首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
The big identity-theft bust last week was just a taste of what’s to come. Here’s how to protect your good name. HERE’S THE S
The big identity-theft bust last week was just a taste of what’s to come. Here’s how to protect your good name. HERE’S THE S
admin
2014-03-25
47
问题
The big identity-theft bust last week was just a taste of what’s to come. Here’s how to protect your good name.
HERE’S THE SCARY THING about the identity-theft ring that the Feds cracked last week: there was nothing any of its estimated 40,000 victims could have done to prevent it from happening. This was an inside job, according to court documents. A lowly help-desk worker at Teledata Communications, a software firm that helps banks access credit reports online, allegedly stole passwords for those reports and sold them to a group of 20 thieves at $ 60 a pop. That allowed the gang to cherry-pick consumers with good credit and apply for all kinds of accounts in their names. Cost to the victims: $3 million and rising.
Even scarier is that this, the largest identity-theft bust to date, is just a drop in the bit bucket. More than 700,000 Americans have their credit hijacked every year. It’s one of crime’s biggest growth markets. A name, address and Social Security number—which can often be found on the Web—is all anybody needs to apply for a bogus line of credit. Credit companies make $1.3 trillion annually and lose less than 2% of that revenue to fraud, so there’s little financial incentive for them to make the application process more secure. As it stands now, it’s up to you to protect your identity.
The good news is that there are plenty of steps you can take. Most credit thieves are opportunists, not well-organized gangs. A lot of them go Dumpster diving for those millions of "pre-approved" credit-card mailings that go out every day. Others steal wallets and return them, taking only a Social Security number. Shredding your junk mail and leaving your Social Security card at home can save a lot of agony later.
But the most effective way to keep your identity clean is to check your credit reports once or twice a year. There are three major credit-report outfits; Equifax(at equifax. com), Trans-Union(www. transunion. com)and Experian(experian. com). All allow you to order reports online, which is a lot better than wading through voice-mail hell on their 800 lines. Of the three, I found Trans-Union’s website to be the cheapest and most comprehensive—laying out state-by-state prices, rights and tips for consumers in easy-to-read fashion.
If you’re lucky enough to live in Colorado, Georgia, Maryland, Massachusetts, New Jersey or Vermont, you are entitled to one free report a year by law. Otherwise it’s going to cost $8 to $ 14 each time. Avoid services that offer to monitor your reports year-round for about $ 70; that’s $ 10 more than the going rate among thieves. If you think you’re a victim of identity theft, you can ask for fraud alerts to be put on file at each of the three credit-report companies. You can also download a theft-report form at www. consumer. gov/idtheft, which, along with a local police report, should help when irate creditors come knocking. Just don’t expect justice. That audacious help-desk worker was one of the fewer than 2% of identity thieves who are ever caught.
What is the best title of the text?
选项
A、The danger of credit-theft
B、The loss of the creditors
C、How to protect your good name
D、Why the creditors lose their identity
答案
C
解析
文章开头指出窃用信用卡是一种非常严重的犯罪现象,接着介绍了如何进行一些防范措施。所以选项C是正确答案。
转载请注明原文地址:https://kaotiyun.com/show/Wixd777K
本试题收录于:
公共英语四级笔试题库公共英语(PETS)分类
0
公共英语四级笔试
公共英语(PETS)
相关试题推荐
【61】Behindtheforthcomingwaroverprotectingpatients’recordsinanageofHealthMaintenanceOrganizationsandonlinemedic
Duringthe1980s,unemploymentandunderemploymentinsomecountrieswasashighas90percent.Somecountriesdidnot【21】_____
Duringthe1980s,unemploymentandunderemploymentinsomecountrieswasashighas90percent.Somecountriesdidnot【21】_____
Inthelateyearsofthenineteenthcentury,"capital"and"labour"wereenlargingandperfectingtheirrivalorganizationsonm
Therecanbenodoubtthatthecomputerrevolutionhastouchedvirtuallyeverypersoninthecountryinsomewayoranother.
Therearemorerichpeoplethaneverbefore,includingsome7millionmillionaires,andover400billionaires.Fromsippingcham
Thebigidentity-theftbustlastweekwasjustatasteofwhat’stocome.Here’showtoprotectyourgoodname.HERE’STHES
Researchersinvestigatingbrainsizeandmentalabilitysaytheirworkoffersevidencethateducationprotectsthemindfromthe
Whatmustyoumakesurewhenyouloadthecassette?
Whatmustyoumakesurewhenyouloadthecassette?
随机试题
A、肯定性反馈B、否定性反馈C、模糊性反馈D、动态体语E、仪表形象在交谈中,小王以关注的眼神注视患者,表示在专心倾听对方的话,小王的交流行为属于非语言交流中的
下列有关眼睑基底细胞癌的说法,不正确的是
项目总控模式是()相结合的产物。
下列属于电梯设备安装施工工序的是()
企业对于固定资产借款发生的利息支出应作为当期费用处理。()
吊顶面板的安装方法除搁置法外,还有()等方法。
与“柳暗花明春正半”对仗最工整的一句是()。
回避制度是我国传统任官制度的重要特点,此制始于东汉,后为历代沿袭,至清已形成一种非常重要的人事管理制度,其目的是防止官员因某些关系徇情营私。清代回避制度主要有籍贯回避、亲属回避、师生回避。清代任官的回避制度,规则繁密,超过往代,在嘉道之前执行尤为严格,在防
下面不能作为软件设计工具的是()。
Theterm"print"hasseveralmeanings,soitisimportanttounderstandexactlywhatismeantbytheartisticterminology.Apr
最新回复
(
0
)