{"id":66653,"date":"2026-04-20T00:23:15","date_gmt":"2026-04-19T22:23:15","guid":{"rendered":"https:\/\/www.apfelpatient.de\/?p=66653"},"modified":"2026-04-20T00:25:06","modified_gmt":"2026-04-19T22:25:06","slug":"identity-theft-what-to-do-if-your-data-has-been-stolen","status":"publish","type":"post","link":"https:\/\/www.apfelpatient.de\/en\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen","title":{"rendered":"Identity theft: What to do if your Data has been stolen?"},"content":{"rendered":"<p class=\"has-drop-cap\"><strong>Invoices for orders you never placed. Payment reminders from services you don&#039;t recognize. Here&#039;s how to recognize identity theft and react appropriately.<\/strong><\/p>\n\n\n\n<p>One in three Germans has already been a victim of identity theft. The consequences range from unauthorized debits and forged contracts to debt collection demands and reputational damage. Criminals often need surprisingly little: a name, date of birth, and address are often enough to make purchases online on someone else&#039;s account. This article explains how identity theft works, how to recognize it, what to do in an emergency, and how to effectively protect yourself with your iPhone.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-wie-identitatsdiebstahl-funktioniert\">How identity theft works<\/h2>\n\n\n\n<p>Identity theft means that someone uses your personal information to impersonate you \u2013 and to enter into contracts, make purchases, or open accounts in your name. The stolen data comes from various sources.<\/p>\n\n\n\n<p>Data breaches involve hacking entire databases of online services, shops, or social networks. Millions of records containing email addresses, passwords, dates of birth, and addresses then end up on the dark web, where they are traded for just a few euros. Complete credit card data alone costs around 40 euros per record. As an individual, you can hardly protect yourself against such attacks on service providers \u2013 which makes unique passwords and two-factor authentication all the more important.<\/p>\n\n\n\n<p class=\"translation-block\"><a href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/how-to-recognize-phishing-7-warning-signs-and-protection-tips\" id=\"https:\/\/www.apfelpatient.de\/tipps-tricks\/phishing-erkennen-7-warnsignale-und-schutz-tipps\" data-wpel-link=\"internal\" target=\"_self\">Phishing<\/a>, <a href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/how-to-recognize-and-avoid-smishing-sms-fraud\" data-wpel-link=\"internal\" target=\"_self\">smishing<\/a>, and <a href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/recognizing-social-engineering-protection-against-manipulation\" data-wpel-link=\"internal\" target=\"_self\">social engineering<\/a> are targeted attacks in which fraudsters deceive you into revealing your data. A fake email from your bank, a text message with a supposed package tracking link, or a call from alleged Apple support \u2013 all these methods aim to steal login credentials, credit card information, or personal details.<\/p>\n\n\n\n<p>Publicly available information from social networks also provides fraudsters with valuable material. Name, date of birth, place of residence, employer, and marital status \u2013 much of this data is openly available on Facebook, Instagram, or LinkedIn and can be misused for identity fraud.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-woran-du-identitatsdiebstahl-erkennst\">How to recognize identity theft<\/h2>\n\n\n\n<p>Most victims only become aware of identity theft after the damage has already been done. Watch out for these warning signs:<\/p>\n\n\n\n<p>You receive invoices or payment reminders for orders you never placed. Your bank account shows debits you can&#039;t identify. You receive letters from debt collection agencies regarding outstanding debts you don&#039;t recognize. Your login for an online service suddenly stops working because someone changed your password. Friends ask if you sent them a message demanding money. You receive a confirmation email for registering with a service you never used. Your credit report contains entries you&#039;re unaware of.<\/p>\n\n\n\n<p>If any of these signals occur, act immediately \u2013 the faster you react, the less damage will be done.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-sofortmassnahmen-was-du-im-ernstfall-tun-musst\">Immediate action: What you need to do in an emergency<\/h2>\n\n\n\n<p class=\"translation-block\"><strong>Change passwords:<\/strong> Immediately change the passwords for all affected accounts\u2014and all accounts where you used the same or a similar password. Use the <a href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/create-and-manage-secure-passwords-on-apple-devices\" id=\"https:\/\/www.apfelpatient.de\/tipps-tricks\/sicheres-passwort-erstellen-verwalten-apple\" data-wpel-link=\"internal\" target=\"_self\">Passwords app<\/a> on your iPhone, which automatically generates strong, unique passwords.<\/p>\n\n\n\n<p class=\"translation-block\"><strong>Contact your bank:<\/strong> Inform your bank about the incident. Have any compromised cards blocked \u2013 you can reach the emergency blocking hotline at 116 116. Check your bank statements for unauthorized debits and dispute them in writing with your bank.