The Locator -- [(subject = "Identity theft--United States")]

93 records matched your query       


Record 3 | Previous Record | MARC Display | Next Record | Search Results
Author:
Weisman, Steve.
Title:
Identity theft alert : 10 rules you must follow to protect yourself from America's #1 crime / Steve Weisman.
Publisher:
Pearson Education,
Copyright Date:
2014
Description:
xxvii, 174 pages ; 23 cm
Subject:
Identity theft--United States--Prevention.
Notes:
Includes index.
Contents:
1. Identity theft : Terrorism and identity theft ; Who are identity thieves? ; What do identity thieves do? ; College students and identity theft ; Malware and Macs ; Dumpster diving ; You are only as safe as the places that have your information ; They should know better ; Hackers ; Identity theft risk in old gaming consoles ; The drug connection ; Phishing ; Federal Express phishing scam ; Newegg phishing scam ; Former good advice ; More good advice to avoid becoming a victim of phishing ; The dangers of Aquaman ; Iron Man 3 ; Nude photos of Carla Bruni ; Debit card phishing scam ; Another debit card phishing scam ; Phishing with a large net ; Phishing around the world ; Spearphishing ; How do you know that you have become a victim of phishing? ; Reloading ; Identity theft through Internet phone calls ; What do Kim Kardashian and Michelle Obama have in common? ; USB sticks and identity theft ; Internet of things ; What you can do to prevent identity theft -- 2. Making yourself less vulnerable to identity theft : Online shopping credit card protection ; Updated web browsers ; SSL ; A primer on ATM identity theft ; Skimmers ; Dump memory grabber malware ; Federal warning ; ATM tips ; Mailboxes ; Mail tips ; Denver Bronco cheerleaders ; Identity theft threats on the road ; Hotel wi-fi ; More hotel tips ; Identity theft when giving to charities ; Job scams ; Danger where you never would expect it ; Shredding ; More steps to take to protect yourself from identity theft -- 3. Danger on your computer and what to do if you are a victim of identity theft : Spyware ; What can you do about spyware? ; It's not always good to share ; Botnets ; What to do if your e-mail is hacked and taken over by a botnet ; Celebrity malware ; Pornography and identity theft ; Keeping the family computer safe ; Help you just don't need ; Wi-fi, a convenience to worry about ; E-mail dangers ; E-cards ; Typos ; The company you keep ; We regret to inform you ; Lures ; Java danger ; Adobe ; A few ounces of protection: protecting yourself online from identity theft ; A pound of cure: what to do if you are a victim of identity theft -- 4. Your social security number: an identity thief's lucky number : Treasure-trove of social security numbers ; Biggest offender ; Social security identity theft threats in the military ; Social Security Number Protection Act of 2010 ; The good news and the bad news ; Unavoidable social security number disclosure ; Doing business online ; Social security numbers and college students ; My social security account ; Driver's license ; When and where must you provide your social security number? ; Restrictions on the use of social security numbers ; Workplace identity theft ; Higher education and identity theft --
5. Criminal identity theft, taxes, and more arresting problems : Criminal misidentification ; What should you do if you are the victim of criminal identity theft? ; Taxes and identity theft ; Identity theft and investments ; Jury duty ; Battling the companies with which you do business -- 6. Protecting your privacy: a key to preventing identity theft : Protecting your privacy on Facebook ; Protecting your privacy on Google ; Dangers of data gatherers ; Do not track ; Actions to take to increase your privacy -- 7. Security software -- 8. The dangers of data breaches : The black market ; Illegal profiting from credit card hacking ; Hacking is universal ; LinkedIn ; The lesson ; War driving in Washington ; Albert Gonzales ; Credit card processors ; Student loan information breach ; Wisconsin data breach ; Coca-Cola ; Colleges ; Retailers ; FBI warning ; Hotels ; Yahoo e-mail data breach ; Medical records ; Blame the employees ; Google dorking ; Homeland Security data breach ; Data breaches at small businesses ; Experian data breach ; Protecting yourself from identity theft due to hacking of a company or an agency with which you do business ; What to do if a company you do business with is hacked -- 9. Identity theft after death : Death master file and identity theft of children ; Contacting the credit-reporting agencies -- 10. Identity theft from children : Why would anyone want to steal the identity of a child? ; How do you protect your child from identity theft? ; Teach your children well ; RockYou ; Child identity theft and credit-repair companies ; Protecting your child's identity at school ; What to do if your child becomes a victim of identity theft ; What can the government do? -- 11. Identity theft risks of Smartphones and other mobile devices : Bluetooth risks ; Wi-fi ; 4G systems vulnerable ; SIM card danger ; Even paranoids have enemies ; Smartphone charging ; Pornography and Smartphones ; Dangerous apps ; WhatsApp ; More app scams ; So what should you do? ; Smishing ; News of the world hacking scandal ; Banking with your Smartphone or mobile device ; Tips for mobile banking ; Wuick response codes ; Reporting Smartphone theft ; Warning signs that your Smartphone has been hacked ; Getting rid of your old Smartphone --
12. Identity theft threats with credit cards and debit cards : Credit card liability ; Debit card liability ; Small charge on your credit card scam ; Debit card texting scam ; Mobile payment technology ; Credit card technology ; ATM scam ; Another similar scam ; Skimmers ; Credit card processing companies ; Make the matter even worse ; A little defense ; Disputing fraudulent charges on your credit card -- 13. Medical identity theft : Big problem ; How it happens ; Indications that you are a victim of medical identity theft ; What can you do to help prevent medical identity theft? ; What do you do if you are a victim of medical identity theft? -- 14. Identity theft and social media : What interests you? ; Facebook scams ; Facebook tips ; From Facebook to your bankbook ; Celebrities and Facebook ; Miley Cyrus sex video ; E-mails ; How do identity thieves steal your passwords? ; Twitter ; Twitter hacking ; Another Twitter scam ; Pinterest ; Tips for safe use of social networking -- 15. Steve's rules : Identity theft protection rules ; Rules to follow if you are a victim of identity theft -- 16. Steve's top ten lists : Steve's top ten things the government should be doing about identity theft ; Steve's top ten things business should be doing about identity theft ; Steve's top ten trends for the future of identity theft ; Steve's top ten things people should do to protect themselves from identity theft.
ISBN:
0133902528 (paperback)
9780133902525 (paperback) :
LCCN:
2014939199
Locations:
LTAX046 -- Indian Hills Community College Library - Centerville (Centerville)
BWPD851 -- Bertha Bartlett Public Library (Story City)

Initiate Another SILO Locator Search

This resource is supported by the Institute of Museum and Library Services under the provisions of the Library Services and Technology Act as administered by State Library of Iowa.