Job Seekers Targeted By Identity Thieves

Job Seekers Targeted By Identity Thieves

Fake job ads are up 345% over the past three years, according to one U.K. financial security association.

By Thomas Claburn
InformationWeek
March 5, 2009 10:00 AM

Job seekers beware. Identity thieves are looking to steal personal information from those searching for employment.

Fake job ads are up 345% over the past three years, according to the U.K. Association for Payment Clearing Services, and the Identity Theft Resource Center (ITRC) warns that would-be workers should be careful about providing personal information to purported employers.

Microsoft (NSDQ: MSFT) on when to go OneCare versus Forefront The ITRC offers seven tips to help job seekers avoid being scammed:

1. Protect your Social Security number. Don't put it on your resumé and only provide it to a company when you're convinced you're a serious prospect for a legitimate job.

2. Consider creating an e-mail account specifically for your job search. This can help limit possible damage from spam, phishing, and other e-mail scams.

3. Look into companies that place job ads by researching them with the Better Business Bureau or through a state database. Anyone can create a Web site.

4. Avoid any Web site that asks you to preregister using your Social Security number, home address, or driver's license number. You should also be suspicious of sites that ask for payment to view job listings.

5. Make sure your computer security software and settings are up to date before sending out resumés and job-related e-mail. Phishers and scammers look for job seekers to bait with fake job offers because they're receptive opening messages and clicking on links.

6. Make sure your contact at a company actually works there and watch for signs that something isn't right, like an e-mail address that's inconsistent with the company's Web site address.

7. Be wary of common job scams. Jobs that require you to cash checks for a company or open a bank account, known as "money mule scams," could leave you open to charges of money laundering.

The ITRC offers additional tips for avoiding identity theft while searching for a job at its Web site.

Views: 32

Comment

You need to be a member of Codetown to add comments!

Join Codetown

Happy 10th year, JCertif!

Notes

Welcome to Codetown!

Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.

When you create a profile for yourself you get a personal page automatically. That's where you can be creative and do your own thing. People who want to get to know you will click on your name or picture and…
Continue

Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.

Looking for Jobs or Staff?

Check out the Codetown Jobs group.

 

Enjoy the site? Support Codetown with your donation.



InfoQ Reading List

Cloudflare Introduces Data Platform with Zero Egress Fees

Cloudflare has recently announced the open beta of Cloudflare Data Platform, a managed solution for ingesting, storing, and querying analytical data tables using open standards such as Apache Iceberg.

By Renato Losio

Layered Defences Are Key to Combating AI-Driven Cyber Threats, CNCF Report Finds

The Cloud Native Computing Foundation have published an analysis of modern cybersecurity practices, finding that attacks using Artificial Intelligence are now a significant threat. The report highlights the criticality for organisations to adopt multi-layered defence strategies as artificial intelligence transforms both the threat landscape and the protective measures available to businesses.

By Matt Saunders

Apple Previews SDK for Building Android Apps with Swift

The Swift SDK for Android, recently released as a nightly build, is designed to help developers to port their Swift packages to Android, making it easier to share code across platforms. While the SDK is still in preview, over 25% of packages in the Swift Package Index can already be compiled for Android.

By Sergio De Simone

Presentation: The Way We Manage Compliance Is Wrong… And Is Changing! Bringing DevOps Principles to Controls and Audit

Ian Miell shares the open-source Continuous Compliance Framework (CCF), a tool for modernizing audits and controls. He explains how current manual, periodic compliance fails, especially with new regulations like DORA. He demonstrates how CCF leverages DevOps principles, agent-based architecture, and the OSCAL standard to provide continuous, centralized visibility across hybrid estates.

By Ian Miell

From Outages to Order: Netflix’s Approach to Database Resilience with WAL

Netflix uses a Write-Ahead Log (WAL) system to improve data platform resilience, addressing data loss, replication entropy, multi-partition failures, and corruption. WAL decouples producers and consumers, leverages SQS/Kafka with dead-letter queues, and supports delay queues, cross-region replication, and multi-table mutations for high-throughput, consistent, and recoverable database operations.

By Leela Kumili

© 2025   Created by Michael Levin.   Powered by

Badges  |  Report an Issue  |  Terms of Service