<\/p>\n\n\n\n<p class=\"translation-block\"><strong>File a police report:<\/strong> Report the incident to the police \u2013 this can also be done via your state&#039;s online police station. The report is not only important for the investigation, but also serves as proof against debt collection agencies and creditors making unjustified demands.<\/p>\n\n\n\n<p class=\"translation-block\"><strong>Inform Schufa and other credit agencies:<\/strong> Report the identity theft to Schufa and other credit agencies. This will create a record that makes it more difficult to conclude further fraudulent contracts in your name. Check your Schufa report for unfamiliar entries and have any incorrect entries corrected.<\/p>\n\n\n\n<p class=\"translation-block\"><strong>Dispute unjustified demands:<\/strong> Object to invoices and payment reminders for orders you did not place in writing. Ask the issuer for proof of a valid contract and include a copy of your police report.<\/p>\n\n\n\n<p class=\"translation-block\"><strong>Inform affected services:<\/strong> Contact all online services where your data has been misused. Have unauthorized accounts blocked and also inform payment service providers such as PayPal or Klarna.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-prufen-ob-deine-daten-bereits-betroffen-sind\">Check if your data has already been affected<\/h2>\n\n\n\n<p>You don&#039;t have to wait until you receive payment reminders. There are free tools you can use to check if your email address or other personal data has appeared in a known data breach.<\/p>\n\n\n\n<p class=\"translation-block\">The Hasso Plattner Institute's Identity Leak Checker (<a href=\"https:\/\/sec.hpi.de\/ilc\/\" id=\"https:\/\/sec.hpi.de\/ilc\/\" target=\"_blank\" rel=\"noreferrer noopener\" data-wpel-link=\"external\">sec.hpi.de\/ilc<\/a>) is a German tool that checks your email address against known data breaches and informs you via email which data has been affected. The website Have I Been Pwned (<a href=\"https:\/\/haveibeenpwned.com\" id=\"https:\/\/haveibeenpwned.com\" target=\"_blank\" rel=\"noreferrer noopener\" data-wpel-link=\"external\">haveibeenpwned.com<\/a>) also offers an extensive database with billions of compromised records.<\/p>\n\n\n\n<p>Additionally, the Passwords app on your iPhone automatically checks whether your saved passwords have appeared in known data breaches. Open the app and tap &quot;Security&quot;\u2014compromised, reused, and weak passwords will be listed there, and you can change them directly.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-so-schutzt-du-dich-vor-identitatsdiebstahl\">How to protect yourself from identity theft<\/h2>\n\n\n\n<p>The best protection is prevention. The following measures significantly reduce the risk of identity theft.<\/p>\n\n\n\n<p class=\"translation-block\"><strong>Use a unique password for each service.<\/strong> If a service is hacked and your password is stolen, that password must not grant access to other accounts. The Passwords app automatically creates unique passwords and stores them securely.<\/p>\n\n\n\n<p class=\"translation-block\"><strong>Enable two-factor authentication everywhere.<\/strong> Even if a password is stolen, 2FA protects your account. The Passwords app can manage verification codes directly \u2013 no separate authenticator app required.<\/p>\n\n\n\n<p class=\"translation-block\"><strong>Be sparing with your personal data.<\/strong> Consider carefully before filling out any online form or registering whether you really need to provide all the information. Use a separate email address for newsletters and contests. Set your social media profiles to private and don&#039;t publish data such as your date of birth, address, or phone number publicly.<\/p>\n\n\n\n<p class=\"translation-block\"><strong>Use iCloud Private Relay.<\/strong> Private Relay masks your IP address when browsing with Safari, making it harder for third parties to track your online activity. Combined with rotating Wi-Fi addresses, this significantly reduces your digital footprint. You can find all the details in our article <a href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/using-public-wi-fi-safely-on-an-iphone\" data-wpel-link=\"internal\" target=\"_self\">Using Public Wi-Fi Securely<\/a>.<\/p>\n\n\n\n<p class=\"translation-block\"><strong>Secure your Apple Account.<\/strong> Your Apple Account is the key to iCloud, the App Store, and all your Apple services. Protect it with a strong password, two-factor authentication (2FA) enabled, and a <a href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/protect-your-apple-account-and-set-up-a-recovery-contact\" id=\"https:\/\/www.apfelpatient.de\/tipps-tricks\/apple-konto-schuetzen-wiederherstellungskontakt-einrichten\" data-wpel-link=\"internal\" target=\"_self\">recovery contact<\/a>. For maximum protection, you can enable Enhanced Privacy for iCloud, which secures your data with end-to-end encryption.<\/p>\n\n\n\n<p class=\"translation-block\"><strong>Pay attention to security warnings from your passwords app.<\/strong> Regularly check the &quot;Security&quot; section of your passwords app and immediately change any passwords marked as compromised.