SlideShare a Scribd company logo
1 of 104
Download to read offline
Presented by Acuant
a leading provider of identity solutions &
credential management
There are so many ways to get access to your private
information these days. Even corporate giants have been
hacked and had private information leaked.
After reading our list of 101 Ways Your Identity Can Be
Stolen, you may feel a little helpless and vulnerable. But by taking
correct security measures and monitoring your credit score and
financial accounts you should be able to identify any suspicious
activity before it can harm you.
1
Using your social
security number
to get insurance
2
Stealing identifying
information from
your license
3
Identity fraud for
property purchase
4
Creating a new
identity
5
Using a child’s
identity
6
Stealing from
your mailbox
7
Phishing emails
8
Nigerian letter
scheme, or 419
fraud
9
Telemarketing
calls
10
Sharing your
vacation pictures
while you’re
away
11
Sharing sensitive
information on
social media
12
Stolen cellular
phones
13
Using your debit
card for online
shopping
14
Going through
your trash
15
Changing your
mailing address
16
Illegally tapping
into your
computer
17
Having weak
wireless security
18
Using public
Wi-Fi
19
Weak
passwords
20
Keeping your
social security
card in your
wallet
21
Credit card
skimming
22
Responding to or
downloading
attachments from
spam
23
Never checking
your credit
24
Accessing fake
credit card sites
25
Going on fake
financial or utility
websites
26
ATM watchers
27
ATM overlays
28
Grocery store PIN
thieves
29
Downloading
torrents
30
Falling for “free”
offers, like
vacations, gifts,
and prizes
31
Soliciting credit
card information
by phone
32
Overusing your
SSN for medical
identification
33
Sharing of private
data on hacker
networks
34
Bulk gathering of
IDs via black
market
35
Failing to destroy
old hard drives and
computers
36
Stealing your
electricity
37
Job thieving
38
Social engineering
39
Vishing, or “voice
fishing”
40
Baiting by
pretexting
41
Man-in-the-middle
attack
42
Pharming
43
Malware-based
phishing
44
Corporate data
breaches
45
Keystroke logging
46
Rootkits
47
Scam texting
—SMiShing
48
Viruses and worms
49
False claims for
refunds from the
IRS
50
Passport thieves
51
Publicly listing
your hobbies,
memberships, and
employer
52
Driver’s license
theft
53
Using your
mother’s maiden
name
54
Defrauding banks
55
Impersonating
missing children
56
Fake being a
financial adviser
for the famous
57
Stealing the
identity of a
missing person
58
Faking one’s own
death
59
Synthetic identity
theft
60
Having a publicly
listed number
61
Keeping credit cards,
checks, and bank
statements in your
car
62
Not using a safe at
home
63
Not using a security
service
64
Not freezing your
credit card accounts
65
Leaving receipts
behind
66
Not writing “check ID
or license” on the
back of your cards
67
Failing to consider
one-off credit cards
68
Shopping on un-
trusted websites
69
Not having anti-virus
software on your PC
70
Using the same
passwords online
71
Never changing your
passwords
72
Logging into accounts
on public computers
73
Putting checks in the
mail
74
Leaving bills at your
mailbox for pick-up
75
Moving out
76
Not opting out of
credit card offers
77
Not using online
billing options
78
Using unsafe
mailboxes
79
Forgetting to check
links online
80
Accepting strange
friend requests
81
Not wiping your
phone
82
Using one email
account for
everything
83
Thinking Macs are
impenetrable
84
Storing credit card
information for later
use
85
Not using two-step
verification if
available
86
Not changing your
home locks and using
a “do not duplicate”
label on your keys
87
Not using a lock on
your phone or tablet
88
Using camera phones
89
Pickpocketing
90
Ordering
unauthorized
credit reports by
posing as a
landlord
91
RFID scanners
92
Using your place
of birth as a
security
question
93
Obtaining
information for
use as revenge or
blackmail
94
Stealing
information
from doctor’s
office
95
Filling out car
loan applications
96
Clicking on pop-
ups
97
Thieves going
through
pharmacy waste
baskets
98
Mortgage ID
theft
99
Opening cyber
greeting cards
100
Installing
electronic
surveillance
101
Payroll data
breach
We hope you enjoyed our comprehensive list,
and you're feeling a little safer knowing how you
can avoid these risky situations.
To read our full blog post, 101 Ways Your
Identity Can Be Stolen And Exploited, follow
the link below:
bit.ly/101idtheft

More Related Content

What's hot

PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharmingDawn Hicks
 
Identity Theft and Your SSN
Identity Theft and Your SSNIdentity Theft and Your SSN
Identity Theft and Your SSNGreg Ewers
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attackAariyaRathi
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfDigital EYE Media
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Securityanjuselina
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft PreventionOremDPS
 
Computer Crimes - Identity Theft
Computer Crimes - Identity TheftComputer Crimes - Identity Theft
Computer Crimes - Identity TheftJlove Minguez
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Barbara O'Neill
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft Rahmat Inggi
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraudRadiant Minds
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogQuicken Loans Zing Blog
 
Awareness of Sim Swap Attack
Awareness of Sim Swap AttackAwareness of Sim Swap Attack
Awareness of Sim Swap Attackijtsrd
 
Powerpoint Mini Project.Pdf
Powerpoint  Mini Project.PdfPowerpoint  Mini Project.Pdf
Powerpoint Mini Project.PdfSanea
 

