{"id":25212,"date":"2025-08-01T06:56:50","date_gmt":"2025-08-01T14:56:50","guid":{"rendered":"https:\/\/www.spokeo.com\/compass\/?p=25212"},"modified":"2025-08-01T06:56:54","modified_gmt":"2025-08-01T14:56:54","slug":"what-is-shoulder-surfing","status":"publish","type":"post","link":"https:\/\/www.spokeo.com\/compass\/what-is-shoulder-surfing\/","title":{"rendered":"What is Shoulder Surfing? The Low-tech Identity Theft Threat You&#8217;re Overlooking"},"content":{"rendered":"\n<p>Humans are curious creatures, so it\u2019s easy to brush off a nosy stranger\u2019s glance in your direction. The problem is that a quick peek at your phone could be an innocent turn of the head, or it could be a scammer trying to <em>shoulder surf<\/em> your information.&nbsp;<\/p>\n\n\n\n<p>Here\u2019s what you need to know about shoulder surfing and how to stay safe from peeping thieves.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is Shoulder Surfing?&nbsp;<\/h2>\n\n\n\n<p>If you\u2019re like most people, <a href=\"https:\/\/www.spokeo.com\/compass\/what-different-generations-say-about-their-smartphone-usage\/\" target=\"_blank\" rel=\"noreferrer noopener\">you probably check your phone out of habit<\/a> more than you even realize. According to recent studies, on average, Americans check their phones 144 times a day and spend nearly <a href=\"https:\/\/www.pcmag.com\/news\/americans-check-their-phones-an-alarming-number-of-times-per-day\" target=\"_blank\" rel=\"noreferrer noopener\">4.5 hours a day<\/a> doing everything from sending emails, playing games, and scrolling social media to paying bills and scheduling important appointments. There\u2019s nothing inherently wrong with that, but doing so in public can open up opportunities for criminals to commit what is known as \u201cshoulder surfing.\u201d<\/p>\n\n\n\n<p>Shoulder surfing is a low-tech (or rather no-tech) method for thieves to steal private information from your phone or laptop screen, simply by looking over your shoulder in the hopes of catching a password, PIN, credit card number, or some other stealable bit of info as you enter it.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Why Criminals Do It<\/h3>\n\n\n\n<p>In a world full of online scams, viruses, and all other types of high-tech thievery, the reality is that shoulder surfing requires nothing but a pair of eyes and people whose guards are down in public. It\u2019s easy, it\u2019s accessible, and it\u2019s all about seizing opportunities.&nbsp;<\/p>\n\n\n\n<p>Next time you\u2019re out in public, whether it\u2019s at a coffee shop, restaurant, park, or honestly anywhere else, take a moment to look around and you\u2019ll notice a lot of screens in front of faces. While you see people going about their day on their phones and computers, criminals see opportunity, and there\u2019s no shortage of that for shoulder surfers.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Shoulder Surfing Works<\/h2>\n\n\n\n<p>While plenty of cybersecurity-busting techniques require a certain level of tech-savviness, shoulder surfing is about as simple as it gets. Criminals go to places where people are likely to spend time on their phones and laptops, and simply try to blend in while secretly looking around in hopes of catching some valuable information.<\/p>\n\n\n\n<p>Depending on what they\u2019re able to see, shoulder surfers can do a number of things, like:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Attempt to physically steal your device if they\u2019ve seen your passcode\/PIN.<\/li>\n\n\n\n<li>Memorize and use your credit card information if they see you enter it.<\/li>\n\n\n\n<li>Attempt to steal your debit card if they\u2019ve seen your ATM PIN.<\/li>\n\n\n\n<li>Use private information to steal your identity or commit other scams, like contacting <a href=\"https:\/\/www.spokeo.com\/compass\/worried-about-your-parents-best-identity-theft-protection-for-seniors\/\" target=\"_blank\" rel=\"noreferrer noopener\">older members of your family<\/a>, <a href=\"https:\/\/www.spokeo.com\/compass\/what-is-whaling-understanding-whaling-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">work associates<\/a>, or even <a href=\"https:\/\/www.spokeo.com\/compass\/social-media-identity-theft-victim-of-catfishing\/\" target=\"_blank\" rel=\"noreferrer noopener\">catfishing strangers<\/a>.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Technology-Assisted Shoulder Surfing<\/h3>\n\n\n\n<p>This isn\u2019t to say that shoulder surfing doesn\u2019t make use of technology when it\u2019s appropriate, however.\u00a0 The most obvious example is cell phone cameras, which can easily get good-quality close-ups of your screen and hands from across a room. Shoulder surfers don\u2019t actually need to see your fingers push the buttons \u2014 the button layout is already known, so they just need to see the motions of your hand.