
- English
- ePUB (mobile friendly)
- Available on iOS & Android
eBook - ePub
AARP Protecting Yourself Online For Dummies
About this book
Protect your privacy and use the internet safely!
Don't let news about internet risks deter you from taking full advantage of its benefits! The web is such an amazing and useful resource for connecting with friends and family, shopping, banking, catching up on current events, and getting help in a myriad of ways. Let AARP's Protecting Yourself Online For Dummies arm you with the information you need to use the internet with confidence. You'll learn:
- How and why risks can occur
- Steps to protect yourself from identity theft, fraud, and e-mail scams
- Expert tips for creating strong passwords and storing them safely
- Information you need to keep your online banking and shopping accounts safe
By reading this guide and following a few safety precautions, you can be confident and risk-free as you enjoy a connected, digital life online!
Frequently asked questions
Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, weâve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere â even offline. Perfect for commutes or when youâre on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access AARP Protecting Yourself Online For Dummies by Nancy C. Muir,Ryan C. Williams in PDF and/or ePUB format, as well as other popular books in Computer Science & Cyber Security. We have over one million books available in our catalogue for you to explore.
Information
Chapter 1
Safeguarding Your Identity
In This Chapter




Itâs all too easy to share information about yourself online these days, whether youâre active in social media or shopping online. Overall, this book helps you guard your online activity, and this chapter specifically helps you understand the kind of information that youâre asked to provide online and the potential ramifications that can occur if that information falls into the wrong hands.
By using your personal information, identity thieves can âparty hardâ on your nickel and your good credit reputation. They spend like thereâs no tomorrow because they know that someone else (you) is picking up the tab.
Identity thieves can use your personal information to open accounts, such as a cellphone account, in your name. Of course, they skip paying the bills and continue to use the phone until you discover the theft and take action; then they drop that account and move on to another unsuspecting victim. Worse, even major corporations that you trust can be compromised and leak your information whether you do anything wrong or not.
Assessing Your Information
To get started, take stock of the information you may have out there on the Internet and the risk it poses if itâs stolen. Sensitive information involves numbers and other key facts about you that together comprise your paper and online identities. The vulnerable personal information that identity thieves use is described in this list:
- Social Security number (SSN): Your 9-digit personal identification number (assigned by the federal government) is the key to the kingdom for identity thieves: The identity thief uses your SSN to apply for credit, file false tax returns, get a job, open bank accounts, and so on.
- Date of birth (DOB): A DOB is a piece of the personal information puzzle that really isnât a problem if thatâs all the information the bad guys have, but put together with other information, it lets an identity thief become you.
- Security questions: You see these questions â asking for your first petâs name and where you attended high school, for example â when youâre setting up an online account.
- Motherâs maiden name: This name is used to verify your identity when accessing financial information. Security questions have begun to include a fatherâs middle name as well. Everybody gets equal time!

- Personal identification numbers (PINs): These are usually 4- (or more) digit numbers used to access your bank accounts online or when using your ATM card.
- Passwords: Your passwords â which are the keys to any information stored electronically â are discussed in detail in Chapter 3.
- Driverâs license number: A thief who has your driverâs license number can make a phony license that shows your name and driverâs license number with his picture.
- Social media posts: This information can convey where you live â or even where you are right this minute â your alma mater, your likes and dislikes, and other information that people can use to form a complete picture of who you are. Think about all the information youâve distributed on these networks (both new and old â hello, MySpace and Friendster!) and how likely it is that somebody could unearth this information by looking quickly on a search engine. Even if you deactivate or delete your account, that information can still be accessible via cached searches and archives.
Protecting Your Privacy
After assessing information but before posting that information on a social networking site such as Facebook, Google+, LinkedIn, Instagram, or Twitter, carefully review your privacy settings. Sharing publicly is the default, and you have to go out of your way to not do so.
When posting information that appears on a public website, such as when you leave comments on articles you read, offer reviews of restaurants or movies, or post in any discussion venue, donât use your full name. This advice doesnât apply if youâre working in a business context, such as posting information on your companyâs website.
Never provide your name, address, phone number, Social Security number, or drivers license number to someone you donât know.
Never believe anyone who says that heâs from Facebook tech support, eBay fraud prevention, PayPal administration, your bank, or a similar-sounding authority and asks you for your password. No legitimate entity will ever ask you for your password.
Be especially careful about disclosing information about kids. Donât fill out profiles that ask for a kidâs name, hometown, school, age, address, or phone number, because theyâre invariably used for âtargeted marketingâ (also known as junk mail).
Dealing with Privacy Thieves
So if you control who accesses your information, how is it that people still find a way to creep into your online life and ask you for more? Letâs take a look at the most common ways to access details about you on the Internet.
