Is Dark Web Monitoring Worth It?

In a world where cyber threats are increasingly prevalent, the dark web has become a breeding ground for criminal activity. This has left individuals and businesses wondering whether dark web monitoring is worth the investment. This blog explores the ins and outs of dark web monitoring, including what it is, how it works, and [...]

Juice Jacking: The Latest Cyber Threat to Your Personal Information and Devices

Juice jacking, a new cybercrime trend, is targeting people who charge their phones or tablets at public charging stations. This blog delves into the specifics of juice jacking, including how it operates, the various attack types, the associated risks, measures to help safeguard yourself, and actions to take if you fall prey to it. [...]

Credential Stuffing Attacks: What They Are & How To Prevent Them

Hackers can use different techniques to steal your passwords. One way they can use your stolen personal data is called credential stuffing. Read on to learn more about credential stuffing and how you can help protect yourself. What is Credential Stuffing? Credential stuffing is a cyberattack involving hackers using software to try multiple combinations of [...]

NFT Scams – How They Work and How To Spot Them

In recent years, the market for non-fungible tokens (NFTs) experienced a significant increase with its value exceeding $23 billion last year alone, according to DappRadar. However, this growth also led to an increase in NFT scams where bad actors stole login credentials or deceived buyers. In this blog, we explain how these scams operate [...]

What are the Benefits of a Password Manager?

Passwords are essential when keeping your information safe on your devices. But unfortunately, many people use weak or the same password, making it easy for hackers to crack them. Research shows that 52% of people reuse passwords for multiple accounts. Luckily, password managers can help by creating and storing strong passwords for different websites and apps [...]

Tax Season Scams: How to Protect Your Identity

While it’s important to be on high alert and protect your identity all year long, tax season is an especially vulnerable time. Every tax season, identity thieves run a variety of scams to get their hands on taxpayers’ personal information. Many scams occur, but most have a common goal: filing a fraudulent tax return [...]

Top 7 Data Security Practices for the Workplace

As businesses become increasingly reliant on technology, protecting sensitive information is more important than ever. Data breaches and cyberattacks can result in costly consequences, making strong data security practices essential. In this blog, we cover the top-seven data security practices every workplace should implement to help protect valuable information and more. Why is Data [...]

The IRS Phone Scam: Understanding the Tactics Used by Fraudsters

Tax season allows con artists to scam taxpayers out of their hard-earned money each year in the United States. These scams range from simple to sophisticated, but many are initiated using a single phone call. Here’s how phone fraudsters are targeting taxpayers this tax season and how you can spot an IRS phone scam. [...]

What Is Ransomware and How Does It Work?

Ransomware is one of the most common types of cyberattacks. With how vastly the internet has become embedded in our day-to-day lives, cyberattacks such as ransomware can cause costly disruptions. According to the Harvard Business Review, the amount of money paid to ransomware hackers increased 300% from 2020 to 2021. This is after ransomware attacks rose [...]

What to Do If Your Phone Is Lost or Stolen

Losing your phone can feel like the end of the world. One minute it's in your pocket, and the next you can't find it anywhere! Whether it was dropped somewhere, taken by someone, or completely disappeared into thin air, you're now in a whirlwind of worry and frustration. No doubt you are concerned about [...]

Can Hackers Create Fake Hotspots?

We rely on the internet, from communicating with loved ones on social media to working and conducting business. As a result, vulnerability to cybercrime is a serious concern. One of the ways hackers attempt to exploit people is by creating Wi-Fi hotspots that imitate a legit business, organization or even an airport and acts [...]

What is a Keylogger and What Does Keylogging Mean?

You might not realize it, but your computer or phone constantly records everything you do. Every keystroke, every website you visit, and every password you type is recorded by a piece of software or hardware called a keylogger or keystroke logger. Keyloggers are used for many different things - from tracking employees' activity to [...]

7 Tips to Follow for Safer Internet Day

The 20th annual Safer Internet Day is taking place on February 7! Safer Internet Day is a campaign that aims to educate the public on internet safety and encourage everyone to take part in creating a safer internet. Why is Safer Internet Day Important? Online safety is a global issue, with 60% of the [...]

Bluetooth Hacks – How Your Devices are Targeted

Bluetooth is a widely used, convenient technology included on every smartphone, tablet, and laptop computer these days. You can share files, play media, and more with a wireless connection. But like with unsecured Wi-Fi networks, hackers can target your Bluetooth-enabled devices to commit identity theft, install malware, or spam you with messages. This blog will discuss [...]