\u00a0 One engineer even demonstrated that a camera <a href=\"https:\/\/www.consumeraffairs.com\/news\/thermal-imaging-devices-can-steal-your-pins-and-passcodes-090214.html\" target=\"_blank\" rel=\"noreferrer noopener\">equipped with infrared sensors<\/a> can actually tell which buttons you pressed, and in which order.\u00a0<\/p>\n\n\n\n<p>Straying into fringe territory between shoulder surfing and full-on criminal surveillance, criminals can boost their shoulder surfing abilities with tiny microphones, cameras, and recording devices. A spy cam anywhere near the keypad on an ATM or debit machine could yield a rich harvest of PINs, for example.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"682\" src=\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-canvastudio-3194518.jpg?resize=1024%2C682&#038;ssl=1\" alt=\"working at a coffee shop can make you vulnerable to shoulder surfing criminals\" class=\"wp-image-28555\" srcset=\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-canvastudio-3194518.jpg?resize=1024%2C682&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-canvastudio-3194518.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-canvastudio-3194518.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-canvastudio-3194518.jpg?resize=1170%2C780&amp;ssl=1 1170w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-canvastudio-3194518.jpg?resize=585%2C390&amp;ssl=1 585w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-canvastudio-3194518.jpg?resize=263%2C175&amp;ssl=1 263w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-canvastudio-3194518.jpg?w=1280&amp;ssl=1 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">When and Where You\u2019re at Risk of Shoulder Surfing&nbsp;<\/h2>\n\n\n\n<p>Since most of us take our phones with us wherever we go, shoulder surfing can technically happen anywhere strangers are around. That said, there are a few places and situations where you should try to keep your head on a swivel and your screen safe from prying eyes.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Coffee shops\/coworking spaces:<\/strong> Post-COVID has resulted in a rise in people seeking out public places, like coffee shops or designated coworking spaces, to get some work done. It\u2019s a good option for those looking to liven up their work-from-home workdays, but it should be done with some level of caution. (Never work on confidential or sensitive documents while in public, for example!)<\/li>\n\n\n\n<li><strong>ATMs:<\/strong> Fewer people are carrying cash around these days, but ATMs still see plenty of action. While most of us try to shield our PINs from people around us, ATMs are a prime location for a <a href=\"https:\/\/www.spokeo.com\/compass\/how-to-find-hidden-cameras\/\" target=\"_blank\" rel=\"noreferrer noopener\">hidden camera<\/a>. If a criminal is able to get your ATM PIN and your debit card, some serious damage can be done.<\/li>\n\n\n\n<li><strong>Public Transportation:<\/strong> If you\u2019re someone who frequently uses the train or bus, you know the drill \u2014 sit down, pull your phone out, and go about your business until the ride is over. The problem is, public transport can get pretty crowded, meaning you might not notice the person next to you glancing at your phone. If you happen to be making a purchase, checking your bank statements, or doing something else involving private information, a shoulder surfer just might see what they\u2019re looking for.<\/li>\n\n\n\n<li><strong>Phone calls in public:<\/strong> We\u2019ve mostly talked about shoulder surfing as a visual observation scam, but auditory eavesdropping counts too. It\u2019s not all that rare to get a call from someone where private information might get brought up. If this happens, try and limit what you share and how many people can hear you. Better yet, wait until you\u2019re somewhere fully private.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">How to Protect Yourself From Shoulder Surfing&nbsp;<\/h2>\n\n\n\n<p>If everyone in sight is a potential shoulder surfer, how can you protect yourself?&nbsp; You can start with some simple, commonsense precautions:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>If you\u2019re using the PIN pad of an ATM or debit machine, <strong>shield it from view<\/strong> while you punch in your PIN.\u00a0<\/li>\n\n\n\n<li>When you\u2019re done at the ATM, <strong>make sure you\u2019ve actually completed your transaction<\/strong> and the screen isn\u2019t prompting another transaction.<\/li>\n\n\n\n<li>Use a tap-enabled card (or a phone-based payment app) so you don\u2019t need a PIN at all. In general, it\u2019s best to <strong>avoid using a debit card<\/strong> anywhere but the ATM\/bank.