Book description
Protect yourself from identity theft! Nearly 17 million Americans were victimized by identity theft in 2012 alone: for 13 straight years, it has been America's #1 consumer crime. No one is immune: children, the elderly and even the dead have been victimized. Identity theft can be high-tech, low-tech, or even no tech, via "dumpster diving." You're vulnerable, and you need to act.
Fortunately, you can take practical steps to safeguard your identity right now. In Identity Theft Alert, award-winning author and attorney Steve Weisman shows you exactly what to do, and how to do it. Equally important, he also tells you what to stop doing: the common, inadvertent behaviors that could be setting you up as a victim.
Weisman starts with a clear-eyed assessment of the problem, helping you understand just how much risk you face. Next, he helps you understand, anticipate, and prevent all these frightening forms of identity theft:
Identity theft via Facebook and other social media
Identity theft via your iPhone or Android smartphone
Theft of your credit or debit cards, and other access to your finances
Crime sprees performed in your name
Medical identity theft that could lead to you getting the wrong treatment – and could even kill you
The fast-growing scourge of income tax identity theft, including stolen refunds
Don't be the next victim: read this book, follow its step-by-step advice, and protect yourself!
Table of contents
- About This eBook
- Title Page
- Copyright Page
- Praise for Identity Theft Alert
- Dedication Page
- Contents
- Acknowledgments
- About the Author
- Introduction
-
1. Identity Theft
- Terrorism and Identity Theft
- Who Are Identity Thieves?
- What Do Identity Thieves Do?
- College Students and Identity Theft
- Malware and Macs
- Dumpster Diving
- You Are Only As Safe As the Places That Have Your Information
- They Should Know Better
- Hackers
- Identity Theft Risk in Old Gaming Consoles
- The Drug Connection
- Phishing
- Federal Express Phishing Scam
- Newegg Phishing Scam
- Former Good Advice
- More Good Advice to Avoid Becoming a Victim of Phishing
- The Dangers of Aquaman
- Iron Man 3
- Nude Photos of Carla Bruni
- Debit Card Phishing Scam
- Another Debit Card Phishing Scam
- Phishing with a Large Net
- Phishing Around the World
- Spearphishing
- How Do You Know That You Have Become a Victim of Phishing?
- Reloading
- Identity Theft Through Internet Phone Calls
- What Do Kim Kardashian and Michelle Obama Have in Common?
- USB Sticks and Identity Theft
- Internet of Things
- What You Can Do to Prevent Identity Theft
-
2. Making Yourself Less Vulnerable to Identity Theft
- Online Shopping Credit Card Protection
- Updated Web Browsers
- SSL
- A Primer on ATM Identity Theft
- Skimmers
- Dump Memory Grabber Malware
- Federal Warning
- ATM Tips
- Mailboxes
- Mail Tips
- Denver Bronco Cheerleaders
- Identity Theft Threats on the Road
- Hotel Wi-Fi
- More Hotel Tips
- Identity Theft When Giving to Charities
- Job Scams
- Danger Where You Never Would Expect It
- Shredding
- More Steps to Take to Protect Yourself from Identity Theft
-
3. Danger on Your Computer and What to Do If You Are a Victim of Identity Theft
- Spyware
- What Can You Do About Spyware?
- It’s Not Always Good to Share
- Botnets
- What to Do If Your E-mail Is Hacked and Taken Over by a Botnet
- Celebrity Malware
- Pornography and Identity Theft
- Keeping the Family Computer Safe
- Help You Just Don’t Need
- Wi-Fi—A Convenience to Worry About
- E-mail Dangers
- E-Cards
- Typos
- The Company You Keep
- We Regret to Inform You
- Lures
- Java Danger
- Adobe
- A Few Ounces of Protection—Protecting Yourself Online from Identity Theft
- A Pound of Cure—What to Do If You Are a Victim of Identity Theft
-
4. Your Social Security Number—An Identity Thief’s Lucky Number
- Treasure-Trove of Social Security Numbers
- Biggest Offender
- Social Security Identity Theft Threats in the Military
- Social Security Number Protection Act of 2010
- The Good News and the Bad News
- Unavoidable Social Security Number Disclosure
- Doing Business Online
- Social Security Numbers and College Students
- My Social Security Account
- Driver’s License
- When and Where Must You Provide Your Social Security Number?
- Restrictions on the Use of Social Security Numbers
- Workplace Identity Theft
- Higher Education and Identity Theft
- 5. Criminal Identity Theft, Taxes—And More Arresting Problems
- 6. Protecting Your Privacy—A Key to Preventing Identity Theft
- 7. Security Software
-
8. The Dangers of Data Breaches
- The Black Market
- Illegal Profiting from Credit Card Hacking
- Hacking Is Universal
- The Lesson
- War Driving in Washington
- Albert Gonzales
- Credit Card Processors
- Student Loan Information Breach
- Wisconsin Data Breach
- Coca-Cola
- Colleges
- Retailers
- FBI Warning
- Hotels
- Yahoo E-mail Data Breach
- Medical Records
- Blame the Employees
- Google Dorking
- Homeland Security Data Breach
- Data Breaches at Small Businesses
- Experian Data Breach
- Protecting Yourself from Identity Theft Due to Hacking of a Company or an Agency with Which You Do Business
- What to Do If a Company You Do Business With Is Hacked
- 9. Identity Theft After Death
-
10. Identity Theft from Children
- Why Would Anyone Want to Steal the Identity of a Child?
