3. Danger on the Computer and What to Do If You Are the Victim of Identity Theft
Sometimes it is hard to remember what life was like without personal computers, smartphones, and iPads. Imagine life without Angry Birds. E-mail, shopping online, and surfing the Net are only three of the uses of personal computers that are taken for granted in our everyday lives. But as much as computers have enriched our lives, they have also made us much more vulnerable to identity theft. The first step in reducing your vulnerability to identity theft through your computer is learning where you are vulnerable. However, assessing your risk is not enough. Unfortunately, there is nothing you can do to guarantee that you will not become a victim of identity theft, ...
Get 50 Ways to Protect Your Identity in a Digital Age: New Financial Threats You Need to Know and How to Avoid Them, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.