Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint

What You Can Do

We will begin by looking at what you can do to protect yourself from identity theft. Rather than simply list a number of actions you can take, we will examine each technique that identity thieves use and then look at the specific countermeasures for that technique. Then we will look at general defense measures that will apply to all forms of identity theft, and finally we will examine what you should do if you think you have been the victim of identity theft.

Phishing

As we have examined earlier, phishing is an attempt to get you to provide the perpetrator with personal information that can be used to steal your identity. Phishing uses spoofed e-mails and Web sites to try to lure the victim into divulging personal data. This is perhaps the most common way to perpetrate phishing. The good news is that it is also the easiest to defend against. It relies totally on you being willing to give up personal information. A little caution can help you avoid this.


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint