Chapter 3. DANGER ON THE COMPUTER AND WHAT TO DO IF YOU ARE THE VICTIM OF IDENTITY THEFT

Sometimes it is hard to remember what life was like without personal computers. E-mail, shopping on line and surfing the net are only three of the uses of personal computers that are taken for granted in our everyday lives. But as much as computers have enriched our lives, they have also made us much more vulnerable to identity theft. The first step in reducing your vulnerability to identity theft through your computer is learning where you are vulnerable. However, assessing your risk is not enough. Unfortunately, there is nothing you can do to guarantee that you will not become a victim of identity theft, so it is also important to know what to do if you ...

Get 50 WAYS TO PROTECT YOUR IDENTITY AND YOUR CREDIT EVERYTHING YOU NEED TO KNOW ABOUT IDENTITY THEFT, CREDIT CARDS, CREDIT REPAIR, AND CREDIT REPORTS now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.