O'Reilly logo

50 Ways to Protect Your Identity in a Digital Age: New Financial Threats You Need to Know and How to Avoid Them, Second Edition by Steve Weisman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

3. Danger on the Computer and What to Do If You Are the Victim of Identity Theft

Sometimes it is hard to remember what life was like without personal computers, smartphones, and iPads. Imagine life without Angry Birds. E-mail, shopping online, and surfing the Net are only three of the uses of personal computers that are taken for granted in our everyday lives. But as much as computers have enriched our lives, they have also made us much more vulnerable to identity theft. The first step in reducing your vulnerability to identity theft through your computer is learning where you are vulnerable. However, assessing your risk is not enough. Unfortunately, there is nothing you can do to guarantee that you will not become a victim of identity theft, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required