<\/li>\n\n\n\n<li><strong>Avoid logging into sensitive sites or apps<\/strong> (bank apps, credit card companies, etc.) in public places.\u00a0<\/li>\n\n\n\n<li>If you absolutely need to log into a sensitive site, <strong>sit or stand in a place where it\u2019s difficult for anyone to try to see your screen<\/strong> (and would be obvious if they do). Also, be mindful of windows or reflective surfaces behind you.\u00a0<\/li>\n\n\n\n<li><strong>Don\u2019t use public wi-fi<\/strong> to log into any sensitive site.\u00a0<\/li>\n\n\n\n<li>If you\u2019re in a public place, <strong>avoid making calls that will require you to give sensitive information<\/strong> verbally. When it\u2019s unavoidable, seek out a private spot \u2014 like a stairwell \u2014 where listeners couldn\u2019t follow you without it being obvious.\u00a0<\/li>\n\n\n\n<li><strong>Install a privacy screen protector<\/strong> that limits the angles your phone or computer screen can be seen.<\/li>\n\n\n\n<li><strong>Use biometric security<\/strong> to unlock your devices, such as fingerprints or facial recognition, so you don\u2019t have to enter your passwords\/PINs in public.<\/li>\n<\/ul>\n\n\n\n<p>These are all good habits you can easily do to limit the potential for becoming a victim of shoulder surfing. While you\u2019re developing those good habits, there are some more advanced steps you can take to protect yourself \u2014 and improve your overall digital security \u2014 as well, which we\u2019ll get into in the next section.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Improving Your Overall Security Practices<\/h2>\n\n\n\n<p>If you\u2019re willing to put a bit of effort into upgrading your overall approach to security, there are many other things you can do \u2014 some easy, some requiring a bit of tech know-how \u2014 to protect yourself.&nbsp; As a bonus, these will give you some protection against other threats as well, not just shoulder surfing:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Use a <\/strong><a href=\"https:\/\/www.spokeo.com\/compass\/1password-vs-bitwarden\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>password manager<\/strong><\/a> to store passwords for your sites and apps.\u00a0 Instead of typing in a password, it will simply autofill without showing the details, which gives snoops nothing to work with.\u00a0 As a bonus, this makes it easier to use <a href=\"https:\/\/www.spokeo.com\/compass\/how-to-create-a-secure-password-youll-actually-remember\/\" target=\"_blank\" rel=\"noreferrer noopener\">strong passwords<\/a> and have a different one for every site.\u00a0 If an attacker successfully steals a password, only one site or app will be compromised.\u00a0<\/li>\n\n\n\n<li>If you\u2019re tech-savvy, or if you frequently need to use random wi-fi hotspots for work purposes, <strong>consider using a VPN<\/strong> to shield your data.\u00a0 A <a href=\"https:\/\/www.spokeo.com\/compass\/will-using-a-vpn-improve-your-internet-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">VPN basically sets up a private connection<\/a> inside the public network, so your data\u2019s protected from public wi-fi\u2019s many vulnerabilities (you\u2019ll still need to be wary of anybody watching you enter keystrokes).\u00a0<\/li>\n\n\n\n<li><strong>Set up multi-factor authorization (MFA)<\/strong>, also sometimes known as two-factor authorization.\u00a0 It just means that anyone signing into your account needs to provide a second proof of identity.\u00a0 Most sites will text an authorization code to your phone, <a href=\"https:\/\/www.spokeo.com\/compass\/lessons-of-the-scam-that-fooled-andy-cohen\/\" target=\"_blank\" rel=\"noreferrer noopener\">but that\u2019s not as secure as you\u2019d think<\/a>.\u00a0<\/li>\n<\/ul>\n\n\n\n<p>Taking these extra steps requires a modest commitment of time and effort, but it can give you a lot of extra security in your online life.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Rest of the Picture<\/h2>\n\n\n\n<p>For most of us, there\u2019s no way around some amount of screentime or phone calls out in public, but with the right amount of vigilance, that shouldn\u2019t be a problem. However, even the most cautious of us can slip up or just unfortunately become a victim of scammers and thieves. So, while prevention is the first step to staying safe, recognizing the signs that your information has been compromised can be just as important when it comes to limiting damage.<\/p>\n\n\n\n<p>Start by educating yourself about some of the <a href=\"https:\/\/www.spokeo.com\/compass\/7-signs-of-identity-theft\/\" target=\"_blank\" rel=\"noreferrer noopener\">tell-tale signs<\/a> that your identity has been compromised, like inexplicable variations in your credit score or suspicious charges showing up on your bank and credit card statements.