• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » scam » How to Avoid Identity Theft at the Airport

How to Avoid Identity Theft at the Airport

2019-12-14 by Michelle Dvorak

Identity Theft Airport

Four Ways to Protect Yourself from Identity Theft at an Airport

Help protect yourself from identity theft at an airport or during any trip by following some basic cyber security measures. Hackers take advantage of hurried and tired travelers in public spaces like airports, coffee shops, and hotels where it’s easy to attempt to steal data or money from hundreds or thousands of people as they pass by. Hackers have some tried-and-true methods of stealing data. A venue like an airport provides plenty of opportunity for hackers to get people’s sensitive data, credit card numbers, login credentials and possibly still actual hardware and putting laptops and phones.c

Can Identity Be Stolen from a Passport?

Losing your passport can lead to serious identity theft. Keep your passport in an RFID blocking wallet. Your passport contains a chip that is read when it is presented at a border. However, the chip can also be read by anyone else with a portable reader as you pass by them in the airport concourse. For under $30 travelers can protect passport data from being read by hackers with by using an RFID blocking passport wallet. They’re available for cheap on Amazon and some decent-looking styles. Keep your passport in the RFID blocking wallet at all times. I keep mine in the RFID wallet while I’m home and I use it every time I fly. You’ll have to remove your passport from the wallet to present it to a border patrol agent.

READ: 10 Cyber Security Tips for Business Travelers

Use ID Tags with Covers

Every piece of airplane baggage, whether it’s checked or carried-on, must have a name tag attached. This is an opportunity for scammers and hackers to glean quite a bit of information about you. Your baggage tag contains your name, address, phone number and possibly an email address usually in full view.

This is quite a bit of information about you. If the hacker manages to snap a quick photo of you and your baggage tag, they can easily steal your identity. This is preventable by getting a luggage tag that just has a flap over cover. Many bags already come with this kind of tag, but most don’t. Don’t expose your name and personal information and definitely not that of your children that are travelling with you.

READ: Will My VPN Work in Canada?

Don’t Use Airport WiFi

Airport WiFi, like all public shared WiFi connections, is not secure. Although it may be very tempting with long airport wait times and even worse, a delayed flight, to use the WiFi connection. Using public WiFi opens travelers up to being hacked by a scammer who is monitoring the same WiFi connection. The data sent across a public WiFi connection like that found in airports, hotels, coffee shops. and retail locations can easily be intercepted by a hacker.

Vacationers trying to contact loved ones with travel updates and business travelers in a hurry to reconnect with their office as soon as they land. However, using an airport WiFi connection is an easy way for a hacker to scam any of the information that sent across airport WiFi.

Identity Force
Identity Force

Although posting on social media may not seem like a cyber security risk. Posting to Instagram sends your username and login credentials across the internet connection. People often use the same login information across multiple accounts. So, if your Instagram uses the email address used for your banking app, the hacker already has half the information they need to steal your money.

Instead, use your own wireless data connection service from your wireless carrier. If you’re worried about data overages, use a virtual private network or VPN. A VPN is an app that encrypts all data transmitted from the device it’s installed on. If a hacker intercepts the data, it cannot be read.

Don’t Store Electronics in Checked Baggage

Don’t leave your valuable electronics in checked baggage. When you check in at an airport. Travelers generally are required to arrive anywhere from two to three hours before departure time depending on whether it’s a domestic or international flight.

Baggage is checked immediately and disappears while passengers head to security. In the meantime, the baggage is somewhere below the airport. Thieves have hours to rummage through checked bags and find valuable electronics that contain sensitive personal and financial information. Even if your laptop tablet or phone that you put in checked baggage doesn’t contain copies of your tax returns, it probably contains logins to email accounts, social media, and possibly banking apps.

People tend to use the same usernames and passwords across multiple accounts. Even something like the login credentials to your Facebook account can be used to gather a lot of personal information about someone. A hacker can use that to work their way into more critical accounts like credit cards and bank accounts.

webroot VPN

The same goes for using hotel valets and concierge services. Travelers should never leave valuable electronics or any kind of sensitive personal information in bags left with a hotel concierge or bellhop. Although most are honest, some are not.

It’s possible the bellhop could steal information off a laptop or tablet while it’s in storage. Bellhops often need to either deliver or retrieve someone else’s bags and that’s an opportunity for hacker or scammer to steal valuable laptops or the entire bag of itself. One time a friend of mine left her bag just a few feet behind her while she stepped forward to the hotel check-in desk. In just those few seconds, a thief walked calmly by, took her carry- on bag by the handle, by and quietly rolled it away. The theft was captured on a hotel security camera. However, the bag and her laptop that was inside, were never recovered.

Filed Under: scam Tagged With: identity theft, travel, tutorial

About Michelle Dvorak

Michelle writes about cyber security, data privacy focusing on social media privacy as well as how to protect your IoT devices. She has worked in internet technology for over 20 years and owns METRONY, LLC. Michelle earned a B.S. in Engineering from Rensselaer Polytechnic Institute. Michelle published a guide to Cyber Security for Business Travelers


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version