{"id":4122,"date":"2009-02-27T08:50:36","date_gmt":"2009-02-27T12:50:36","guid":{"rendered":"http:\/\/www.hothardware.com\/News\/ID-Theft-on-the-Rise-20Somethings-hit-Hardest"},"modified":"2009-02-27T08:50:36","modified_gmt":"2009-02-27T12:50:36","slug":"id-theft-on-the-rise-20-somethings-hit-hardest","status":"publish","type":"post","link":"https:\/\/computerhunter.us\/?p=4122","title":{"rendered":"ID Theft on the Rise, 20-Somethings hit Hardest"},"content":{"rendered":"<p>Identity theft has been in the news for some time now. It\u2019s certainly not something any of us want to deal with, but it seems more and more people are becoming victims. In 2008, the Federal Trade Commission reported a surge in the number of cases. In fact, 26% of all complaints received by the FTC involved identity theft. This category involved the largest number of complaints to the FTC in 2008. The next biggest complaint was third party and creditor debt collection scams, which represented 9% of complaints.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Identity theft has been in the news for some time now. It\u2019s certainly not something any of us want to deal with, but it seems more and more people are becoming victims. In 2008, the Federal Trade Commission reported a surge in the number of cases. In fact, 26% of all complaints received by the FTC involved identity theft. This category involved the largest number of complaints to the FTC in 2008. The next biggest complaint was third party and creditor debt collection scams, which represented 9% of complaints. <a href=\"https:\/\/computerhunter.us\/?p=4122\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-4122","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/posts\/4122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4122"}],"version-history":[{"count":0,"href":"https:\/\/computerhunter.us\/index.php?rest_route=\/wp\/v2\/posts\/4122\/revisions"}],"wp:attachment":[{"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4122"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4122"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/computerhunter.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}