Why to keep your identity safe
Predators are always looking to collect information about their ... victims. This information may be used to identify, connect with, or manipulate... For example, if a [you] blogs about being misunderstood, a predator might provide a sympathetic ear in order to create trust and form a relationship. Predators may also try to encourage [you] into a sexual relationship by talking about sex, so [you] should avoid talking about provocative subjects with people they do not know.
Cyberbullies take their targets’ personal information and use it against them. They may copy and alter photos; share private e-mail or instant message conversations; and taunt their victims with emotional insecurities revealed in blogs.
Scammers want to use [your] personal information to manipulate them. [If you] post e-mail addresses and phone numbers, [you] may be the target of spam, telemarketers, and e-mail scams.
College and Career
It is also becoming more common for coaches, college admissions officers, and employers to screen applicants by checking their online profiles and postings. An admissions officer’s decisions may be negatively influenced by a teen’s posts - for example, rude comments about teachers or inappropriate photos."