Audiobook7 hours
Swiped: How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves
Written by Adam Levin
Rating: 4 out of 5 stars
4/5
()
About this audiobook
Increasingly, identity theft is a fact of life. We might once have hoped to protect ourselves from hackers with airtight passwords and aggressive spam folders, and those are good ideas as far as they go. But the truth is, there are people out there -- a lot of them -- who treat stealing your identity as a full-time job.
One such company is a nameless firm located in Russia, which has a trove of over a billion internet passwords. Another set up a website full of live streams of hacked web cameras, showing everything from people's offices and lobbies to the feeds from baby monitors. Even purchases made in person are still logged by retailers like Target, who are famously vulnerable to hackers.
Adam Levin, a longtime consumer advocate and identity fraud expert, is your guide to this brave new world. By telling memorable stories and extracting the relevant lessons, he offers a strategy for dealing with these risks. You may not be able to prevent identity theft, but you certainly shouldn't wait until it happens to take action. Levin's approach is defined by the three M's: minimizing risk, monitoring your identity, and managing the damage. The book is also organized around the different problems caused by identity theft: financial, criminal, medical, familial, etc., enabling readers to dip into the sections most relevant to them.
Swiped is a practical, lively audiobook that is essential to surviving the ever-changing world of online security. It is invaluable not only for preventing problems but helping cope when they arrive.
One such company is a nameless firm located in Russia, which has a trove of over a billion internet passwords. Another set up a website full of live streams of hacked web cameras, showing everything from people's offices and lobbies to the feeds from baby monitors. Even purchases made in person are still logged by retailers like Target, who are famously vulnerable to hackers.
Adam Levin, a longtime consumer advocate and identity fraud expert, is your guide to this brave new world. By telling memorable stories and extracting the relevant lessons, he offers a strategy for dealing with these risks. You may not be able to prevent identity theft, but you certainly shouldn't wait until it happens to take action. Levin's approach is defined by the three M's: minimizing risk, monitoring your identity, and managing the damage. The book is also organized around the different problems caused by identity theft: financial, criminal, medical, familial, etc., enabling readers to dip into the sections most relevant to them.
Swiped is a practical, lively audiobook that is essential to surviving the ever-changing world of online security. It is invaluable not only for preventing problems but helping cope when they arrive.
Related to Swiped
Related audiobooks
Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Rating: 4 out of 5 stars4/5The Secret Life: Three True Stories of the Digital Age Rating: 3 out of 5 stars3/5Breaking and Entering: The Extraordinary Story of a Hacker Called "Alien" Rating: 4 out of 5 stars4/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5Liars and Outliers: Enabling the Trust that Society Needs to Thrive Rating: 4 out of 5 stars4/5Hype: How Scammers, Grifters, and Con Artists Are Taking Over the Internet—and Why We're Following Rating: 4 out of 5 stars4/5The Dark Net: Inside the Digital Underworld Rating: 4 out of 5 stars4/5The Players Ball: A Genius, a Con Man, and the Secret History of the Internet's Rise Rating: 4 out of 5 stars4/5Spies, Lies, and Algorithms: The History and Future of American Intelligence Rating: 5 out of 5 stars5/5Protecting Your Internet Identity: Are You Naked Online? Rating: 0 out of 5 stars0 ratingsThe Darkest Web: Drugs, Death and Destroyed Lives . . . the Inside Story of the Internet's Evil Twin Rating: 4 out of 5 stars4/5Rogue Code: A Jeff Aiken Novel Rating: 4 out of 5 stars4/5Snowden's Box: Trust in the Age of Surveillance Rating: 4 out of 5 stars4/5Murder on the Dark Web: True Tales From the Dark Side of the Internet Rating: 4 out of 5 stars4/5A Vulnerable System: The History of Information Security in the Computer Age Rating: 5 out of 5 stars5/5Obfuscation: A User's Guide for Privacy and Protest Rating: 4 out of 5 stars4/5Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity Rating: 5 out of 5 stars5/5Radical Technologies: The Design of Everyday Life Rating: 4 out of 5 stars4/5Once a Bitcoin Miner: Scandal and Turmoil in the Cryptocurrency Wild West Rating: 2 out of 5 stars2/5How to Disappear: Erase Your Digital Footprint, Leave False Trails, and Vanish Without a Trace Rating: 4 out of 5 stars4/5Worm: The First Digital World War Rating: 4 out of 5 stars4/5Spam Nation: The Inside Story of Organized Cybercrime—from Global Epidemic to Your Front Door Rating: 4 out of 5 stars4/5The World's Most Dangerous Geek: And More True Hacking Stories Rating: 4 out of 5 stars4/5Kidnap: Inside the Ransom Business Rating: 0 out of 5 stars0 ratingsFlawless: Inside the Largest Diamond Heist in History Rating: 4 out of 5 stars4/5Pinpoint: How GPS Is Changing Technology, Culture, and Our Minds Rating: 3 out of 5 stars3/5The Art of Attack: Attacker Mindset for Security Professionals Rating: 5 out of 5 stars5/5