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-identitatsschutz-ist-eine-daueraufgabe\">Identity protection is an ongoing task<\/h2>\n\n\n\n<p class=\"translation-block\">Identity theft can&#039;t be prevented with a single measure \u2013 but the risk can be drastically reduced with the right habits. Use unique passwords, activate two-factor authentication everywhere, be careful with your personal data, and regularly check whether your email addresses have appeared in data breaches. Your iPhone already comes with powerful tools like the Passwords app, iCloud Private Relay, and enhanced privacy settings \u2013 you just need to use them consistently. The best products for you: Our <a href=\"https:\/\/www.amazon.de\/shop\/apfelpatientofficial\" target=\"_blank\" rel=\"noreferrer noopener follow\" data-wpel-link=\"exclude\">Amazon Storefront<\/a> offers a wide selection of accessories, including those for HomeKit. (Image: Shutterstock \/ K2L Family Stock)<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/recognizing-social-engineering-protection-against-manipulation\" type=\"link\" id=\"https:\/\/www.apfelpatient.de\/tipps-tricks\/social-engineering-erkennen-schutz-vor-manipulation\">Recognizing Social Engineering: How to Protect Yourself from Manipulation<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/ai-fraud-detection-deepfakes-fake-voices\">Detecting AI fraud: Deepfakes, fake voices and how to protect yourself<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/how-to-detect-and-avoid-qr-code-fraud\">Recognizing Quishing: How to protect yourself from QR code fraud<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/using-public-wi-fi-safely-on-an-iphone\">Use public Wi-Fi safely: How to protect your iPhone<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/show-iphone-hotspot-data-usage-per-device\">iOS 26.4: Show Hotspot Data usage per Device<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/how-to-recognize-and-avoid-smishing-sms-fraud\">Recognizing Smishing: How to protect yourself from SMS fraud<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/create-and-manage-secure-passwords-on-apple-devices\">Create and manage secure passwords: The Apple guide<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/whatsapp-account-hacked-fraud-protection\">WhatsApp hacked: How to protect your Account<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/how-to-recognize-phishing-7-warning-signs-and-protection-tips\">Recognizing Phishing: How to protect yourself from fraud<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/how-to-create-change-and-delete-an-apple-id\">Creating, Changing, and Deleting an Apple ID: The complete Overview<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/how-to-activate-call-forwarding-on-iphone-ios-26\">Activate iPhone Call forwarding: All Methods under iOS 26<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/iphone-vibrates-for-no-reason-heres-how-to-fix-it\">iPhone vibrates for no Reason: Causes and Solutions under iOS 26<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/airpods-connection-reset-instructions\">Connecting and resetting AirPods: Instructions for all Models<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/airdrop-not-working-solutions-for-ios-26\">AirDrop not working: All Solutions for iOS 26<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/iphone-loading-slowly-causes-and-solutions-ios-26\">iPhone loading slowly: Causes and Solutions under iOS 26<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/iphone-screen-recording-instructions-ios-26\">iPhone Screen Recording: Instructions for iOS 26<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/show-wi-fi-password-on-iphone-ios-26\">How to view your Wi-Fi Password on your iPhone: All Methods under iOS 26<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/iphone-update-problems-solutions-ios-26\">iPhone Update Problems: All Solutions for iOS 26<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/create-iphone-backup-icloud-computer-ios-26\">Creating an iPhone Backup: All methods under iOS 26<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/transferring-data-to-a-new-iphone-all-methods-ios-26\">Transferring Data to a new iPhone: All Methods under iOS 26<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-haufige-fragen-identitatsdiebstahl\">Frequently Asked Questions: Identity Theft<\/h2>\n\n\n\n<div class=\"schema-faq wp-block-yoast-faq-block\"><div class=\"schema-faq-section\" id=\"faq-question-1776107514405\"><strong class=\"schema-faq-question\">What is identity theft?<\/strong> <p class=\"schema-faq-answer\">Identity theft means that someone uses your personal information, such as your name, date of birth, address, or credit card number, to impersonate you. Criminals use this information to enter into contracts, make purchases on your account, or open accounts in your name.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1776107531700\"><strong class=\"schema-faq-question\">How can I tell if my identity has been stolen?