{"id":1602,"date":"2016-06-02T00:00:00","date_gmt":"2016-06-02T00:00:00","guid":{"rendered":"https:\/\/qa.simplifimoney.com\/blog\/digital-extroverts-vulnerable-identity-theft\/"},"modified":"2022-08-08T17:10:18","modified_gmt":"2022-08-08T17:10:18","slug":"digital-extroverts-vulnerable-identity-theft","status":"publish","type":"post","link":"https:\/\/www.quicken.com\/blog\/digital-extroverts-vulnerable-identity-theft\/","title":{"rendered":"Digital Extroverts Vulnerable To Identity Theft"},"content":{"rendered":"<p><\/p>\n<p>Today&#8217;s twenty-somethings may be the most extroverted generation in  history. They chronicle their trips around the world. They fess up to  personal bankruptcy. They Facebook, they tweet, they text, they talk\u2013and  talk, and talk, and talk.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.quicken.com\/blog\/wp-content\/uploads\/2022\/08\/statue_1.jpg\" alt=\"statue\" width=\"333\" height=\"500\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.quicken.com\/blog\/wp-content\/uploads\/2022\/08\/statue_1.jpg\" alt=\"statue\" width=\"0\" height=\"0\" \/>Unfortunately, this conversational navel-gazing could increase the  risk of suffering identity theft or other financial malfeasance.  Consider the recent events at microblogger Twitter, which suffered a  security breach when a hacker used public data to break into an  employee&#8217;s email account. Hundreds of sensitive documents were exposed.<\/p>\n<p>Twitter isn&#8217;t the only e-snooping victim. The Federal Trade  Commission recognizes the risks digital extroverts take and will soon  begin enforcing what it calls \u201cred flag\u201d rules on banks, credit card  companies, and retailers, reports the <em>Las Vegas Sun<\/em> newspaper.  At root, the new rules are designed to compel those who manage credit  accounts to monitor for signs an account has been cracked. Watchdogs for  the terminally digital, you might say. You can check your credit report  regularly to make sure nothing has gone awry, but these are reactive  precautions. What about getting ahead of the curve so that thieves do  not wreak havoc with your <a href=\"http:\/\/quicken.intuit.com\/\" class=\"imn_interlinked\">personal finance<\/a> situation later on?<\/p>\n<p>The Twitter hack is most telling in that it was a careful, well-designed attack according to the details <em>TechCrunch<\/em>  unearthed in its interview with the hacker. \u201cHacker Croll,\u201d as he has  become known, spent hours researching Twitter and its employees. He  found their email address. He studied their habits. He learned all he  could about them. And then he used that information to open a trap door  in Twitter&#8217;s internal network.<\/p>\n<p>Sound scary? It should, because you might be next on a hacker&#8217;s hit  list. Here are three ways to keep the digital party going while keeping  your e-wallet safe.<\/p>\n<p><strong>1. Don&#8217;t give clues to your passwords<\/strong>?Please repeat  after me: \u201cI will not use pets, addresses, nicknames, real names, family  names, or any other information that&#8217;s easily linked to me as my  password.\u201d Good, now say it again. Now go get it tattooed on your arm.  Never, ever violate this rule. To do so is to tempt a hacker in the most  delicious of ways to attempt to invade even the best finance software.<\/p>\n<p><strong>2. Don&#8217;t give away addresses in public forums<\/strong>?If you  want to use a social network, you&#8217;ll need to supply an email address.  Most digital services demand you hand over your email. Blab about your  address online, and you&#8217;re giving a hacker his best tool for fooling  services into thinking he is you.<\/p>\n<p><strong>3. Don&#8217;t discuss intimate details<\/strong>?There&#8217;s a  difference between tweeting about what you had for breakfast and  disclosing the address and time for your weekly coffeehouse soiree with  your fantasy football league. Besides the other members of your league,  only a hacker would care.?Finally, be sure to use security software to  protect your computer from viruses and spyware. In particular, beware of  keyloggers that record keystrokes and then forward the data to a  hacker, who can then use the findings to crack open every  password-protected area of your life.<\/p>\n<p>Social networks are fun, and sharing is crucial to building  relationships. Just be careful what you share and where. You never know  who&#8217;s watching.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today&#8217;s twenty-somethings may be the most extroverted generation in history. They chronicle their trips around the world. They fess up to personal bankruptcy. They Facebook, they tweet, they text, they talk\u2013and talk, and talk, and talk. Unfortunately, this conversational navel-gazing could increase the risk of&#8230;<\/p>\n","protected":false},"author":17,"featured_media":1603,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_seopress_robots_primary_cat":"","_seopress_titles_title":"Digital Extroverts Vulnerable To Identity Theft | Quicken","_seopress_titles_desc":"Today&#039;s twenty-somethings may be the most extroverted generation in history. They chronicle their trips around the world. They fess up to personal bankruptcy. They Facebook, they tweet, they text, they talk\u2013and talk, and talk, and talk.","_seopress_robots_index":"","inline_featured_image":false,"footnotes":""},"categories":[106],"tags":[],"class_list":["post-1602","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-investing-retirement"],"acf":[],"jetpack_featured_media_url":"https:\/\/www.quicken.com\/blog\/wp-content\/uploads\/2022\/08\/statue_1.jpg","_links":{"self":[{"href":"https:\/\/www.quicken.com\/blog\/wp-json\/wp\/v2\/posts\/1602","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.quicken.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quicken.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quicken.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quicken.com\/blog\/wp-json\/wp\/v2\/comments?post=1602"}],"version-history":[{"count":1,"href":"https:\/\/www.quicken.com\/blog\/wp-json\/wp\/v2\/posts\/1602\/revisions"}],"predecessor-version":[{"id":1604,"href":"https:\/\/www.quicken.com\/blog\/wp-json\/wp\/v2\/posts\/1602\/revisions\/1604"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quicken.com\/blog\/wp-json\/wp\/v2\/media\/1603"}],"wp:attachment":[{"href":"https:\/\/www.quicken.com\/blog\/wp-json\/wp\/v2\/media?parent=1602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quicken.com\/blog\/wp-json\/wp\/v2\/categories?post=1602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quicken.com\/blog\/wp-json\/wp\/v2\/tags?post=1602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}