Skip to content

50 Ways to Protect Your Identity in a Digital Age New Financial Threats You Need to Know and How to Avoid Them

Spend $50 to get a free DVD!

ISBN-10: 013308907X

ISBN-13: 9780133089073

Edition: 2nd 2013 (Revised)

Authors: Steve Weisman

List price: $25.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!


It is better to stop identity theft from happening in the first placy than have to fix or repair the situation afterwards. Steve Weisman reveals the threats of new identity theft attacks based on use of Facebook, iPad, iPhone, Android, cloud apps, iPod, and other new technologies -- and shows you how to protect yourself, or how to fix the damage if you've already been attacked! Discover why ID theft is more dangerous than ever, and discover today's most dangerous new threats -- including attacks targeting medical records, personal finance and online banking sites, the elderly, and military service members. Meet the hackers and organized crime groups who want to steal your identity and money…    
Customers also bought

Book details

List price: $25.99
Edition: 2nd
Copyright year: 2013
Publisher: FT Press
Publication date: 10/10/2012
Binding: Paperback
Pages: 320
Size: 5.75" wide x 9.25" long x 1.00" tall
Weight: 0.880
Language: English

Identity Theft
Making Yourself Less Vulnerable to Identity Theft
Danger on the Computer and What to Do If You Are the Victim of Identity Theft
Your Social Security Number--An Identity Thief's Lucky Number
Criminal Identity Theft, Taxes--And More Arresting Problems
Technology, Business, and Government Fight Identity Theft
Financial Privacy Please: The Gramm-Leach-Bliley Act
Credit Reports
Congress Deals with Credit Reports and Identity Theft: The Fair and Accurate Credit Transactions Act
Protecting Your Privacy--A Key to Preventing Identity Theft
ID Theft-Security Software
The Dangers of Data Breaches
Identity Theft Insurance--Worth the Price?
Identity Theft after Death
Identity Theft and the Elderly
Identity Theft from Children
Identity Theft Risks of Smartphones and Other Mobile Devices
Identity Theft Threats with Credit Cards and Debit Cards
Medical Identity Theft
Identity Theft and Social Media
Form Letters
Steve's Rules