<\/strong> <p class=\"schema-faq-answer\">Typical signs include invoices or payment reminders for orders you never placed, unknown debits from your account, mail from debt collection agencies, or confirmation emails for registrations with services you don&#039;t use. If your login to a service suddenly stops working, that can also be a warning sign.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1776107557471\"><strong class=\"schema-faq-question\">What should I do first if my data has been stolen?<\/strong> <p class=\"schema-faq-answer\">Immediately change all affected passwords, contact your bank, and have compromised cards blocked via the emergency card blocking hotline 116 116. File a police report and notify Schufa (Germany&#039;s largest credit bureau). Dispute any unjustified claims in writing and include a copy of your police report.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1776107579677\"><strong class=\"schema-faq-question\">How can I check if my data has ended up on the darknet?<\/strong> <p class=\"schema-faq-answer\">Use the Hasso Plattner Institute&#039;s Identity Leak Checker at sec.hpi.de\/ilc or the website haveibeenpwned.com. Both check for free whether your email address has appeared in known data breaches. Additionally, the Passwords app on your iPhone will show under &quot;Security&quot; whether any saved passwords have been compromised.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1776107594234\"><strong class=\"schema-faq-question\">Can I completely protect myself from identity theft?<\/strong> <p class=\"schema-faq-answer\">There is no such thing as 100% protection, as you can&#039;t prevent data leaks at service providers. However, you can drastically reduce the risk by using a unique password for each service, activating two-factor authentication everywhere, being careful with your personal data, and regularly checking whether your data has been compromised.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1776107607911\"><strong class=\"schema-faq-question\">Who is liable in case of identity theft \u2013 me or the fraudster?<\/strong> <p class=\"schema-faq-answer\">Generally, you are not liable for contracts that someone else has entered into in your name. However, you must prove to the creditor that you did not enter into the contract. Filing a police report is the most important form of proof. In some cases, a lawyer can help defend against unjustified claims.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1776107633338\"><strong class=\"schema-faq-question\">How does my iPhone help protect against identity theft?<\/strong> <p class=\"schema-faq-answer\">The Passwords app creates unique passwords, checks them against known data leaks, and manages two-factor authentication. iCloud Private Relay masks your IP address while browsing. Rotating Wi-Fi addresses prevent tracking on public networks. And Enhanced Privacy for iCloud secures your data with end-to-end encryption.<\/p> <\/div> <\/div>\n\n\n\n<h6 class=\"wp-block-heading translation-block\" id=\"h-kennt-ihr-schon-unsere-amazon-storefront-dort-findet-ihr-eine-handverlesene-auswahl-von-diversen-produkten-f-r-euer-iphone-und-co-viel-spa-beim-st-bern\"><em>Have you already visited our Amazon Storefront? There you&#039;ll find a hand-picked selection of various products for your iPhone and other devices \u2013 <span class=\"has-inline-color has-vivid-red-color\"><a href=\"https:\/\/www.amazon.de\/shop\/apfelpatientofficial\" class=\"ek-link\" data-wpel-link=\"exclude\" rel=\"follow noopener\" target=\"_self\"><span style=\"text-decoration: underline\" class=\"ek-underline\">enjoy browsing<\/span><\/a> !<\/span><\/em><\/h6>\n\n\n\n<h6 class=\"wp-block-heading translation-block\" id=\"h-der-beitrag-enthalt-partnerlinks\">This post contains <a data-type=\"URL\" data-id=\"https:\/\/www.apfelpatient.de\/partnerprogramm\" href=\"https:\/\/www.apfelpatient.de\/en\/partner-program\" data-wpel-link=\"internal\" target=\"_self\">affiliate links<\/a>.<\/h6>","protected":false},"excerpt":{"rendered":"<p>Recognizing identity theft and reacting correctly: warning signs, immediate measures, data leak check and protective measures for your iPhone.<\/p>","protected":false},"author":2,"featured_media":66652,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jnews-multi-image_gallery":[],"jnews_single_post":{"format":"standard","override":[{"template":"2","parallax":"1","fullscreen":"1","layout":"right-sidebar","sidebar":"default-sidebar","second_sidebar":"default-sidebar","sticky_sidebar":"1","share_position":"top","share_float_style":"share-monocrhome","show_featured":"1","show_post_meta":"1","show_post_author":"1","show_post_author_image":"1","show_post_date":"1","post_date_format":"default","post_date_format_custom":"Y\/m\/d","show_post_category":"1","show_post_reading_time":"0","post_reading_time_wpm":"300","post_calculate_word_method":"str_word_count","show_zoom_button":"0","zoom_button_out_step":"2","zoom_button_in_step":"3","show_post_tag":"1","show_prev_next_post":"1","show_popup_post":"1","show_comment_section":"1","number_popup_post":"1","show_author_box":"0","show_post_related":"0","show_inline_post_related":"0"}],"image_override":[{"single_post_thumbnail_size":"crop-500","single_post_gallery_size":"crop-500"}],"trending_post_position":"meta","trending_post_label":"Trending","sponsored_post_label":"Sponsored by","disable_ad":"0"},"jnews_primary_category":{"id":"16"},"footnotes":""},"categories":[16],"tags":[1327,3,13],"class_list":["post-66653","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tipps-tricks","tag-cybersecurity","tag-ios","tag-techpatient"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Identit\u00e4tsdiebstahl: Was tun und wie sch\u00fctzen? Apfelpatient<\/title>\n<meta name=\"description\" content=\"Identit\u00e4tsdiebstahl erkennen und richtig reagieren: Warnsignale, Sofortma\u00dfnahmen, Datenleck-Check und Schutzma\u00dfnahmen f\u00fcr dein iPhone.