The Truth About Identity Theft (Truth About Series) [NOOK Book]

Overview

Pr>The Truth About Identity Theft

“This book will open your eyes, scare you smart, and make you think twice. Identity theft can happen to you and this book is a must read. Jim Stickley tells you why and how you need to protect yourself.”

Matt Lauer, Anchor, TODAY Show

"Nowadays, identity theft is an all-too-common occurrence that puts more than just your finances in jeopardy. Fortunately, Jim Stickley's easy-to-understand advice can teach ...

See more details below
The Truth About Identity Theft (Truth About Series)

Available on NOOK devices and apps  
  • NOOK Devices
  • Samsung Galaxy Tab 4 NOOK 7.0
  • Samsung Galaxy Tab 4 NOOK 10.1
  • NOOK HD Tablet
  • NOOK HD+ Tablet
  • NOOK eReaders
  • NOOK Color
  • NOOK Tablet
  • Tablet/Phone
  • NOOK for Windows 8 Tablet
  • NOOK for iOS
  • NOOK for Android
  • NOOK Kids for iPad
  • PC/Mac
  • NOOK for Windows 8
  • NOOK for PC
  • NOOK for Mac

Want a NOOK? Explore Now

NOOK Book (eBook)
$10.49
BN.com price
(Save 30%)$14.99 List Price

Overview

Pr>The Truth About Identity Theft

“This book will open your eyes, scare you smart, and make you think twice. Identity theft can happen to you and this book is a must read. Jim Stickley tells you why and how you need to protect yourself.”

Matt Lauer, Anchor, TODAY Show

"Nowadays, identity theft is an all-too-common occurrence that puts more than just your finances in jeopardy. Fortunately, Jim Stickley's easy-to-understand advice can teach you how to spot and stay ahead of security threats. In short, this book is a must read."

Wes Millar, Senior Vice President of CUNA Strategic Services

"In an age when identity theft will affect everyone sooner or later, this book is simply a must-read. Jim Stickley teaches you to spot the danger signs and offers smart solutions for everything from banking security and online shopping scams to medical identity theft. Whether it's you, your parents', or your kids' identities, everyone has something to protect. This book tells you what you need to know."

Jim Bell, Executive Producer, TODAY Show

"Jim Stickley shares his amazing experiences as a professional hacker in the most entertaining manner. He’s a great storyteller and captures your attention with his experiences, which will make you want to upscale your efforts protect your firm’s data and your own ID. Jim’s stories are fascinating. Most of us can’t imagine how simple it is for him to succeed as a conman in situations we think are safe. The trade secrets of hackers he shares with us are mind boggling! You won’t let your guard down after learning what Jim has actually done to get companies and individuals' private information. He’s the updated version of 'To Catch a Thief'[el]but he’s a good guy!"

Nancy E. Sheppard, President & CEO of Western Independent Bankers (A Trade Association of 350 Banks)

"If you’re not worried about identity theft, you should be[el]and Stickley tells you exactly why. His engaging writing style, coupled with real-life stories about identity theft and concrete actions to help you prevent identity theft are exactly what’s needed to make people take notice of this growing crime. I’ll recommend this book again and again!"

Jerri L. Ledford, About.com Guide to Identity Theft

Everything you must know to protect yourself and your business from identity thieves!

• The truth about real-world identity theft attacks

• The truth about how easy it is for thieves to make off with your identity

• The truth about stopping identity thieves in their tracks

Jim Stickley has stolen credit cards, hacked Social Security numbers, robbed banks, and created fake ATMs. He has broken into armed government facilities and has stolen from teenagers. He is an identity thief, but he is no criminal. Fortunately for all victims involved, Jim was hired to perform these attacks by corporations testing their security, news agencies investigating security concerns, and other media outlets interested in knowing just how easy it is to commit identity theft. His job is to find security flaws before the real criminals find them. This book has been designed to give you the insight that most people only experience after becoming victims of identity theft. Each Truth walks you through a different type of attack, explaining the complete process in a very simple and straight-forward way. Like a magician actually revealing what happens behind the curtain, Jim takes you through the attacks to reveal how people at home, work, and on the road become victims. Prepare yourself. What you read here might be disturbing, but you will never be truly safe from identity thieves until you learn to think like one.

