Acquiring Personal Information

HOW DID A SCAMMER GET MY PERSONAL INFORMATION?

Some of the most convincing types of scams use a simple tactic to make their schemes sound more convincing: personalization. The inclusion of personal information about a scam’s target, be it their name, phone number, or even their home address, can make a phishing message seem much more convincing than if it did not include these details. This method of spear phishing is very effective, but it may lead you to ask a question: how did the scammer obtain this information? Read on to discover how scammers use social media, public records, databases, and phishing attacks to acquire your personal information.