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/identity-theft-what-to-do-if-your-data-has-been-stolen\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Identit\u00e4tsdiebstahl: Was tun, wenn deine Daten gestohlen wurden?\" \/>\n<meta property=\"og:description\" content=\"Identit\u00e4tsdiebstahl erkennen und richtig reagieren: Warnsignale, Sofortma\u00dfnahmen, Datenleck-Check und Schutzma\u00dfnahmen f\u00fcr dein iPhone.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/identity-theft-what-to-do-if-your-data-has-been-stolen\" \/>\n<meta property=\"og:site_name\" content=\"Apfelpatient\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apfelpatientOfficial\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/apfelpatientOfficial\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-19T22:23:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-19T22:25:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2026\/04\/shutterstock_2660769931.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Milan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Identit\u00e4tsdiebstahl erkennen und richtig reagieren: Warnsignale, Sofortma\u00dfnahmen, Datenleck-Check und Schutzma\u00dfnahmen f\u00fcr dein iPhone.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Milan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen\"},\"author\":{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/#organization\",\"name\":\"Apfelpatient\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/\"},\"headline\":\"Identit\u00e4tsdiebstahl: Was tun, wenn deine Daten gestohlen wurden?\",\"datePublished\":\"2026-04-19T22:23:15+00:00\",\"dateModified\":\"2026-04-19T22:25:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen\"},\"wordCount\":1766,\"publisher\":{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/#organization\",\"name\":\"Apfelpatient\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apfelpatient.de\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/shutterstock_2660769931.jpg\",\"keywords\":[\"Cybersecurity\",\"iOS\",\"TechPatient\"],\"articleSection\":\"Tipps &amp; Tricks\",\"inLanguage\":\"en-US\",\"copyrightYear\":\"2026\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/#organization\"}},{\"@type\":[\"WebPage\",\"FAQPage\"],\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen\",\"name\":\"Identit\u00e4tsdiebstahl: Was tun und wie sch\u00fctzen? Apfelpatient\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apfelpatient.de\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/shutterstock_2660769931.jpg\",\"datePublished\":\"2026-04-19T22:23:15+00:00\",\"dateModified\":\"2026-04-19T22:25:06+00:00\",\"description\":\"Identit\u00e4tsdiebstahl erkennen und richtig reagieren: Warnsignale, Sofortma\u00dfnahmen, Datenleck-Check und Schutzma\u00dfnahmen f\u00fcr dein iPhone.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen#breadcrumb\"},\"mainEntity\":[{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107514405\"},{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107531700\"},{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107557471\"},{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107579677\"},{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107594234\"},{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107607911\"},{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107633338\"}],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen#primaryimage\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/shutterstock_2660769931.jpg\",\"contentUrl\":\"https:\\\/\\\/www.apfelpatient.de\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/shutterstock_2660769931.jpg\",\"width\":1600,\"height\":900,\"caption\":\"Bild: Shutterstock \\\/ K2L Family Stock\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.apfelpatient.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Identit\u00e4tsdiebstahl: Was tun, wenn deine Daten gestohlen wurden?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/#website\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/\",\"name\":\"Apfelpatient\",\"description\":\"Alles rund um Apple!\",\"publisher\":{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/#organization\",\"name\":\"Apfelpatient\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/\"},\"alternateName\":\"Apfelpatient\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apfelpatient.