1. Identity theft : Terrorism and identity theft ; Who are identity thieves? ; What do identity thieves do? ; College students and identity theft ; Malware and Macs ; Dumpster diving ; You are only as safe as the places that have your information ; They should know better ; Hackers ; Identity theft risk in old gaming consoles ; The drug connection ; Phishing ; Federal Express phishing scam ; Newegg phishing scam ; Former good advice ; More good advice to avoid becoming a victim of phishing ; The dangers of Aquaman ; Iron Man 3 ; Nude photos of Carla Bruni ; Debit card phishing scam ; Another debit card phishing scam ; Phishing with a large net ; Phishing around the world ; Spearphishing ; How do you know that you have become a victim of phishing? ; Reloading ; Identity theft through Internet phone calls ; What do Kim Kardashian and Michelle Obama have in common? ; USB sticks and identity theft ; Internet of things ; What you can do to prevent identity theft -- 2. Making yourself less vulnerable to identity theft : Online shopping credit card protection ; Updated web browsers ; SSL ; A primer on ATM identity theft ; Skimmers ; Dump memory grabber malware ; Federal warning ; ATM tips ; Mailboxes ; Mail tips ; Denver Bronco cheerleaders ; Identity theft threats on the road ; Hotel wi-fi ; More hotel tips ; Identity theft when giving to charities ; Job scams ; Danger where you never would expect it ; Shredding ; More steps to take to protect yourself from identity theft -- 3. Danger on your computer and what to do if you are a victim of identity theft : Spyware ; What can you do about spyware? ; It's not always good to share ; Botnets ; What to do if your e-mail is hacked and taken over by a botnet ; Celebrity malware ; Pornography and identity theft ; Keeping the family computer safe ; Help you just don't need ; Wi-fi, a convenience to worry about ; E-mail dangers ; E-cards ; Typos ; The company you keep ; We regret to inform you ; Lures ; Java danger ; Adobe ; A few ounces of protection: protecting yourself online from identity theft ; A pound of cure: what to do if you are a victim of identity theft -- 4. Your social security number: an identity thief's lucky number : Treasure-trove of social security numbers ; Biggest offender ; Social security identity theft threats in the military ; Social Security Number Protection Act of 2010 ; The good news and the bad news ; Unavoidable social security number disclosure ; Doing business online ; Social security numbers and college students ; My social security account ; Driver's license ; When and where must you provide your social security number? ; Restrictions on the use of social security numbers ; Workplace identity theft ; Higher education and identity theft --
5. Criminal identity theft, taxes, and more arresting problems : Criminal misidentification ; What should you do if you are the victim of criminal identity theft? ; Taxes and identity theft ; Identity theft and investments ; Jury duty ; Battling the companies with which you do business -- 6. Protecting your privacy: a key to preventing identity theft : Protecting your privacy on Facebook ; Protecting your privacy on Google ; Dangers of data gatherers ; Do not track ; Actions to take to increase your privacy -- 7. Security software -- 8. The dangers of data breaches : The black market ; Illegal profiting from credit card hacking ; Hacking is universal ; LinkedIn ; The lesson ; War driving in Washington ; Albert Gonzales ; Credit card processors ; Student loan information breach ; Wisconsin data breach ; Coca-Cola ; Colleges ; Retailers ; FBI warning ; Hotels ; Yahoo e-mail data breach ; Medical records ; Blame the employees ; Google dorking ; Homeland Security data breach ; Data breaches at small businesses ; Experian data breach ; Protecting yourself from identity theft due to hacking of a company or an agency with which you do business ; What to do if a company you do business with is hacked -- 9. Identity theft after death : Death master file and identity theft of children ; Contacting the credit-reporting agencies -- 10. Identity theft from children : Why would anyone want to steal the identity of a child? ; How do you protect your child from identity theft? ; Teach your children well ; RockYou ; Child identity theft and credit-repair companies ; Protecting your child's identity at school ; What to do if your child becomes a victim of identity theft ; What can the government do? -- 11. Identity theft risks of Smartphones and other mobile devices : Bluetooth risks ; Wi-fi ; 4G systems vulnerable ; SIM card danger ; Even paranoids have enemies ; Smartphone charging ; Pornography and Smartphones ; Dangerous apps ; WhatsApp ; More app scams ; So what should you do? ; Smishing ; News of the world hacking scandal ; Banking with your Smartphone or mobile device ; Tips for mobile banking ; Wuick response codes ; Reporting Smartphone theft ; Warning signs that your Smartphone has been hacked ; Getting rid of your old Smartphone --
12. Identity theft threats with credit cards and debit cards : Credit card liability ; Debit card liability ; Small charge on your credit card scam ; Debit card texting scam ; Mobile payment technology ; Credit card technology ; ATM scam ; Another similar scam ; Skimmers ; Credit card processing companies ; Make the matter even worse ; A little defense ; Disputing fraudulent charges on your credit card
13. Medical identity theft : Big problem ; How it happens ; Indications that you are a victim of medical identity theft ; What can you do to help prevent medical identity theft? ; What do you do if you are a victim of medical identity theft?
14. Identity theft and social media : What interests you? ; Facebook scams ; Facebook tips ; From Facebook to your bankbook ; Celebrities and Facebook ; Miley Cyrus sex video ; E-mails ; How do identity thieves steal your passwords? ; Twitter ; Twitter hacking ; Another Twitter scam ; Pinterest ; Tips for safe use of social networking
15. Steve's rules : Identity theft protection rules ; Rules to follow if you are a victim of identity theft
16. Steve's top ten lists : Steve's top ten things the government should be doing about identity theft ; Steve's top ten things business should be doing about identity theft ; Steve's top ten trends for the future of identity theft ; Steve's top ten things people should do to protect themselves from identity theft.