NPR logo

Listen to this 'Talk of the Nation' topic

  • Download
  • <iframe src="https://www.npr.org/player/embed/94931379/94947021" width="100%" height="290" frameborder="0" scrolling="no" title="NPR embedded audio player">
  • Transcript
A How-To Guide For Identity Theft (And Protection)

Digital Life

A How-To Guide For Identity Theft (And Protection)

Listen to this 'Talk of the Nation' topic

  • Download
  • <iframe src="https://www.npr.org/player/embed/94931379/94947021" width="100%" height="290" frameborder="0" scrolling="no" title="NPR embedded audio player">
  • Transcript

E-mail, online banking, social networking and other Internet conveniences make life easier every day. But the added convenience doesn't come without increased vulnerability. In September, hackers found their way into Sarah Palin's personal e-mail account, leaving many Internet users wondering if their privacy could be compromised as well.

Guests:

Herbert Thompson, chief security strategist at the security consultancy firm People Security, author of the Scientific American article "How I Stole Someone's Identity"

Kim Zetter, reporter for Wired

We no longer support commenting on NPR.org stories, but you can find us every day on Facebook, Twitter, email, and many other platforms. Learn more or contact us.