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/#\\\/schema\\\/person\\\/42c7891440704b11b0b6bba927ebf52c\",\"name\":\"Milan\",\"logo\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/#\\\/schema\\\/person\\\/image\\\/\"},\"description\":\"Hallo und herzlich willkommen auf meinem Technik-Blog! Als gro\u00dfer Apple-Fan berichte ich hier \u00fcber alles, was mit Apple zu tun hat: von den neuesten News und spannenden Ger\u00fcchten \u00fcber hilfreiche Tipps und Tricks bis hin zu ausf\u00fchrlichen Produkttests. Wenn du genauso technikbegeistert bist wie ich, bist du hier genau richtig!\",\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/apfelpatientOfficial\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/milan-jovicic-42aa0231b\"],\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/author\\\/apfeladmin\"},{\"@type\":\"Question\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107514405\",\"position\":1,\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107514405\",\"name\":\"Was ist Identit\u00e4tsdiebstahl?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Identit\u00e4tsdiebstahl bedeutet, dass jemand deine pers\u00f6nlichen Daten wie Name, Geburtsdatum, Adresse oder Kreditkartennummer nutzt, um sich als du auszugeben. Kriminelle schlie\u00dfen damit Vertr\u00e4ge ab, kaufen auf deine Rechnung ein oder er\u00f6ffnen Konten in deinem Namen.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107531700\",\"position\":2,\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107531700\",\"name\":\"Woran erkenne ich, dass meine Identit\u00e4t gestohlen wurde?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Typische Anzeichen sind Rechnungen oder Mahnungen f\u00fcr Bestellungen, die du nie aufgegeben hast, unbekannte Abbuchungen auf deinem Konto, Post von Inkassounternehmen oder Best\u00e4tigungsmails f\u00fcr Registrierungen bei Diensten, die du nicht nutzt. Auch wenn dein Login bei einem Dienst pl\u00f6tzlich nicht mehr funktioniert, kann das ein Hinweis sein.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107557471\",\"position\":3,\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107557471\",\"name\":\"Was muss ich als Erstes tun, wenn meine Daten gestohlen wurden?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"\u00c4ndere sofort alle betroffenen Passw\u00f6rter, kontaktiere deine Bank und lasse kompromittierte Karten \u00fcber den Sperr-Notruf 116 116 sperren. Erstatte Anzeige bei der Polizei und melde den Vorfall bei der Schufa. Widerspreche unberechtigten Forderungen schriftlich und f\u00fcge eine Kopie der Strafanzeige bei.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107579677\",\"position\":4,\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107579677\",\"name\":\"Wie kann ich pr\u00fcfen, ob meine Daten im Darknet gelandet sind?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Nutze den Identity Leak Checker des Hasso-Plattner-Instituts unter sec.hpi.de\\\/ilc oder die Website haveibeenpwned.com. Beide pr\u00fcfen kostenlos, ob deine E-Mail-Adresse in bekannten Datenlecks aufgetaucht ist. Zus\u00e4tzlich zeigt die Passw\u00f6rter-App auf deinem iPhone unter \u201eSicherheit\\\" an, ob gespeicherte Passw\u00f6rter kompromittiert wurden.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107594234\",\"position\":5,\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107594234\",\"name\":\"Kann ich mich vollst\u00e4ndig vor Identit\u00e4tsdiebstahl sch\u00fctzen?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Einen hundertprozentigen Schutz gibt es nicht, da du Datenlecks bei Dienstleistern nicht verhindern kannst. Du kannst das Risiko aber drastisch reduzieren, indem du f\u00fcr jeden Dienst ein eigenes Passwort verwendest, \u00fcberall die Zwei-Faktor-Authentifizierung aktivierst, sparsam mit pers\u00f6nlichen Daten umgehst und regelm\u00e4\u00dfig pr\u00fcfst, ob deine Daten betroffen sind.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107607911\",\"position\":6,\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107607911\",\"name\":\"Wer haftet bei Identit\u00e4tsdiebstahl \u2013 ich oder der Betr\u00fcger?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Grunds\u00e4tzlich haftest du nicht f\u00fcr Vertr\u00e4ge, die jemand anderes in deinem Namen abgeschlossen hat. Du musst dem Gl\u00e4ubiger aber nachweisen, dass du den Vertrag nicht geschlossen hast. Eine Strafanzeige bei der Polizei ist daf\u00fcr der wichtigste Nachweis. In manchen F\u00e4llen kann ein Anwalt helfen, unberechtigte Forderungen abzuwehren.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107633338\",\"position\":7,\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/tipps-tricks\\\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107633338\",\"name\":\"Wie hilft mein iPhone beim Schutz vor Identit\u00e4tsdiebstahl?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Die Passw\u00f6rter-App erstellt einzigartige Passw\u00f6rter, pr\u00fcft sie gegen bekannte Datenlecks und verwaltet Zwei-Faktor-Codes. iCloud Private Relay verschleiert deine IP-Adresse beim Surfen. Die rotierende WLAN-Adresse verhindert Tracking in \u00f6ffentlichen Netzwerken. Und der erweiterte Datenschutz f\u00fcr iCloud sichert deine Daten mit Ende-zu-Ende-Verschl\u00fcsselung.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Identity theft: What to do and how to protect yourself? Apfelpatient","description":"Recognizing identity theft and reacting correctly: warning signs, immediate measures, data leak check and protective measures for your iPhone.