Read More Show Less

Product Details

  • ISBN-13: 9780768686272
  • Publisher: Pearson Education
  • Publication date: 9/5/2008
  • Series: Truth About
  • Sold by: Barnes & Noble
  • Format: eBook
  • Edition number: 1
  • Pages: 208
  • File size: 285 KB

Meet the Author

Jim Stickley is CTO and Vice President of Strategic Operations at TraceSecurity Inc. He was one of the original founders of TraceSecurity and is a renowned security expert. He has been involved in thousands of security services for financial institutions, Fortune 100 corporations, health care facilities, legal firms, insurance companies, and government agencies. He has been a security consultant for numerous magazines and newspapers, and he has been featured in Time Magazine, Business Week, Fortune Magazine, New York Times, and many other industry-specific publications such as PC Magazine and Security Focus. He also has been showcased on NBC’s Nightly News, CNN’s NewsNight, several CNBC programs including The Big Idea and Business Nation and numerous times on NBC’s Today Show. He has physically breached the security of more than 1,000 facilities nationwide and had access to billions of dollars through stolen identities. When not on assignment, Jim continues to serve as a speaker and has delivered hundreds of speeches at security-related trade shows, conventions, seminars, and forums throughout the U.S. and other countries, covering topics ranging from identity theft to national cyberterrorism. Be sure to visit stickleyonsecurity.com for security tips and the latest alerts.

Read More Show Less

Read an Excerpt

IntroductionIntroduction

I have stolen credit cards, hacked social security numbers, robbed banks, and created fake ATMs. I have broken into armed government facilities and have stolen from teenagers. I am an identity thief, but I am no criminal.

In the end, I have found there is little separation between attacking a corporation in New York City and targeting a housewife in Dover, Ohio.

Fortunately for all victims involved, I was hired to perform these attacks by corporations testing their security, news agencies investigating security concerns, and other media outlets interested in knowing just how easy it is to commit identity theft. My job is to find security flaws before the real criminals find them.

This book has been designed to give you the insight that most people experience only after becoming victims of identity theft. Each Truth walks you through a different type of attack, explaining the complete process in a simple and straightforward way.

Like a magician actually revealing what happens behind the curtain, I take you through the attacks to reveal how people at home, work, and on the road become victims. I identify tips on how to protect yourself, your office, and your children from becoming the next identity theft statistics.

Identity thieves can, and often do, use all the attacks against any type of target, regardless of whether they are after you in your home in the Midwest or if they are targeting you in your New York City office. While learning to think like an identity thief, you will begin to look at situations in an entirely new way. You might think twice about that preapproved credit card application that arrived in the mail, and you mightkeep a closer eye on that pest inspector who has spent just a little too much time walking around your office. Ultimately, this book opens your eyes to a world most people never knew existed.

There is no doubt that I have had to walk a fine line when performing the attacks that I outline in this book. On one hand, I am hired by organizations to conduct these tests; on the other hand, I am stealing the confidential information of millions of unsuspecting individuals. In the end, the information I steal ends up being far more secure than before I touched it, and the lessons learned have benefited hundreds of thousands of others in their efforts to avoid being the next identity theft victims. Of course, there have been engagements that were flat-out illegal. In those cases, the proper authorities were notified ahead of time, and although the attacks were real and unrehearsed, I had my "get out of jail free" paperwork.

In this day and age, what you don't know is exactly what can hurt you. Identity thieves are out there, and their success often comes from innocent mistakes made by others.

© Copyright Pearson Education. All rights reserved.