6 Tips for Sharing Files Safely and Securely

Whether you have a project you are working on or want to give someone a couple of photos, there are several scenarios where you find yourself in need of sharing files. Regardless of the file type you want to share, it is important to consider the safety of the methods you use. In this [...]

How to Not Get Scammed Buying Tickets

If attending the biggest sporting events, festivals and concerts is a big part of your vacation plans, it can be a bummer to find out that the ticket deal you scored is a scam. After all, you are making a hefty investment to be there, which you know after budgeting out your vacation. And it [...]

5 Things You Should Not Share on Social Media

Social media has become some of the most popular platforms people spend their time on. Whether you want to check up on your family members, post photos or even meet new people, social media is the way to go. Even businesses take up social media to promote their products and services. What you post on [...]

Is It Safe to Open a Holiday E-Card?

With the holiday season upon us, e-cards are a popular way to spread holiday cheer! An e-card is a digital greeting card, typically sent via email. E-cards are slowly taking the place of traditional holiday cards for many reasons. They are  typically cheaper, easier to send, more convenient and more animated than a normal [...]

What Happens If a Scammer Has Your Email Address?

It can be scary finding out that a scammer has stolen your email address, whether it’s your personal or work address. Sadly, there are many ways scammers and hackers can source their victims’ email addresses, including buying them from data providers or the dark web, email harvesting, social engineering, fake websites or social media. [...]

How Can Biometrics Prevent Identity Theft?

Identity theft continues to be a growing crime in America. According to Javelin Strategy, nearly 15 million Americans had their identities stolen in 2021. However, with technological advancements, preventing identity theft has become possible. For example, biometric technology has made it easier for us to protect our personal information and made it difficult for criminals [...]

Do You Still Need to Buy Antivirus Software?

Computer viruses are malicious programs that can disrupt computer systems, hijack or steal sensitive data, spy on users and spread to other computers on the same network. Technology improvements may mean the “Wild West” days of rampant computer viruses are over, but you still need to take steps to protect your devices. Most modern [...]

What Happens If You Give Someone Your IP Address?

Internet protocol address, aka an IP address, is a unique number assigned to every computer and device that connects to the web so they can communicate with each other and share information. You can think of your IP address as a unique identifying label for your computer or device on the internet. It’s important [...]

How to Avoid Rideshare Scams While Traveling

If you’re planning a vacation around the country, traveling has never been easier, especially with so many rideshare opportunities available to make it easy to get around. Apps like Uber and LYFT are highly accessible and easy to use. Many people rely on them, but it’s important to know that ride sharing apps are associated [...]

What to Do If My Email Is Found on The Dark Web?

Pretty much everyone uses email. It’s part of your daily life. But what do you do if your email address is found on the dark web? People might be trying to access your accounts. Unfortunately, the dark web is where you can find a number of criminals and cybercriminals trying to break into your [...]

How Virtual Phone Numbers Can Help Protect Your Identity

Do you freely give out your phone number when you’re signing up on a shopping website or meeting a new acquaintance? If so, you should know that criminals can use your phone number to commit identity theft. For example, scammers may try to spoof (impersonate) your legitimate phone number to contact your friends and family, [...]

Are College Students Targeted by Identity Thieves?

When it comes to identity theft, young adults are a primary target. Students are four times more likely to be targets of fraud that can go undetected for years compared to other consumers. In fact, 15% of students deal with severe or moderate impacts from fraud, according to a report from Tulane University. Criminals [...]

How to Dispose Outdated Electronics to Protect Your Identity

Your iPhone is ancient, your laptop is malfunctioning, and your tablet is due for an upgrade. Of course, there comes a time for everyone to toss their old tech and level up to the latest version. But before trashing your old tech, make sure you don’t leave your personal information out there for the [...]

Common Tech Support Scams and How to Avoid Them

These days, we live our lives online. Whether we’re ordering groceries or looking for new shoes, all we need to do is create an account, fill out some basic personal details and log in. But what happens when that account is compromised – or when we think that account is compromised? Maybe you get an [...]

What is Social Media Account Cloning?

When a scammer has the right information, they can easily impersonate you on social media by cloning your account. It’s pretty simple to do when much of the information that scammers need is publicly available on the real person’s profile. Criminals can use cloned social accounts to scam your friends, commit identity theft and even [...]

How Do I Get an IP PIN From the IRS?