\u00a0 Those are always red flags.\u00a0 Keeping up to date on the latest scams by periodically reading the Better Business Bureau\u2019s Scam Tracker or the FTC\u2019s consumer scams page is also a good idea (or staying plugged into <a href=\"https:\/\/www.spokeo.com\/compass\/\" target=\"_blank\" rel=\"noreferrer noopener\">Spokeo\u2019s Compass blog<\/a>).\u00a0\u00a0<\/p>\n\n\n\n<p>There are few guarantees in life, and it\u2019s likely not possible to protect yourself completely.&nbsp; That being said, most criminals are looking for the easy mark, and the proverbial low-hanging fruit (if they wanted to work hard, they\u2019d have real jobs, right?).&nbsp; If you follow the steps given here, you can venture online \u2014 and to the coffee shop \u2014 confidently, knowing you\u2019ve removed yourself from the \u201ceasy mark\u201d category.<\/p>\n\n\n\n<p><em>Cyrus Grant is a writer from Southern California with a background in law and dispute resolution. When he isn\u2019t writing, he can be found deep-diving into the latest technology trends or simply spending time at the beach.<\/em><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Shoulder surfing is a low-tech way some criminals can steal your private information. Here\u2019s what you need to know.<\/p>\n","protected":false},"author":152,"featured_media":25213,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[810,614],"tags":[],"class_list":["post-25212","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-identity","category-safety"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Shoulder Surfing? Is Your Identity Really at Risk? | Spokeo<\/title>\n<meta name=\"description\" content=\"Shoulder surfing is a low-tech way some criminals can steal your private information. Here\u2019s what you need to know.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spokeo.com\/compass\/what-is-shoulder-surfing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Shoulder Surfing? Is Your Identity Really at Risk? | Spokeo\" \/>\n<meta property=\"og:description\" content=\"Shoulder surfing is a low-tech way some criminals can steal your private information. Here\u2019s what you need to know.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spokeo.com\/compass\/what-is-shoulder-surfing\/\" \/>\n<meta property=\"og:site_name\" content=\"The Compass Blog | Digital Identity and People Search | Spokeo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Spokeo\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-01T14:56:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-01T14:56:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.spokeo.com\/compass\/image\/ShoulderSurfing_1170x585.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1170\" \/>\n\t<meta property=\"og:image:height\" content=\"585\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cyrus Grant\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Spokeo\" \/>\n<meta name=\"twitter:site\" content=\"@Spokeo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cyrus Grant\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/what-is-shoulder-surfing\/\",\"url\":\"https:\/\/www.spokeo.com\/compass\/what-is-shoulder-surfing\/\",\"name\":\"What is Shoulder Surfing? Is Your Identity Really at Risk? | Spokeo\",\"isPartOf\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/what-is-shoulder-surfing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/what-is-shoulder-surfing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/ShoulderSurfing_1170x585.jpg?fit=1170%2C585&ssl=1\",\"datePublished\":\"2025-08-01T14:56:50+00:00\",\"dateModified\":\"2025-08-01T14:56:54+00:00\",\"author\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/50dd3a291caf9cdec084519560cb03b9\"},\"description\":\"Shoulder surfing is a low-tech way some criminals can steal your private information. Here\u2019s what you need to know.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.spokeo.com\/compass\/what-is-shoulder-surfing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/what-is-shoulder-surfing\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/ShoulderSurfing_1170x585.jpg?fit=1170%2C585&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/ShoulderSurfing_1170x585.jpg?fit=1170%2C585&ssl=1\",\"width\":1170,\"height\":585},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#website\",\"url\":\"https:\/\/www.spokeo.com\/compass\/\",\"name\":\"The Compass Blog | Digital Identity and People Search | Spokeo\",\"description\":\"The official Spokeo blog covers topics such as digital identity, consumer protection and privacy, how to avoid scams and catfishing, and more.