Millions of people around the world become victims of identity theft, online fraud, and phone scams every month.
And, the number of victims continues to increase. Don't become a statistic! Buy this book and learn how to protect yourself today.
This book, written by the creators of the popular hoax and scam debunking website Hoax-Slayer, explains in plain English how identity theft occurs and how you can avoid becoming a victim. It teaches you how to protect yourself from malware attacks, Internet scams, and phone based fraud. And, it outlines what to do if you suspect that you may already be a victim of identity theft or fraud.
- Do you know the six essential strategies for safe computing?
- Do you know how poor smartphone security can lead to identity theft?
- Do you know how scammers target people looking for love or work online?
- Do you know how to protect your information while shopping or banking on the Internet?
- Do you know how to help your elderly parents stay safe from scammers?
- Do you know how to recognise and deal with phone fraudsters?
After you read this book, you'll be able to answer "yes" to all of the above questions and many more.
About the Authors:
Brett Christensen has been writing about scams, hoaxes, and other computer security issues since he started the Hoax-Slayer website in 2003. Deborah Christensen has written other material under a pseudonym and also contributes to Hoax-Slayer. Hoax-Slayer is a global authority site on exposing scams and debunking hoaxes on the Internet
Chapter Headings:
Chapter 1: What This Book Is About
Chapter 2:Essential Strategies for Safe Computing
Chapter 3:The Ever Increasing Threat of Malware
Chapter 4:The Dangers of Peer-to-Peer File Sharing
Chapter 5:The Hidden Dangers of Spam
Chapter 6:The Secure Use Of Payment Cards Online
Chapter 7: How To Safely Enjoy Online Shopping
Chapter 8: Public Wi-Fi Security Risks
Chapter 9: The Threat Of Electronic Pickpocketing: Genuine Or Over-Hyped?
Chapter 10: Dumpster Diving: Can Your Trash Come Back To "Byte" You?
Chapter 11:Social Media: Protecting Your Personal Information
Chapter 12:Safe and Secure Emailing
Chapter 13: USB Drives: How A Tiny Device Can Cause Big Problems
Chapter 14: Why Safe Disposal Of Digital Devices Is Important
Chapter 15: What You Need To Know To Avoid Medical Identity Theft
Chapter 16: US Military: One Simple Step To Help Avoid Identity Theft
Chapter 17: Don't Let Scammers Ruin Your Travel Plans
Chapter 18: Recognizing Child Identity Theft
Chapter 19:Preventing Identity Theft Of A Deceased Loved One
Chapter 20:What College Students Need To Know About Identity Theft
Chapter 21:Protecting The Elderly Against Identity Theft
Chapter 22: Data Breaches: What to Do
Chapter 23:Recognizing & Avoiding Phishing Scams
Chapter 24: Recognizing & Avoiding Advance Fee Scams
Chapter 25: Recognizing & Avoiding Advance Fee Lottery Scams
Chapter 26: Dirty Money: Money Laundering Employment Scams
Chapter 27: Don't Be Fooled By Overpayment Scams
Chapter 28: Six Employment Scams To Watch Out For
Chapter 29: Looking for Love? Online Dating Scams
Chapter 30: How To Prevent Becoming A Victim Of Charity Fraud
Chapter 31:Secure Use Of Smartphones
Chapter 32: Phone Scams: It All Started With A Phone Call
Chapter 33: What To Do If You Believe You May Be A Victim Of Identity Theft
Chapter 34:Steps To Take If Your Driver's License Is Lost Or Stolen
Chapter 35: Steps To Take If Your Wallet Or Purse Is Lost Or Stolen
Chapter 36:Resources
Why not take charge of your own online security and buy this book right now?