As the tax season picks up, scammers are capitalizing on tax schemes to take your money, steal your identity and rob you of your peace of mind. While you can take several important steps to avoid being scammed, such as using an identity theft protection service, the IRS is also providing a new tool for [...]

How to Avoid and Report Boss Scams

A boss scam is a phishing (email) or smishing (text messages) scam used by hackers. Hackers send fraudulent emails or texts in the boss scam, impersonating your boss or another executive. Information gathered through such scams can then be used for illegal activities and identity theft. The Better Business Bureau has warned the public [...]

SIM Swapping Attacks on the Rise- Here’s How to Keep Safe

SIM swapping, also called SIM splitting or hijacking, is a technique employed by online fraudsters to gain access to, seize and control a victim's phone number and SIM information. They gain access to the victim’s identity and information through their phone company and use the information to conduct theft and other fraudulent activities online. Recently, [...]

How Important are Phone Software Updates?

As annoying as software updates are on your phone, they are necessary to help protect you. With every update that you get, your phone's performance can improve. On the other hand, ignoring these updates can make your phone slow, hang frequently and be incompatible with different apps and software. It can also make your [...]

Can “Buy Now, Pay Later” Apps Be Trusted with My Personal Data?

It may be tempting to look for new ways to manage personal finances. For example, one of the latest credit options is to use a so-called “buy-now, pay-later” app, which can fund your purchase today and act as a digital layaway platform until you can fully repay the debt.  Considering this type of app is [...]

What Are Cookies and Are They Bad?

If you have browsed the internet recently, you know about the cookie notifications that websites are now required to show. These notifications show up due to the General Data Protection Regulation, which was passed as part of the European Data Protection and Privacy Law. With the increased number of websites showing these notifications, you [...]

Why K-12 Schools Are Prime Targets for Cybercriminals

Private companies and large government agencies aren’t the only organizations that need to prioritize cybersecurity. Kindergarten through 12th-grade schools are also targeted by cybercriminals with hacks, ransomware, phishing scams, data breaches and more. According to the K-12 Security Information Exchange, last year set a record of cyber incidents in schools, with 408 disclosed incidents. [...]

October is Cybersecurity Awareness Month: Here Are 4 Cybersecurity Tips to Keep Protected

October is Cybersecurity Awareness Month and the theme for 2021 is “Do Your Part. #BeCyberSmart.” There’s never been a better time than right now to review the processes you have in place to avoid the latest cybersecurity risks lurking in the corners of our everyday digital lives. The top cybersecurity concerns for consumers regarding [...]

Scam School: Bad Practices on Social Media Could Put Your Identity at Risk

With the increased global use of social media, there are more opportunities than ever for scammers to steal identities or perpetrate fraud online. It can even put your family at physical risk. For example, did you know that your status updates posted on Twitter, Facebook, Instagram and many other social media sites can be [...]

Back 2 School? Here’s Why Credit Monitoring is a Must-Have for College Students

As U.S. university and college students look to return back to campus this fall, chances are they have plenty on their mind going into the first post-pandemic semester. And perhaps one thing that is way down on their to-do list is to consider how vulnerable they're to ID theft. Truth be told: cybercrimes against [...]

Cloudstar Remains Compromised Following Ransomware Attack

Cloudstar, one of the title industry's primary cloud providers, remains compromised after a recent ransomware attack disrupted its services. The company also provides services to real estate, legal, insurance, financial services, petrochemical and the oil and gas industries. The Victim of a Ransomware Attack Here’s what happened, according to a notice on the Cloudstar [...]

BYOD? Here Are Possible Risks if You Are Bringing Your Own Device to Work

The shift to remote work during the pandemic brought with it a more relaxed approach to how employers view the idea of employees using their own devices. It is likely that as workers begin returning to the workplace, they may be able to keep using their own devices. While there are certainly some pros [...]

Cybercrime is on the Rise – Here are Some Easy Ways to Protect Yourself

The recent Verizon Data Breach Investigations report shows that global cybercrime is on the rise. It’s a frightening prospect at first glance, but the good news is that the best line of defense may not be as complicated as you think. The Verizon report, which gathers information on 5,358 breaches from around the world, highlights [...]

Account Takeover: What is it and How to Prevent It?

Account takeover is a form of identity theft in which a malicious third party gains access to or “takes over” an online account. In this guide, we define how account takeover happens, how it affects consumers and businesses and what you can do to help protect yourself from it.

