O'Reilly logo

The Smart Girl's Guide to Privacy by Violet Blue

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

3. You Got Hacked

“I don’t do damsel in distress very well. It’s hard for me to play a victim.”

—SCARLETT JOHANSSON

Contrary to sensationalist news stories, malicious hackers don’t always launch attacks to make a political statement or to get attention: most do it for the money. They want your phone number or other personal information because they can use it to steal your identity (among other ways of monetizing the data) and anything in an account that uses your phone number as a login or for security questions. In this chapter, I’ll explain why someone might steal your personal information, how to prevent that from happening, and what to do if it does happen to you.

Names, usernames, and other personally identifying information are worth money ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required