of common job scams. Jobs that require you to cash checks for a company or open a bank account, known as "money mule scams," could leave you open to charges of money laundering.

The ITRC offers additional tips for avoiding identity theft while searching for a job at its Web site.

Views: 28

Comment

You need to be a member of Codetown to add comments!

Join Codetown

Happy 10th year, JCertif!

Notes

Welcome to Codetown!

Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.

When you create a profile for yourself you get a personal page automatically. That's where you can be creative and do your own thing. People who want to get to know you will click on your name or picture and…
Continue

Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.

Looking for Jobs or Staff?

Check out the Codetown Jobs group.

 

Enjoy the site? Support Codetown with your donation.



InfoQ Reading List

Presentation: Sleeping at Scale - Delivering 10k Timers per Second per Node with Rust, Tokio, Kafka, and Scylla

Lily Mara, Hunter Laine walk through the design of a system, its performance characteristics, and how they scaled it.

By Lily Mara, Hunter Laine

Article: Is Your Test Suite Brittle? Maybe It’s Too DRY

One important design principle in software development is DRY – Don’t Repeat Yourself. However, when DRY is applied to test code, it can cause the test suite to become brittle — difficult to understand, maintain, and change. In this article, I will present some indications that a test suite is brittle, guidelines to follow when reducing duplication in tests, and better ways to DRY up tests.

By Kimberly Hendrick

Allegro Reduces Kafka Producer Latency Outliers by 82% After Switching to XFS

Allegro experimented with different performance optimization options to improve Apache Kafka producer tail latency and eventually switched all its clusters to the XFS filesystem. The company used Kafka protocol sniffing, JVM profiling, and eBPF, which proved instrumental in identifying and eliminating performance bottlenecks.

By Rafal Gancarz

Presentation: Several Components are Rendering: Client Performance at Slack-Scale

Jenna Zeigen discusses front-end performance issues encountered by Slack as they continue to grow and evolve the desktop app.

By Jenna Zeigen

SSH Backdoor from Compromised XZ Utils Library

When Microsoft Engineer Andres Freund noticed SSH was taking longer than usual he discovered a backdoor in xz utils, one of the underlying libraries for systemd, that had taken years to be put in place. The backdoor had found its way into testing releases of Linux distributions like Debian Sid, Fedora 41 and Fedora Rawhide but was caught before propagating into more highly used stable releases.

By Chris Swan

© 2024   Created by Michael Levin.   Powered by

Badges  |  Report an Issue  |  Terms of Service