Spyware runs automatically without the user's knowledge and transmits vital information. Spyware can also record your keystrokes and one might end up revealing all usernames, passwords and other details to identity thieves. (Atlantic Publishing, 2008); (Schwabach, 2005)

Identity thieves have also found novel ways to steal and use identities. For instance, cyber criminals recently hacked Facebook, a popular social networking site, and changed a user's page asking people to help him. Even though the matter was resolved with the help of Facebook; the fact remains that identity theft can have far-reaching and diverse consequences. (Caroll, 2009) the damage caused by identity theft can take years to be rectified. The consequences of the fraudulent practices initiated by the identity thief can continue to reach the victim and credit companies long after the thief has been apprehended and the abuse of the victim's identity stopped. Therefore, consumers must take utmost precautions to...
[ View Full Essay]