首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
The big identity-theft bust last week was just a taste of what’s to come. Here’s how to protect your good name. HERE’S THE S
The big identity-theft bust last week was just a taste of what’s to come. Here’s how to protect your good name. HERE’S THE S
admin
2014-03-25
37
问题
The big identity-theft bust last week was just a taste of what’s to come. Here’s how to protect your good name.
HERE’S THE SCARY THING about the identity-theft ring that the Feds cracked last week: there was nothing any of its estimated 40,000 victims could have done to prevent it from happening. This was an inside job, according to court documents. A lowly help-desk worker at Teledata Communications, a software firm that helps banks access credit reports online, allegedly stole passwords for those reports and sold them to a group of 20 thieves at $ 60 a pop. That allowed the gang to cherry-pick consumers with good credit and apply for all kinds of accounts in their names. Cost to the victims: $3 million and rising.
Even scarier is that this, the largest identity-theft bust to date, is just a drop in the bit bucket. More than 700,000 Americans have their credit hijacked every year. It’s one of crime’s biggest growth markets. A name, address and Social Security number—which can often be found on the Web—is all anybody needs to apply for a bogus line of credit. Credit companies make $1.3 trillion annually and lose less than 2% of that revenue to fraud, so there’s little financial incentive for them to make the application process more secure. As it stands now, it’s up to you to protect your identity.
The good news is that there are plenty of steps you can take. Most credit thieves are opportunists, not well-organized gangs. A lot of them go Dumpster diving for those millions of "pre-approved" credit-card mailings that go out every day. Others steal wallets and return them, taking only a Social Security number. Shredding your junk mail and leaving your Social Security card at home can save a lot of agony later.
But the most effective way to keep your identity clean is to check your credit reports once or twice a year. There are three major credit-report outfits; Equifax(at equifax. com), Trans-Union(www. transunion. com)and Experian(experian. com). All allow you to order reports online, which is a lot better than wading through voice-mail hell on their 800 lines. Of the three, I found Trans-Union’s website to be the cheapest and most comprehensive—laying out state-by-state prices, rights and tips for consumers in easy-to-read fashion.
If you’re lucky enough to live in Colorado, Georgia, Maryland, Massachusetts, New Jersey or Vermont, you are entitled to one free report a year by law. Otherwise it’s going to cost $8 to $ 14 each time. Avoid services that offer to monitor your reports year-round for about $ 70; that’s $ 10 more than the going rate among thieves. If you think you’re a victim of identity theft, you can ask for fraud alerts to be put on file at each of the three credit-report companies. You can also download a theft-report form at www. consumer. gov/idtheft, which, along with a local police report, should help when irate creditors come knocking. Just don’t expect justice. That audacious help-desk worker was one of the fewer than 2% of identity thieves who are ever caught.
What is the best title of the text?
选项
A、The danger of credit-theft
B、The loss of the creditors
C、How to protect your good name
D、Why the creditors lose their identity
答案
C
解析
文章开头指出窃用信用卡是一种非常严重的犯罪现象,接着介绍了如何进行一些防范措施。所以选项C是正确答案。
转载请注明原文地址:https://kaotiyun.com/show/Wixd777K
本试题收录于:
公共英语四级笔试题库公共英语(PETS)分类
0
公共英语四级笔试
公共英语(PETS)
相关试题推荐
IntheUnitedStates,olderpeoplerarelylivewiththeftadultchildren,Butinmanyothercultureschildrenareexpectedtoca
Tounderstandthemarketingconcept,itisonlynecessarytounderstandthedifferencebetweenmarketingandselling.Nottooma
Perhaps,everywomanstillrememberthisfamoussaying,"Nowomancanbetoorichortoothin."Thissayingoftenattributedto
Duringthe1980s,unemploymentandunderemploymentinsomecountrieswasashighas90percent.Somecountriesdidnot【21】_____
【61】ScientistsatJohnsHopkinshavediscovered"striking"differencesbetweenmenandwomeninapartofthebrainlinkedwith
Doanimalshavefights?Thisishowthequestionisusuallyput.Itseemsauseful,ground-clearingwaytostart.【61】Actually,
What’sthemaintopicofthemonologue?
What’sthemaintopicofthemonologue?
Whenwillshowersreachsouth-westEnglandandthesoutherncoastofWales?
随机试题
尿路感染最常见的致病菌是
用量过大可引起灰婴综合征的是静脉注射时可出现舌头麻木及口内特殊气味
治疗因痰饮引起的呕吐,除取主穴外还应加
患者,女,58岁。脑动脉硬化6年。突然发生口眼歪斜,半身不遂,半小时后,自行恢复;平日头晕头痛,耳鸣,腰膝酸软,舌红,苔薄黄,脉弦细。应首先考虑的方剂是
符某是某机械厂职工,上班经常迟到、早退、工作消极。在厂方予以口头警告后仍不改正,反而故意损坏机器设备,浪费能源。工厂领导多次批评教育无效后,决定予以辞退。符某得知该消息后,十分紧张,四处寻找工作,并与厂领导交涉。3个月后,符某向劳动争议仲裁委员会提出仲裁申
某出版社准备将俄国作家列夫·托尔斯泰(1828—1910年)的《安娜·卡列尼娜》重新翻译出版。该社应做到()等。
气候系统是一个包括()、陆地表面等在内的,能够决定气候形成、气候分布和气候变化的统一的物理系统。
税收不能课及的领域包括()。
下列哪些是数据结构研究的内容? I.数据的采集和集成 II.数据的逻辑结构 III.数据的存储结构 IV.数据的传输 V.数据的运算
以下程序运行后,输出结果是#definePT5.5#defineS(x)PT*x*x#includemain(){inta=1,b=2;printf("%4.1f\n",S(a+b));}
最新回复
(
0
)