Here Are the Top 3 Online Scams and How to Avoid Them

The recent Federal Bureau of Investigations Internet Crime Report shows that cybercrime has spiked, leaving hundreds of thousands of victims and costing more than $4 billion. The FBI received a record number of reports last year totaling 791,790, a 69% growth from 2019. Moreover, losses due to internet crime increased by $700 million, growing from [...]

What is Dark Web Monitoring?

Dark web monitoring is a service that scans the dark web for signs that your personal information is being used fraudulently. While the dark web serves many legitimate functions, the anonymity of it also attracts people who are buying and selling illegal goods and services – including stolen personal information. With so many data breaches [...]

Here’s Why You Shouldn’t Post a Photo of Your COVID-19 Vaccination Card Online

You may have noticed that nestled in with baby announcements, social-distancing birthday photos and dog snaps, social media posts are now also featuring people celebrating getting their COVID-19 vaccinations. It’s natural that after a year of living under pandemic restrictions people are eager to share their experiences with the shot. One thing you should [...]

4 Identity Theft Myths to Stop Believing

Identity theft has been around for a long time, and it continues to evolve and adapt with the times. With the variety of scams out there, it’s easy to get bogged down in rumors and half-truths. When it comes to identity theft, you need to avoid believing misinformation and spreading it to others. Here [...]

Here’s How the Recent SolarWinds Cyberattack on U.S. Agencies and Companies Affects You

Cybersecurity experts are still trying to determine the scale of damage wrought by a recent cyberattack using SolarWinds software on the U.S. government and Fortune 500 companies. The attack aimed at the U.S. Treasury and Commerce departments as well as international companies continued for months until it was discovered by FireEye, a cybersecurity company that [...]

How Oversharing About Your Kids on Social Media Can Lead to Identity Theft

Every day, criminals scour the internet for personal information they can use to commit fraud and identity theft. In this digital age, individuals need to take steps to protect their privacy and information from fraudsters. This is as true for children as it is for adults, as kids can be victims of identity theft well [...]

Don’t Let a Phishing Scam Ruin Your Holiday

The holidays no doubt can offer many of us some respite from this chaotic year.  However, the season also creates an opportunistic time for cybercriminals to take advantage of your good cheer and deliver some real damage to your personal finance credentials. Pandemic shopping habits mean more of us are going to be online during [...]

Phishing and Malware Attacks Most Common Techniques for Credential Theft

Every day we use our personal information for access to online accounts, smart devices and other resources. This happens so frequently that the sensitivity of credential information can be taken for granted. A recent study by password management company LastPass found that a staggering 61 percent of business users reuse the same passwords for [...]

One of Largest IT Staffing Agencies in U.S. Reports Data Breach

A ransomware attack has exposed the commercial and personal employee data of Artech Information Systems, one of the largest IT staffing agencies in the nation. The data breach occurred Jan. 5 – 8 after a bad actor gained access to company servers through an employee user account, according to Bleeping Computer. Company officials said [...]

Former Uber Executive Charged in Data Breach Cover Up

A former Uber executive has been charged with covering up a data breach affecting 57 million app users and drivers. Joe Sullivan, Uber’s former chief security officer, is facing obstruction of justice and other charges stemming from a 2016 data breach. The breach occurred when two men hacked a third-party server to steal the personal [...]

How to Help Protect Your Medical Records from Cybercriminals

Medical records are a prime target for cybercriminals, and data breaches are a frequent occurrence in the health care industry. These records are valuable because they may contain a large variety of personal information, including your name, address, insurance information, Social Security number (SSN) and medical history. Medical records can be used to commit [...]

Google and Amazon Customers Top List of Brand Phishing Targets

Scammers are now targeting Google and Amazon customers the most frequently with brand phishing attacks, according to a new report. A recent study by security company Check Point found that Google and Amazon customers tie for the most phishing attacks aiming to steal their personal information at 13% of total attacks during the second quarter [...]

Cybercriminals Targeting Healthcare Industry Along with Coronavirus-Related Scams

As headlines focus on coronavirus-related scams, the related healthcare industry also continues to be a top target for cybercriminals. This year alone more than 3 million patient records have been exposed, according to Health It Security. Top 5 Healthcare Data Breaches This Year 1. Health Share of Oregon More than 654,000 patients had their records [...]

