A How-To Guide For Identity Theft (And Protection)
E-mail, online banking, social networking and other Internet conveniences make life easier every day. But the added convenience doesn't come without increased vulnerability. In September, hackers found their way into Sarah Palin's personal e-mail account, leaving many Internet users wondering if their privacy could be compromised as well.
Guests:
Herbert Thompson, chief security strategist at the security consultancy firm People Security, author of the Scientific American article "How I Stole Someone's Identity"
Kim Zetter, reporter for Wired