This eBook includes the following formats, accessible from your Account page after purchase:
EPUB The open industry format known for its reflowable content and usability on supported mobile devices.
MOBI The eBook format compatible with the Amazon Kindle and Amazon Kindle applications.
PDF The popular standard, used most often with the free Adobe® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
Also available in other formats.
Register your product to gain access to bonus material or receive a coupon.
Protect yourself from identity theft! Nearly 17 million Americans were victimized by identity theft in 2012 alone: for 13 straight years, it has been America's #1 consumer crime. No one is immune: children, the elderly and even the dead have been victimized. Identity theft can be high-tech, low-tech, or even no tech, via "dumpster diving." You're vulnerable, and you need to act.
Fortunately, you can take practical steps to safeguard your identity right now. In Identity Theft Alert, award-winning author and attorney Steve Weisman shows you exactly what to do, and how to do it. Equally important, he also tells you what to stop doing: the common, inadvertent behaviors that could be setting you up as a victim.
Weisman starts with a clear-eyed assessment of the problem, helping you understand just how much risk you face. Next, he helps you understand, anticipate, and prevent all these frightening forms of identity theft:
Don't be the next victim: read this book, follow its step-by-step advice, and protect yourself!
Chapter 1: Identity Theft 1
Chapter 2: Making Yourself Less Vulnerable to Identity Theft 23
Chapter 3: Danger on Your Computer and What to Do If You Are a Victim of Identity Theft 39
Chapter 4: Your Social Security Number--An Identity Thief’s Lucky Number 55
Chapter 5: Criminal Identity Theft, Taxes--And More Arresting Problems 65
Chapter 6: Protecting Your Privacy--A Key to Preventing Identity Theft 81
Chapter 7: Security Software 87
Chapter 8: The Dangers of Data Breaches 91
Chapter 9: Identity Theft After Death 105
Chapter 10: Identity Theft from Children 109
Chapter 11: Identity Theft Risks of Smartphones and Other Mobile Devices 115
Chapter 12: Identity Theft Threats with Credit Cards and Debit Cards 129
Chapter 13: Medical Identity Theft 139
Chapter 14: Identity Theft and Social Media 145
Chapter 15: Steve’s Rules 155
Chapter 16: Steve’s Top Ten Lists 161