did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780789737939

The Truth about Identity Theft

by
  • ISBN13:

    9780789737939

  • ISBN10:

    0789737930

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2008-08-22
  • Publisher: Que Pub
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $18.99

Summary

An uncompromising look at identity theft from one of the most well-known security experts in the world!

Author Biography

Jim Stickley is CTO and Vice President of Strategic Operations at TraceSecurity Inc. He was one of the original founders of TraceSecurity and is a renowned security expert. He has been involved in thousands of security services for financial institutions, Fortune 100 corporations, health care facilities, legal firms, insurance companies, and government agencies. He has been a security consultant for numerous magazines and newspapers, and he has been featured in Time Magazine, Business Week, Fortune Magazine, New York Times, and many other industry-specific publications such as PC Magazine and Security Focus. He also has been showcased on NBC’s Nightly News, CNN’s NewsNight, several CNBC programs including The Big Idea and Business Nation and numerous times on NBC’s Today Show. He has physically breached the security of more than 1,000 facilities nationwide and had access to billions of dollars through stolen identities. When not on assignment, Jim continues to serve as a speaker and has delivered hundreds of speeches at security-related trade shows, conventions, seminars, and forums throughout the U.S. and other countries, covering topics ranging from identity theft to national cyberterrorism. Be sure to visit www.stickleyonsecurity.com for security tips and the latest alerts.

 

Table of Contents

Introductionp. ix
The Truth About Phishing and Vishingp. 1
Phishing scamsp. 1
Vishing attacksp. 5
Phishing via snail mailp. 9
Spear phishingp. 13
The Truth About Trashp. 17
One man's trash is another man's identityp. 17
Dumpster diving for profitp. 21
Your used computer is worth its weight in goldp. 25
The Truth About No-Tech Identity Theftp. 29
Pickpockets and purse snatchers still existp. 29
Home burglaries and identity theftp. 33
Walk right in and steal whatever you likep. 37
Social engineering tacticsp. 41
Wolves in sheep's clothingp. 45
The Truth About Just How Low Identity Thieves Will Gop. 49
No respect for their eldersp. 49
Are you paying the IRS or an identity thief?p. 53
What do you mean there's a warrant for my arrest?p. 57
Medical identity theftp. 61
Sweet 16 and already a victim!p. 65
Being dead doesn't protect you from identity theftp. 71
Fake credit card applicationsp. 75
An identity thief has a gift just for youp. 79
Gift card or gift horse?p. 83
That gift card might be worthlessp. 87
Fake charitiesp. 91
Bogus background checks and job applicationsp. 95
The Truth About Identity Theft in Plain Sightp. 99
Hotel business centers can be treacherousp. 99
Identity thieves can hear you now...p. 103
ATM scamsp. 107
Wireless access scamsp. 111
Credit card skimmingp. 115
The Truth About Online Consp. 119
PayPal scamsp. 119
Email scamsp. 123
Online shopping scamsp. 127
Fake e-card greetingsp. 131
The Truth About Security at Workp. 135
Rogue wireless access pointsp. 135
Corporate laptop securityp. 139
Does your small business have a bull's-eye on it?p. 143
The Truth About Identity Theft from Real Victimsp. 147
My own identity theft experiencep. 147
It all started with a phone callp. 151
The Truth About Putting a Stop to Identity Theftp. 155
Stopping thieves in their tracksp. 155
Installing proper identity theft protectionp. 159
When a free credit report isn't freep. 163
Getting your life back in orderp. 167
Somebody's watching mep. 173
Wireless security at homep. 177
Crack proofing your passwordsp. 181
Who you gonna call?p. 185
Acknowledgmentsp. 189
About the Authorp. 191
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Excerpts

Introduction IntroductionI have stolen credit cards, hacked social security numbers, robbed banks, and created fake ATMs. I have broken into armed government facilities and have stolen from teenagers. I am an identity thief, but I am no criminal.In the end, I have found there is little separation between attacking a corporation in New York City and targeting a housewife in Dover, Ohio.Fortunately for all victims involved, I was hired to perform these attacks by corporations testing their security, news agencies investigating security concerns, and other media outlets interested in knowing just how easy it is to commit identity theft. My job is to find security flaws before the real criminals find them.This book has been designed to give you the insight that most people experience only after becoming victims of identity theft. Each Truth walks you through a different type of attack, explaining the complete process in a simple and straightforward way.Like a magician actually revealing what happens behind the curtain, I take you through the attacks to reveal how people at home, work, and on the road become victims. I identify tips on how to protect yourself, your office, and your children from becoming the next identity theft statistics.Identity thieves can, and often do, use all the attacks against any type of target, regardless of whether they are after you in your home in the Midwest or if they are targeting you in your New York City office. While learning to think like an identity thief, you will begin to look at situations in an entirely new way. You might think twice about that preapproved credit card application that arrived in the mail, and you might keep a closer eye on that pest inspector who has spent just a little too much time walking around your office. Ultimately, this book opens your eyes to a world most people never knew existed.There is no doubt that I have had to walk a fine line when performing the attacks that I outline in this book. On one hand, I am hired by organizations to conduct these tests; on the other hand, I am stealing the confidential information of millions of unsuspecting individuals. In the end, the information I steal ends up being far more secure than before I touched it, and the lessons learned have benefited hundreds of thousands of others in their efforts to avoid being the next identity theft victims. Of course, there have been engagements that were flat-out illegal. In those cases, the proper authorities were notified ahead of time, and although the attacks were real and unrehearsed, I had my "get out of jail free" paperwork.In this day and age, what you don't know is exactly what can hurt you. Identity thieves are out there, and their success often comes from innocent mistakes made by others. Copyright Pearson Education. All rights reserved.

Rewards Program