In seven pages this paper discusses security problems, risks, identity theft, and personal information access by hackers. Nine sources are cited in the bibliography.