How Herbert Thompson stole his friend's identity
August 22, 2008, 1:27 PM
A recent Scientific American article describes how easy it is to steal somebody's identity. It uses blog entries, password reset mechanisms, and simple detective work. Make no mistake. You are not secure if you are not a blogger -- this is simply an account of what could be done.
identity theft, data mining, phishing, passwords, gmail
© 1994-2013 ITworld. All rights reserved.