- How Do You Protect Your Child from Identity Theft?
- Teach Your Children Well
- RockYou
- Child Identity Theft and Credit-Repair Companies
- Protecting Your Child’s Identity at School
- What to Do If Your Child Becomes a Victim of Identity Theft
- What Can the Government Do?
-
11. Identity Theft Risks of Smartphones and Other Mobile Devices
- Bluetooth Risks
- Wi-Fi
- 4G Systems Vulnerable
- SIM Card Danger
- Even Paranoids Have Enemies
- Smartphone Charging
- Pornography and Smartphones
- Dangerous Apps
- More App Scams
- So What Should You Do?
- Smishing
- News of the World Hacking Scandal
- Banking with Your Smartphone or Mobile Device
- Tips for Mobile Banking
- Quick Response Codes
- Reporting Smartphone Theft
- Warning Signs That Your Smartphone Has Been Hacked
- Getting Rid of Your Old Smartphone
-
12. Identity Theft Threats with Credit Cards and Debit Cards
- Credit Card Liability
- Debit Card Liability
- Small Charge on Your Credit Card Scam
- Debit Card Texting Scam
- Mobile Payment Technology
- Credit Card Technology
- ATM Scam
- Another Similar Scam
- Skimmers
- Credit Card Processing Companies
- Make the Matter Even Worse
- A Little Defense
- Disputing Fraudulent Charges on Your Credit Card
- 13. Medical Identity Theft
- 14. Identity Theft and Social Media
- 15. Steve’s Rules
- 16. Steve’s Top Ten Lists
- Index
- Technology, Business, and Government Fight Identity Theft
- Financial Privacy Please: The Gramm-Leach-Bliley Act
-
Credit Reports
- Big Business
- How the System Works
- What Is in Your Credit Report?
- Who Has a Right to See Your Credit Report?
- Who Should Not Have Access to Your Credit Report?
- How Do I Obtain My Credit Report?
- Reviewing Your Credit Report
- Credit Scoring
- The No-Longer-Secret Formula
- What’s Your Score?
- Your Credit Limit
- Timing Is Everything
- Credit History
- Credit Inquiries
- A Healthy Diet
- Retail Credit Cards
- No Good Deed Goes Unpunished
- Closed Accounts
- Canceling a Credit Card
- The Battle Against Aging
- How Do I Get My Credit Score?
- What Does It All Mean?
- Garbage In, Garbage Out
- Credit Reports and Identity Theft
- Credit Freezes
- Correcting Errors in Your Credit Report
- Blocking Erroneous Information on Your Credit Report
- Congress Deals with Credit Reports and Identity Theft: The Fair and Accurate Credit Transactions Act
- Identity Theft Insurance—Worth the Price?
- Identity Theft and the Elderly
-
Form Letters
- Letter to Company with Which You Do Business That Has Not Been Tainted by Identity Theft
- Letter to Credit-Reporting Agency Reporting Identity Theft
- Fair Credit Billing Act Letter
- Letter Requesting Removal of Credit Inquiry from Credit Report
- Letter Disputing Information Contained on Credit Report
- Follow-Up Letter to Credit-Reporting Agency
- Opt-Out Letter
- Letter to Bank to Close Account Following Identity Theft
- Letter to Check-Verification Company
- Letter Notifying Bank of Theft of ATM Card
- Letter Requesting an Extended Fraud Alert
- Letter Requesting Blocking of Information
- Letter to Credit-Reporting Agencies Requesting Truncation of Social Security Number
- Letter Canceling a Credit Card
- Second Letter Regarding Canceling of Credit Card
- Record of Identity Theft Communications
- Credit Bureaus—Report Fraud
- Banks, Credit Card Issuers, and Other Creditors
- Law Enforcement Authorities—Report Identity Theft
- Request for Fraudulent Transaction/Account Information Made Pursuant to Section 609(e) of the Fair Credit Reporting Act (15 U.S.C. § 1681(g))
- Sample Dispute Letter—For Existing Accounts
- Sample Dispute Letter—For New Accounts
- Important Links
Product information
- Title: Identity Theft Alert: 10 Rules You Must Follow to Protect Yourself from America’s #1 Crime
- Author(s):
- Release date: July 2014
- Publisher(s): Pearson
- ISBN: 9780133902587
You might also like
book
The Truth About Identity Theft
Praise for The Truth About Identity Theft “This book will open your eyes, scare you smart, …
book
The Truth About Identity Theft
This Element is an excerpt from The Truth About Avoiding Scams (9780132333856) by Steve Weisman. Available …
book
Preventing Identity Theft in Your Business
Preventing Identity Theft in Your Business is a reliable guide to help protect companies, their customers, …
book
A Comprehensive Look at Fraud Identification and Prevention
Fraudulent activity can approach you or your organization through a variety of avenues, ranging from the …