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/identity-theft-what-to-do-if-your-data-has-been-stolen","og_locale":"en_US","og_type":"article","og_title":"Identit\u00e4tsdiebstahl: Was tun, wenn deine Daten gestohlen wurden?","og_description":"Identit\u00e4tsdiebstahl erkennen und richtig reagieren: Warnsignale, Sofortma\u00dfnahmen, Datenleck-Check und Schutzma\u00dfnahmen f\u00fcr dein iPhone.","og_url":"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/identity-theft-what-to-do-if-your-data-has-been-stolen","og_site_name":"Apfelpatient","article_publisher":"https:\/\/www.facebook.com\/apfelpatientOfficial","article_author":"https:\/\/www.facebook.com\/apfelpatientOfficial","article_published_time":"2026-04-19T22:23:15+00:00","article_modified_time":"2026-04-19T22:25:06+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2026\/04\/shutterstock_2660769931.jpg","type":"image\/jpeg"}],"author":"Milan","twitter_card":"summary_large_image","twitter_description":"Identit\u00e4tsdiebstahl erkennen und richtig reagieren: Warnsignale, Sofortma\u00dfnahmen, Datenleck-Check und Schutzma\u00dfnahmen f\u00fcr dein iPhone.","twitter_misc":{"Written by":"Milan","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen#article","isPartOf":{"@id":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen"},"author":{"@type":"Organization","@id":"https:\/\/www.apfelpatient.de\/en\/#organization","name":"Apfelpatient","url":"https:\/\/www.apfelpatient.de\/en\/"},"headline":"Identit\u00e4tsdiebstahl: Was tun, wenn deine Daten gestohlen wurden?","datePublished":"2026-04-19T22:23:15+00:00","dateModified":"2026-04-19T22:25:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen"},"wordCount":1766,"publisher":{"@type":"Organization","@id":"https:\/\/www.apfelpatient.de\/en\/#organization","name":"Apfelpatient","url":"https:\/\/www.apfelpatient.de\/en\/"},"image":{"@id":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen#primaryimage"},"thumbnailUrl":"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2026\/04\/shutterstock_2660769931.jpg","keywords":["Cybersecurity","iOS","TechPatient"],"articleSection":"Tipps &amp; Tricks","inLanguage":"en-US","copyrightYear":"2026","copyrightHolder":{"@id":"https:\/\/www.apfelpatient.de\/en\/#organization"}},{"@type":["WebPage","FAQPage"],"@id":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen","url":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen","name":"Identity theft: What to do and how to protect yourself? Apfelpatient","isPartOf":{"@id":"https:\/\/www.apfelpatient.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen#primaryimage"},"image":{"@id":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen#primaryimage"},"thumbnailUrl":"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2026\/04\/shutterstock_2660769931.jpg","datePublished":"2026-04-19T22:23:15+00:00","dateModified":"2026-04-19T22:25:06+00:00","description":"Recognizing identity theft and reacting correctly: warning signs, immediate measures, data leak check and protective measures for your iPhone.","breadcrumb":{"@id":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen#breadcrumb"},"mainEntity":[{"@id":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107514405"},{"@id":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107531700"},{"@id":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107557471"},{"@id":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107579677"},{"@id":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107594234"},{"@id":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107607911"},{"@id":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107633338"}],"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen#primaryimage","url":"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2026\/04\/shutterstock_2660769931.jpg","contentUrl":"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2026\/04\/shutterstock_2660769931.jpg","width":1600,"height":900,"caption":"Bild: Shutterstock \/ K2L Family Stock"},{"@type":"BreadcrumbList","@id":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.apfelpatient.de\/"},{"@type":"ListItem","position":2,"name":"Identit\u00e4tsdiebstahl: Was tun, wenn deine Daten gestohlen wurden?"}]},{"@type":"WebSite","@id":"https:\/\/www.apfelpatient.de\/#website","url":"https:\/\/www.apfelpatient.de\/","name":"apple patient","description":"Everything about Apple!","publisher":{"@type":"Organization","@id":"https:\/\/www.apfelpatient.de\/en\/#organization","name":"Apfelpatient","url":"https:\/\/www.apfelpatient.de\/en\/"},"alternateName":"Apfelpatient","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apfelpatient.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.apfelpatient.de\/#\/schema\/person\/42c7891440704b11b0b6bba927ebf52c","name":"Milan","logo":{"@id":"https:\/\/www.apfelpatient.de\/#\/schema\/person\/image\/"},"description":"Hello and welcome to my technology blog! As a big Apple fan, I report on everything to do with Apple: from the latest news and exciting rumors to helpful tips and tricks and detailed product tests. If you are as enthusiastic about technology as I am, you have come to the right place!","sameAs":["https:\/\/www.facebook.com\/apfelpatientOfficial","https:\/\/www.linkedin.com\/in\/milan-jovicic-42aa0231b"],"url":"https:\/\/www.apfelpatient.de\/en\/author\/apfeladmin"},{"@type":"Question","@id":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107514405","position":1,"url":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107514405","name":"What is identity theft?