How thieves obtain your info
Here you are, sitting and reading this book about passwords. Can you begin to hear the faint scratches of the privacy pests as they claw away at the walls of your electronic security?
No? Then itâs time to start looking in some of the mustier corners of your daily activities to see whether you can spot any telltale signs. As an example, look at an everyday action, such as buying a book. The last time you bought a book online, did you buy it âŚ
- Over the Internet? Did the website ask you for any personally identifiable information â your mailing address, perhaps, or an e-mail address? By downloading a book over the Internet, for example, you reveal certain information about yourself to the bookseller. As you continue to read this book, someone at the site may be adding that information to all the other personal data that has already been collected about you based on all the other items youâve purchased â or even just looked at â while on that website.
- While browsing the web at home? If so, you may have revealed to your Internet service provider (ISP) some information about yourself, including your interests and purchasing habits. As you continue reading, someone may be adding that information to all the other personal data thatâs already been collected about you based on all the places youâve surfed and the things youâve bought online.
- While browsing the web at work? If so, you may have revealed to your employer some information about yourself. Luckily, you werenât looking for job-hunting books. Oops! You were looking for those, too? Whatever the case, someone may be adding that information to your personnel file now, along with all the other personal data thatâs already been collected about you because your employer has the legal right to monitor you and record every move you make on the Internet while youâre at work.
- Using an insecure Internet browser? If youâre using an older Internet browser or if you have neglected to update your browser when newer versions are available, you may be making yourself more vulnerable. You may have revealed information about yourself to a hacker in a faraway place who may have already targeted you as the one whose credit card number will buy her a new video game system â or maybe even a wardrobe or new car. While youâre reading now, she may be busy collecting additional information and building an intimate profile of you that she can use to fraudulently spend your money, online and offline.
Follow these steps to help reduce your privacy concerns when buying online or performing other transactions with sensitive data:
- Donât submit your personal information on computers you donât own. This includes your work computer. If you donât want people seeing what youâre typing or viewing on the Internet, restrict your activity to your own computer. Your boss will probably be happier that way, too.
- Set your web browser to private browsing. The gist of the private browsing function is that the browser doesnât store cookies or track browser history while in this mode. You may forego some of the convenience of browsing the web, but you gain a measure of privacy. Different browsers name the feature differently: Chrome calls it Incognito Mode, Internet Explorer calls it In-Private Browsing, Firefox calls it Stealth Mode, and Safari calls it Private Browsing. All browsers have the feature accessible easily via their main menu (the Safari menu in that browser).
- Donât give out personal information, including your e-mail address. Even if youâre trying to win a fabulous prize, be aware that the company running the contest wants your personal information to better track and market to you. Opt out of any mailings or consider the e-mails you get a trade-off for the service you sign up for, and maybe even use a dedicated e-mail account for the spam youâll likely receive if the lure of the prize is too great.
What to look for in privacy policies
Have you ever seen the magicians Penn & Teller vow never to show you how their magic tricks are done â and then play the old shell game with a small ball hidden under one of three clear plastic cups so that you can see exactly how they perform the trick?
We are about to perform the privacy lawyerâs equivalent of that trick by showing you what you should look for in a privacy statement as though you were reading it through the clear plastic lenses of the sneakiest, most cynical lawyer in town. Ask yourself whether a websiteâs privacy policy tells you
- Explicitly what information the website is collecting: Is the site getting your name and address? Your e-mail address? The IP address of your computer? Your credit card number? The combination to your gym locker or to the hidden safe in the den? If the site doesnât say exactly what information itâs collecting, you should assume the worst.
- How your information will be used: Hereâs where the most advertising-speak usually happens, and you have to read carefully to figure out what the site is saying before deciding whether to register on the site. Will the company drive you crazy by sending you catalogs by snail mail and e-mailing you ads by the dozens? Will it sell your personal information to other advertisers? Is the benefit it offers in return â a promo code, coupon, or advance notice of sales, for example â worth any potential annoyance?
- Whether and how you can opt out of having the site collect information about you: Some sites offer you the option to opt out of the data collection. For example, you may have a choice to set up a personal account so you can return to the site without reentering your information, or to use a generic guest account whi...
Table of contents
- Cover
- Title Page
- Table of Contents
- Introduction
- Chapter 1: Safeguarding Your Identity
- Chapter 2: Protecting Yourself from Viruses, Spyware, and Scams
- Chapter 3: Password Secrets
- Chapter 4: Risk-Free E-Mail
- Chapter 5: Shopping and Banking Safely
- Chapter 6: Ten Things You Can Do Today to Protect Yourself
- More Dummies Products