Read More Show Less

Table of Contents

Introduction ix

Part I: The Truth About Phishing and Vishing 1

Truth 1 Phishing scams 1

Truth 2 Vishing attacks 5

Truth 3 Phishing via snail mail 9

Truth 4 Spear phishing 13

Part II: The Truth About Trash 17

Truth 5 One man’s trash is another man’s identity 17

Truth 6 Dumpster diving for profit 21

Truth 7 Your used computer is worth its weight in gold 25

Part III: The Truth About No-Tech Identity Theft 29

Truth 8 Pickpockets and purse snatchers still exist 29

Truth 9 Home burglaries and identity theft 33

Truth 10 Walk right in and steal whatever you like 37

Truth 11 Social engineering tactics 41

Truth 12 Wolves in sheep’s clothing 45

Part IV: The Truth About Just How Low Identity Thieves Will Go 49

Truth 13 No respect for their elders 49

Truth 14 Are you paying the IRS or an identity thief? 53

Truth 15 What do you mean there’s a warrant for my arrest? 57

Truth 16 Medical identity theft 61

Truth 17 Sweet 16 and already a victim! 65

Truth 18 Being dead doesn’t protect you from identity theft 71

Truth 19 Fake credit card applications 75

Truth 20 An identity thief has a gift just for you 79

Truth 21 Gift card or gift horse? 83

Truth 22 That gift card might be worthless 87

Truth 23 Fake charities 91

Truth 24 Bogus background checks and job applications 95

Part V: The Truth About Identity Theft in Plain Sight 99

Truth 25 Hotel business centers can be treacherous 99

Truth 26 Identity thieves can hear you now… 103

Truth 27 ATM scams 107

Truth 28 Wireless access scams 111

Truth 29 Credit card skimming 115

Part VI: The Truth About Online Cons 119

Truth 30 PayPal scams 119

Truth 31 Email scams 123

Truth 32 Online shopping scams 127

Truth 33 Fake e-card greetings 131

Part VII: The Truth About Security at Work 135

Truth 34 Rogue wireless access points 135

Truth 35 Corporate laptop security 139

Truth 36 Does your small business have a bull’s-eye on it? 143

Part VIII: The Truth About Identity Theft from Real Victims 147

Truth 37 My own identity theft experience 147

Truth 38 It all started with a phone call 151

Part IX: The Truth About Putting a Stop to Identity Theft 155

Truth 39 Stopping thieves in their tracks 155

Truth 40 Installing proper identity theft protection 159

Truth 41 When a free credit report isn’t free 163

Truth 42 Getting your life back in order 167

Truth 43 Somebody’s watching me 173

Truth 44 Wireless security at home 177

Truth 45 Crack proofing your passwords 181

Truth 46 Who you gonna call? 185

Acknowledgments 189

About the Author 191

Read More Show Less

Preface

Introduction

I have stolen credit cards, hacked social security numbers, robbed banks, and created fake ATMs. I have broken into armed government facilities and have stolen from teenagers. I am an identity thief, but I am no criminal.

In the end, I have found there is little separation between attacking a corporation in New York City and targeting a housewife in Dover, Ohio.

Fortunately for all victims involved, I was hired to perform these attacks by corporations testing their security, news agencies investigating security concerns, and other media outlets interested in knowing just how easy it is to commit identity theft. My job is to find security flaws before the real criminals find them.

This book has been designed to give you the insight that most people experience only after becoming victims of identity theft. Each Truth walks you through a different type of attack, explaining the complete process in a simple and straightforward way.

Like a magician actually revealing what happens behind the curtain, I take you through the attacks to reveal how people at home, work, and on the road become victims. I identify tips on how to protect yourself, your office, and your children from becoming the next identity theft statistics.

Identity thieves can, and often do, use all the attacks against any type of target, regardless of whether they are after you in your home in the Midwest or if they are targeting you in your New York City office. While learning to think like an identity thief, you will begin to look at situations in an entirely new way. You might think twice about that preapproved credit card application that arrived in the mail, and you might keep a closer eye on that pest inspector who has spent just a little too much time walking around your office. Ultimately, this book opens your eyes to a world most people never knew existed.

There is no doubt that I have had to walk a fine line when performing the attacks that I outline in this book. On one hand, I am hired by organizations to conduct these tests; on the other hand, I am stealing the confidential information of millions of unsuspecting individuals. In the end, the information I steal ends up being far more secure than before I touched it, and the lessons learned have benefited hundreds of thousands of others in their efforts to avoid being the next identity theft victims. Of course, there have been engagements that were flat-out illegal. In those cases, the proper authorities were notified ahead of time, and although the attacks were real and unrehearsed, I had my "get out of jail free" paperwork.

In this day and age, what you don't know is exactly what can hurt you. Identity thieves are out there, and their success often comes from innocent mistakes made by others.

© Copyright Pearson Education. All rights reserved.

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)