Job Seekers Targeted By Identity Thieves

Job Seekers Targeted By Identity Thieves

Fake job ads are up 345% over the past three years, according to one U.K. financial security association.

By Thomas Claburn
InformationWeek
March 5, 2009 10:00 AM

Job seekers beware. Identity thieves are looking to steal personal information from those searching for employment.

Fake job ads are up 345% over the past three years, according to the U.K. Association for Payment Clearing Services, and the Identity Theft Resource Center (ITRC) warns that would-be workers should be careful about providing personal information to purported employers.

Microsoft (NSDQ: MSFT) on when to go OneCare versus Forefront The ITRC offers seven tips to help job seekers avoid being scammed:

1. Protect your Social Security number. Don't put it on your resumé and only provide it to a company when you're convinced you're a serious prospect for a legitimate job.

2. Consider creating an e-mail account specifically for your job search. This can help limit possible damage from spam, phishing, and other e-mail scams.

3. Look into companies that place job ads by researching them with the Better Business Bureau or through a state database. Anyone can create a Web site.

4. Avoid any Web site that asks you to preregister using your Social Security number, home address, or driver's license number. You should also be suspicious of sites that ask for payment to view job listings.

5. Make sure your computer security software and settings are up to date before sending out resumés and job-related e-mail. Phishers and scammers look for job seekers to bait with fake job offers because they're receptive opening messages and clicking on links.

6. Make sure your contact at a company actually works there and watch for signs that something isn't right, like an e-mail address that's inconsistent with the company's Web site address.

7. Be wary of common job scams. Jobs that require you to cash checks for a company or open a bank account, known as "money mule scams," could leave you open to charges of money laundering.

The ITRC offers additional tips for avoiding identity theft while searching for a job at its Web site.

Views: 32

Comment

You need to be a member of Codetown to add comments!

Join Codetown

Happy 10th year, JCertif!

Notes

Welcome to Codetown!

Codetown is a social network. It's got blogs, forums, groups, personal pages and more! You might think of Codetown as a funky camper van with lots of compartments for your stuff and a great multimedia system, too! Best of all, Codetown has room for all of your friends.

When you create a profile for yourself you get a personal page automatically. That's where you can be creative and do your own thing. People who want to get to know you will click on your name or picture and…
Continue

Created by Michael Levin Dec 18, 2008 at 6:56pm. Last updated by Michael Levin May 4, 2018.

Looking for Jobs or Staff?

Check out the Codetown Jobs group.

 

Enjoy the site? Support Codetown with your donation.



InfoQ Reading List

Podcast: Building a Product-First Engineering Culture in the Age of AI

In this podcast, Shane Hastie, Lead Editor for Culture & Methods, spoke to Zach Lloyd about building a product-first engineering culture, and the critical importance of developers learning to effectively use AI tools while maintaining responsibility for code quality and understanding fundamental programming principles.

By Zach Lloyd

Presentation: Making Augmented Reality Accessible: A Case Study of Lens in Maps

Ohan Oda discusses making the Lens in Maps AR feature accessible to visually impaired users. He explains the motivations, ideation, and challenges faced, sharing valuable lessons on designing inclusive AR experiences and the impact on users, including his work on precision with AR.

By Ohan Oda

How to Build Secure Software without Sacrificing Productivity

Security can clash with development efficiency. Focusing on minimizing breach impact can be more effective than prevention. Dorota Parad argues for flexibility in compliance and collaborating with security teams to define practical protections. Limiting blast radius and using automation can boost security with minimal productivity loss.

By Ben Linders

Inaugural MCP Dev Summit Charts AI Integration's Future

Developers and contributors of the Model Context Protocol (MCP) converged in San Francisco in May 2025 for their first developer summit, charting the future of this rapidly adopted open standard to enable seamless integration between LLM applications and external data sources and tools. Discussions focused on a roadmap for MCP, including critical enterprise features.

By Hien Luu

Article: From Legacy to Value: Building Digital Banking Products Across Central and Eastern Europe

This article shares practical experiences and concrete examples from multi-site teams that built a single solution and delivered value to customers across various European markets. It provides real-life stories and lessons learned from developing two banking products, Lending and Foreign Exchange (FX), and their evolving architecture over time.

By Lejla Vulovic, Ana Nad

© 2025   Created by Michael Levin.   Powered by

Badges  |  Report an Issue  |  Terms of Service