Dumpster Diving - Thieves look through garbage for any personal information
Lost or Stolen Items - Personal Identification is obtained by stealing wallets, mail, etc
Skimming - Capturing Credit or Debit card information at an ATM or collecting information through a device attached to the Swipe Machine
Phishing - Deceptive emails, pop-up messages or phone calls to gather personal information
Changing Your Address - thieves complete a change of address form in your name so they are receiving all mail items
Pretexting - using false pretenses to obtain personal information, usually claiming there is an issue with your actual banking information
On-Lookers - Obtaining personal information by looking over your shoulder at Checking, Debit, or Credit card terminals, or even at a publicly used computer
Pharming - Redirect website traffic to a bogus website
Unsecure Networks - Thieves gain network access by using home or work networks that are not secure with a login password or computers unprotected by Anti-virus or Spyware programs.
Keyloggers - software program that records the keystrokes entered on the PC on which it is installed and transmits a record to the person controlling the PC.
MalWare's Man-in-th-middle (MIM) - fraudster inserts themselves between the customer and the bank and hijacks the online session.