Marketing For You
Building a StoryBrand: Clarify Your Message So Customers Will Listen Rating: 5 out of 5 stars5/5The Predictably Irrational Rating: 4 out of 5 stars4/5Purple Cow: Transform Your Business by Being Remarkable Rating: 5 out of 5 stars5/5The Catalyst: How to Change Anyone's Mind Rating: 5 out of 5 stars5/5Influence, New and Expanded: The Psychology of Persuasion Rating: 4 out of 5 stars4/5Easy Money: Cryptocurrency, Casino Capitalism, and the Golden Age of Fraud Rating: 4 out of 5 stars4/5Summary: Traction: Get a Grip on Your Business: by Gino Wickman: Key Takeaways, Summary, and Analysis Rating: 5 out of 5 stars5/5Contagious: Why Things Catch On Rating: 4 out of 5 stars4/5Pre-Suasion: Channeling Attention for Change Rating: 5 out of 5 stars5/5The One Week Marketing Plan: The Set It & Forget It Approach for Quickly Growing Your Business Rating: 4 out of 5 stars4/5Traction: How Any Startup Can Achieve Explosive Customer Growth Rating: 5 out of 5 stars5/5Alchemy: The Dark Art and Curious Science of Creating Magic in Brands, Business, and Life Rating: 4 out of 5 stars4/5How Are You, Really?: Living Your Truth One Answer at a Time Rating: 5 out of 5 stars5/5Growth Hacker Marketing: A Primer on the Future of PR, Marketing, and Advertising: Revised and Expanded Rating: 4 out of 5 stars4/5The Tipping Point by Malcolm Gladwell - Book Summary: How Little Things Can Make a Big Difference Rating: 4 out of 5 stars4/5Blue Ocean Strategy: How to Create Uncontested Market Space and Make the Competition Irrelevant Rating: 4 out of 5 stars4/5Invisible Influence: The Hidden Forces that Shape Behavior Rating: 4 out of 5 stars4/5Wanting: The Power of Mimetic Desire in Everyday Life Rating: 5 out of 5 stars5/5Marketing Made Simple: A Step-by-Step StoryBrand Guide for Any Business Rating: 5 out of 5 stars5/5Expert Secrets: The Underground Playbook for Creating a Mass Movement of People Who Will Pay for Your Advice Rating: 5 out of 5 stars5/5The Freedom Shortcut Rating: 5 out of 5 stars5/5Jab, Jab, Jab, Right Hook: How to Tell Your Story in a Noisy Social World Rating: 5 out of 5 stars5/5The Consuming Instinct: What Juicy Burgers, Ferraris, Pornography, and Gift Giving Reveal About Human Nature Rating: 4 out of 5 stars4/5
Reviews for Swiped
Rating: 3.8 out of 5 stars
4/5
10 ratings2 reviews
- Rating: 4 out of 5 stars4/5The reader will come away more aware of scams that are possibly related their kids SS info, medical fraud and even IRS fraud. All possible based on a system that offer its citizens protection or privacy. Companies invest the bare minimum on such safeguards and have no intention of changing their practices. The specific frauds are detailed at the back of the book. I couldnt follow them easily, but an interested user could replay the content to grasp the elements of each scam.
- Rating: 4 out of 5 stars4/5The question is not if, but when, identity theft happens to you. This book gives the details.Everyone has read about the major data breaches of recent years, exposing the personal information of hundreds of millions of people. The bad people in this world have come up with new ways to scam the public. A letter or phone call may come from a debt collector saying that, for instance, a credit card has been opened in the name of a deceased family member, or a newborn baby (Pay Up Now). It's possible that the debt collector, and the bill, are not even legitimate, and they are simply trying to intimidate you into paying.Hackers have been known to file fake tax returns, using your Social Security number. When you file your return, and are looking for your refund, the IRS will say "we already gave you your refund." If a hacker gets your medical history, using the information to open a credit card, for instance, or giving your name to the police after they have been arrested, is not the worst that can happen. They can also, for instance, delete your allergy to penicillin, or give you HIV, which is much worse.What can a person do about it? In this day and age, anyone who still uses "password" or "1234" as their computer password is just asking to be hacked. Change your passwords often. Check your bank statement and credit card statement online many times per month; don't wait for the paper statement. If anything looks questionable, start calling today. Get a free copy of your credit report from each of the credit-reporting agencies every year. Again, if anything looks questionable, don't wait. Get on the phone today, and document everything. Also, minimize your online exposure, and clean out your wallet.It's not possible to completely eliminate your exposure to identity theft, but, this book does a very good job of helping to minimize it. Many people may consider what's in this book to be common knowledge, but it certainly bears repeating. This an eye-opener, and very much worth reading.