What's hot (20)

You Can Fight Identity Theft
You Can Fight Identity TheftYou Can Fight Identity Theft
You Can Fight Identity Theft
 
PhishingandPharming
PhishingandPharmingPhishingandPharming
PhishingandPharming
 
Identity Theft and Your SSN
Identity Theft and Your SSNIdentity Theft and Your SSN
Identity Theft and Your SSN
 
What is a phishing attack
What is a phishing attackWhat is a phishing attack
What is a phishing attack
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
How Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect YourselfHow Credit Card Fraud Happens and How You Can Protect Yourself
How Credit Card Fraud Happens and How You Can Protect Yourself
 
Emp...err
Emp...errEmp...err
Emp...err
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
ID Theft Prevention
ID Theft PreventionID Theft Prevention
ID Theft Prevention
 
Computer Crimes - Identity Theft
Computer Crimes - Identity TheftComputer Crimes - Identity Theft
Computer Crimes - Identity Theft
 
Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14Common Consumer Frauds and How to Avoid Them-03-14
Common Consumer Frauds and How to Avoid Them-03-14
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
 
E business internet fraud
E business internet fraudE business internet fraud
E business internet fraud
 
Sim swapping
Sim swappingSim swapping
Sim swapping
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Awareness of Sim Swap Attack
Awareness of Sim Swap AttackAwareness of Sim Swap Attack
Awareness of Sim Swap Attack
 
Powerpoint Mini Project.Pdf
Powerpoint  Mini Project.PdfPowerpoint  Mini Project.Pdf
Powerpoint Mini Project.Pdf
 
Phishing
PhishingPhishing
Phishing
 
Phishing
PhishingPhishing
Phishing
 
Credit card fraud(1)
Credit card fraud(1)Credit card fraud(1)
Credit card fraud(1)
 

Similar to 101 Ways Your Identity Can Be Stolen

101 Ways Your Identity Can Be Stolen - Acuant #identitytheft
101 Ways Your Identity Can Be Stolen - Acuant #identitytheft101 Ways Your Identity Can Be Stolen - Acuant #identitytheft
101 Ways Your Identity Can Be Stolen - Acuant #identitytheftAcuant
 
Identity fraud
Identity fraudIdentity fraud
Identity fraudscamtools
 
How to prevent identity fraud
How to prevent identity fraudHow to prevent identity fraud
How to prevent identity fraudscamtools
 
Identity fraud
Identity fraudIdentity fraud
Identity fraudscamtools
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftDolf Dunn
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internetmohmd-kutbi
 
Holiday Season is Scam Season
Holiday Season is Scam SeasonHoliday Season is Scam Season
Holiday Season is Scam SeasonTom Huskerson
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada- Mark - Fullbright
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008FinancialCenter
 
Lloyds Bank fraud guidance
Lloyds Bank fraud guidanceLloyds Bank fraud guidance
Lloyds Bank fraud guidanceDavid Atkinson
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft PresentationLisa Sosebee
 
Protect Yourself Against Identity Theft
Protect Yourself Against Identity TheftProtect Yourself Against Identity Theft
Protect Yourself Against Identity Theftpmass
 

Similar to 101 Ways Your Identity Can Be Stolen (20)

101 Ways Your Identity Can Be Stolen - Acuant #identitytheft
101 Ways Your Identity Can Be Stolen - Acuant #identitytheft101 Ways Your Identity Can Be Stolen - Acuant #identitytheft
101 Ways Your Identity Can Be Stolen - Acuant #identitytheft
 
Credit card frauds
Credit card frauds Credit card frauds
Credit card frauds
 
Identity fraud
Identity fraudIdentity fraud
Identity fraud
 
How to prevent identity fraud
How to prevent identity fraudHow to prevent identity fraud
How to prevent identity fraud
 
Identity fraud
Identity fraudIdentity fraud
Identity fraud
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Identity Theft: The Other You
Identity Theft: The Other YouIdentity Theft: The Other You
Identity Theft: The Other You
 
Protecting Yourself Against Identity Theft
Protecting Yourself Against Identity TheftProtecting Yourself Against Identity Theft
Protecting Yourself Against Identity Theft
 
Identity theft in the internet
Identity theft in the internetIdentity theft in the internet
Identity theft in the internet
 
Phishing
PhishingPhishing
Phishing
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Holiday Season is Scam Season
Holiday Season is Scam SeasonHoliday Season is Scam Season
Holiday Season is Scam Season
 
Senior Protection Guide - Canada
Senior Protection Guide - CanadaSenior Protection Guide - Canada
Senior Protection Guide - Canada
 
Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008Avoiding Fraud and Identity Theft - October 2008
Avoiding Fraud and Identity Theft - October 2008
 
Identity Theft
Identity Theft Identity Theft
Identity Theft
 
Per.fin.7.03 p ptb
Per.fin.7.03 p ptbPer.fin.7.03 p ptb
Per.fin.7.03 p ptb
 
Lloyds Bank fraud guidance
Lloyds Bank fraud guidanceLloyds Bank fraud guidance
Lloyds Bank fraud guidance
 
Id Theft Presentation
Id Theft PresentationId Theft Presentation
Id Theft Presentation
 
Protect Yourself Against Identity Theft
Protect Yourself Against Identity TheftProtect Yourself Against Identity Theft
Protect Yourself Against Identity Theft
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 

101 Ways Your Identity Can Be Stolen