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.spokeo.com\/compass\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/50dd3a291caf9cdec084519560cb03b9\",\"name\":\"Cyrus Grant\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e32ecc9ed7b8d37818763d645b1225412322bf356d410335172bd5b671dc1b02?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e32ecc9ed7b8d37818763d645b1225412322bf356d410335172bd5b671dc1b02?s=96&r=g\",\"caption\":\"Cyrus Grant\"},\"url\":\"https:\/\/www.spokeo.com\/compass\/author\/cgrant\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Shoulder Surfing? Is Your Identity Really at Risk? | Spokeo","description":"Shoulder surfing is a low-tech way some criminals can steal your private information. Here\u2019s what you need to know.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spokeo.com\/compass\/what-is-shoulder-surfing\/","og_locale":"en_US","og_type":"article","og_title":"What is Shoulder Surfing? Is Your Identity Really at Risk? | Spokeo","og_description":"Shoulder surfing is a low-tech way some criminals can steal your private information. Here\u2019s what you need to know.","og_url":"https:\/\/www.spokeo.com\/compass\/what-is-shoulder-surfing\/","og_site_name":"The Compass Blog | Digital Identity and People Search | Spokeo","article_publisher":"https:\/\/www.facebook.com\/Spokeo\/","article_published_time":"2025-08-01T14:56:50+00:00","article_modified_time":"2025-08-01T14:56:54+00:00","og_image":[{"width":1170,"height":585,"url":"https:\/\/www.spokeo.com\/compass\/image\/ShoulderSurfing_1170x585.jpg","type":"image\/jpeg"}],"author":"Cyrus Grant","twitter_card":"summary_large_image","twitter_creator":"@Spokeo","twitter_site":"@Spokeo","twitter_misc":{"Written by":"Cyrus Grant","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.spokeo.com\/compass\/what-is-shoulder-surfing\/","url":"https:\/\/www.spokeo.com\/compass\/what-is-shoulder-surfing\/","name":"What is Shoulder Surfing? Is Your Identity Really at Risk? | Spokeo","isPartOf":{"@id":"https:\/\/www.spokeo.com\/compass\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spokeo.com\/compass\/what-is-shoulder-surfing\/#primaryimage"},"image":{"@id":"https:\/\/www.spokeo.com\/compass\/what-is-shoulder-surfing\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/ShoulderSurfing_1170x585.jpg?fit=1170%2C585&ssl=1","datePublished":"2025-08-01T14:56:50+00:00","dateModified":"2025-08-01T14:56:54+00:00","author":{"@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/50dd3a291caf9cdec084519560cb03b9"},"description":"Shoulder surfing is a low-tech way some criminals can steal your private information. Here\u2019s what you need to know.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spokeo.com\/compass\/what-is-shoulder-surfing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/compass\/what-is-shoulder-surfing\/#primaryimage","url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/ShoulderSurfing_1170x585.jpg?fit=1170%2C585&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/ShoulderSurfing_1170x585.jpg?fit=1170%2C585&ssl=1","width":1170,"height":585},{"@type":"WebSite","@id":"https:\/\/www.spokeo.com\/compass\/#website","url":"https:\/\/www.spokeo.com\/compass\/","name":"The Compass Blog | Digital Identity and People Search | Spokeo","description":"The official Spokeo blog covers topics such as digital identity, consumer protection and privacy, how to avoid scams and catfishing, and more.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spokeo.com\/compass\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/50dd3a291caf9cdec084519560cb03b9","name":"Cyrus Grant","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e32ecc9ed7b8d37818763d645b1225412322bf356d410335172bd5b671dc1b02?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e32ecc9ed7b8d37818763d645b1225412322bf356d410335172bd5b671dc1b02?s=96&r=g","caption":"Cyrus Grant"},"url":"https:\/\/www.spokeo.com\/compass\/author\/cgrant\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/ShoulderSurfing_1170x585.jpg?fit=1170%2C585&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p8V62u-6yE","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/25212","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/users\/152"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/comments?post=25212"}],"version-history":[{"count":2,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/25212\/revisions"}],"predecessor-version":[{"id":28556,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/25212\/revisions\/28556"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/media\/25213"}],"wp:attachment":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/media?parent=25212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/categories?post=25212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/tags?post=25212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}