Job Seekers Targeted By Identity Thieves

Job Seekers Targeted By Identity Thieves

Fake job ads are up 345% over the past three years, according to one U.K. financial security association.

By Thomas Claburn
InformationWeek
March 5, 2009 10:00 AM

Job seekers beware. Identity thieves are looking to steal personal information from those searching for employment.

Fake job ads are up 345% over the past three years, according to the U.K. Association for Payment Clearing Services, and the Identity Theft Resource Center (ITRC) warns that would-be workers should be careful about providing personal information to purported employers.

Microsoft (NSDQ: MSFT) on when to go OneCare versus Forefront The ITRC offers seven tips to help job seekers avoid being scammed:

1. Protect your Social Security number. Don't put it on your resumé and only provide it to a company when you're convinced you're a serious prospect for a legitimate job.

2. Consider creating an e-mail account specifically for your job search. This can help limit possible damage from spam, phishing, and other e-mail scams.

3. Look into companies that place job ads by researching them with the Better Business Bureau or through a state database. Anyone can create a Web site.

4. Avoid any Web site that asks you to preregister using your Social Security number, home address, or driver's license number. You should also be suspicious of sites that ask for payment to view job listings.

5. Make sure your computer security software and settings are up to date before sending out resumés and job-related e-mail. Phishers and scammers look for job seekers to bait with fake job offers because they're receptive opening messages and clicking on links.

6. Make sure your contact at a company actually works there and watch for signs that something isn't right, like an e-mail address that's inconsistent with the company's Web site address.

7. Be wary of common job scams. Jobs that require you to cash checks for a company or open a bank account, known as "money mule scams," could leave you open to charges of money laundering.

The ITRC offers additional tips for avoiding identity theft while searching for a job at its Web site.

Views: 32

Comment

You need to be a member of Codetown to add comments!

Join Codetown

Happy 10th year, JCertif!

Notes

Welcome to Codetown!

Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.

When you create a profile for yourself you get a personal page automatically. That's where you can be creative and do your own thing. People who want to get to know you will click on your name or picture and…
Continue

Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.

Looking for Jobs or Staff?

Check out the Codetown Jobs group.

 

Enjoy the site? Support Codetown with your donation.



InfoQ Reading List

11 Sessions Not to Miss at QCon San Francisco 2025

As QCon San Francisco (Nov 17-21, 2025) approaches, the conference's program committee and track hosts are sharing their top picks from this year's lineup. Their selections span a wide range of topics, from AI-accelerated development and platform engineering to resilience patterns and career growth, all with QCon's signature focus on real-world case studies and lessons learned.

By Artenisa Chatziou

Presentation: Building Distributed Event-Driven Architectures Across Multi-Cloud Boundaries

Teena Idnani explains how to architect and build resilient event-driven distributed systems in a multi-cloud reality. Using a fictional bank's migration journey, she shares practical, code-level solutions for overcoming major challenges: managing cross-cloud latency, ensuring event ordering and consistency, building resilience by design, and preventing duplicate events.

By Teena Idnani

GitHub Adds Post-Quantum Secure SSH Key Exchange to Protect Git Data in Transit

GitHub is introducing a hybrid post-quantum secure key exchange algorithm for SSH access when interacting with Git over SSH.

By Craig Risi

Meta Ships React 19.2 Featuring Activity API, Cache Signals, and SSR Enhancements

React 19.2 introduces new APIs and performance improvements focused on better UI control and server rendering. Key additions include the new Activity component for managing UI states without losing component state, and the useEffectEvent hook, which separates event logic from effect dependencies.

By Daniel Curtis

Producing a Better Software Architecture with Residuality Theory

Software architecture is tough because it blends coding, math, and business systems. Due to surprises, architectures tend to become irrelevant over time, Barry O'Reilly said. He presented residuality theory, where he suggested stressing naive architectures to reveal hidden “attractors” in complex business systems. This allows designs to better survive change and uncertainty.

By Ben Linders

© 2025   Created by Michael Levin.   Powered by

Badges  |  Report an Issue  |  Terms of Service