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Identit\u00e4tsdiebstahl bedeutet, dass jemand deine pers\u00f6nlichen Daten wie Name, Geburtsdatum, Adresse oder Kreditkartennummer nutzt, um sich als du auszugeben. Kriminelle schlie\u00dfen damit Vertr\u00e4ge ab, kaufen auf deine Rechnung ein oder er\u00f6ffnen Konten in deinem Namen.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107531700","position":2,"url":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107531700","name":"How can I tell if my identity has been stolen?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Typische Anzeichen sind Rechnungen oder Mahnungen f\u00fcr Bestellungen, die du nie aufgegeben hast, unbekannte Abbuchungen auf deinem Konto, Post von Inkassounternehmen oder Best\u00e4tigungsmails f\u00fcr Registrierungen bei Diensten, die du nicht nutzt. Auch wenn dein Login bei einem Dienst pl\u00f6tzlich nicht mehr funktioniert, kann das ein Hinweis sein.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107557471","position":3,"url":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107557471","name":"What should I do first if my data has been stolen?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"\u00c4ndere sofort alle betroffenen Passw\u00f6rter, kontaktiere deine Bank und lasse kompromittierte Karten \u00fcber den Sperr-Notruf 116 116 sperren. Erstatte Anzeige bei der Polizei und melde den Vorfall bei der Schufa. Widerspreche unberechtigten Forderungen schriftlich und f\u00fcge eine Kopie der Strafanzeige bei.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107579677","position":4,"url":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107579677","name":"How can I check if my data has ended up on the darknet?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Nutze den Identity Leak Checker des Hasso-Plattner-Instituts unter sec.hpi.de\/ilc oder die Website haveibeenpwned.com. Beide pr\u00fcfen kostenlos, ob deine E-Mail-Adresse in bekannten Datenlecks aufgetaucht ist. Zus\u00e4tzlich zeigt die Passw\u00f6rter-App auf deinem iPhone unter \u201eSicherheit\" an, ob gespeicherte Passw\u00f6rter kompromittiert wurden.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107594234","position":5,"url":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107594234","name":"Can I completely protect myself from identity theft?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Einen hundertprozentigen Schutz gibt es nicht, da du Datenlecks bei Dienstleistern nicht verhindern kannst. Du kannst das Risiko aber drastisch reduzieren, indem du f\u00fcr jeden Dienst ein eigenes Passwort verwendest, \u00fcberall die Zwei-Faktor-Authentifizierung aktivierst, sparsam mit pers\u00f6nlichen Daten umgehst und regelm\u00e4\u00dfig pr\u00fcfst, ob deine Daten betroffen sind.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107607911","position":6,"url":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107607911","name":"Who is liable in case of identity theft \u2013 me or the fraudster?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Grunds\u00e4tzlich haftest du nicht f\u00fcr Vertr\u00e4ge, die jemand anderes in deinem Namen abgeschlossen hat. Du musst dem Gl\u00e4ubiger aber nachweisen, dass du den Vertrag nicht geschlossen hast. Eine Strafanzeige bei der Polizei ist daf\u00fcr der wichtigste Nachweis. In manchen F\u00e4llen kann ein Anwalt helfen, unberechtigte Forderungen abzuwehren.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107633338","position":7,"url":"https:\/\/www.apfelpatient.de\/tipps-tricks\/identitaetsdiebstahl-was-tun-daten-gestohlen#faq-question-1776107633338","name":"How does my iPhone help protect against identity theft?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Die Passw\u00f6rter-App erstellt einzigartige Passw\u00f6rter, pr\u00fcft sie gegen bekannte Datenlecks und verwaltet Zwei-Faktor-Codes. iCloud Private Relay verschleiert deine IP-Adresse beim Surfen. Die rotierende WLAN-Adresse verhindert Tracking in \u00f6ffentlichen Netzwerken. Und der erweiterte Datenschutz f\u00fcr iCloud sichert deine Daten mit Ende-zu-Ende-Verschl\u00fcsselung.","inLanguage":"en-US"},"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/posts\/66653","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/comments?post=66653"}],"version-history":[{"count":2,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/posts\/66653\/revisions"}],"predecessor-version":[{"id":66888,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/posts\/66653\/revisions\/66888"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/media\/66652"}],"wp:attachment":[{"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/media?parent=66653"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/categories?post=66653"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/tags?post=66653"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}