3. Danger on Your Computer and What to Do If You Are a Victim of Identity Theft

It is hard to remember what life was like without computers, smartphones, tablets and other electronic devices. Imagine life without Candy Crush. E-mail, online shopping, and surfing the Net are only three of the uses of electronic devices that we take for granted in our everyday lives. But as much as computers and smartphones have enriched our lives, they have also made us much more vulnerable to identity theft. The first step in reducing your vulnerability to identity theft through your computer and other electronic devices is learning where you are vulnerable. However, assessing your risk is not enough. Unfortunately, there is nothing you can do to guarantee that ...

Get Identity Theft Alert: 10 Rules You Must Follow to Protect Yourself from America’s #1 Crime now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.