FBI and Cybersecurity Agency Issue Warning China is Hacking Organizations and Companies Working on COVID-19 Research

The FBI and Cybersecurity and Infrastructure Security Agency have issued a warning that China is attempting to hack the networks of U.S. organizations, pharmaceutical companies and health care professionals working on coronavirus vaccines and research. The federal agencies called research institutions, companies and others working on the COVID-19 response “prime targets” for Chinese cyberattacks. Federal [...]

Working From Home? Make Sure Your Data is Secure

As many of us are working from home during the coronavirus (COVID-19) pandemic, now is the time to be especially vigilant when it comes to protecting personal and business data online. Here are three tips to help secure your data. 1. Use a virtual private network (VPN). Securing employee access with a VPN can give [...]

Protect Yourself and Your Children from Identity Theft

Remember the last time you were on an airplane and heard, “Should the cabin lose pressure, oxygen masks will drop from the overhead bins. Please place the oxygen mask over your own mouth and nose first before assisting others.” As a mom, that’s somewhat startling to hear because your instinct is to always put your children first and yourself second. [...]

Microsoft Data Breach Exposes 250 Million Customer Records

Microsoft recently announced a data breach affecting one of its customer databases and exposing millions of records, including the personally identifying information (PII) of some customers who may have used Microsoft support since 2005. Between Dec. 5 and Dec. 31, a change made to an internal customer support database’s network security contained misconfigured security [...]

Phishing Attacks Becoming More Sophisticated

Hackers are becoming more and more sophisticated in their phishing email attempts to steal personal and company data. The number of data breaches caused by phishing is increasing with hackers finding their way into a company’s network using phished information such as employees’ stolen credentials, according to a recent report from cybersecurity organization Crowdstrike. [...]

Data Breach Hits Parent Company of Joe’s Crab Shack, Claim Jumper, Rainforest Café and More

Landry’s Inc., the parent company of more than 600 restaurants, hotels and casinos, has announced a data breach exposing customers’ card payment information. Company officials reported a hacker accessed and installed malware to their network supporting payment processing, which is used by servers to swipe and charge customer credit cards. They said encryption technology made [...]

Pennsylvania Attorney General Reaches $110,000 Data Breach Settlement with Orbitz and Expedia

Pennsylvania Attorney General Josh Shapiro announced a $110,000 settlement with the traveling websites Orbtiz and Expedia after a data breach that put the credit card information of almost 21,000 state residents at risk. Shapiro lead an investigation into the data breach that discovered a hacker was able to add malware to steal credit card payment [...]

Why Local Governments Are Vulnerable to Ransomware Attacks

The highest profile data breaches and cyberattacks often involve big businesses with millions of customers. But private companies aren’t the only organizations that are vulnerable to cybercrime – local governments are also popular targets for criminals. According to Verizon’s 2019 Data Breach Investigation, 16% of all 2018 data breaches involved public sector entities including [...]

SMS Database Leaves Millions of Text Messages with Personal Info Exposed

SMS communications company TrueDialog left millions of text messages exposed and unprotected in an online database that security researchers discovered last month, according to reports. TrueDialog is a communications company that enables clients, including private businesses and universities, to send text messages to customers, students and other individuals. The service allows message recipients to respond [...]

Capital One Cybersecurity Chief Out After Data Breach

The head of cybersecurity at Capital One has been removed following this summer’s data breach that exposed the personal information of more than 100 million customers. Michael Johnson has transitioned from Capital One’s chief information security officer to a new role as senior vice president and special advisor for cybersecurity, according to the company. The [...]

7-Eleven Customer Data Exposed in App Security Breach

The 7-Eleven Fuel app suffered a data breach in Australia last week that exposed users’ personal details. The app uses customer location and pricing data to help drivers find the best gas prices at local 7-Elevens, and lock in the low prices by prepaying. A customer reported the breach to 7-Eleven when he discovered [...]

What is Synthetic Identity Theft?

Protect yourself and your family Identity thieves and fraudsters consistently innovate and adapt to new security measures when it comes to their crimes. One of the more modern cons, known as synthetic identity theft, is high on the list of concerns for legislators and financial institutions alike. Any demographic could be vulnerable to this form [...]

The Origins and History of the Dark Web

Accessing the Dark Web? You’ll need Tor For anyone to access the dark web, a special type of software and web browser is required. The most well-known and frequently-used software is the Tor browser, which stands for The Onion Router. Tor protects the anonymity of its users by using multiple layers of encryption. Keep in [...]

Credit Freeze vs. Credit Lock: Differences Along with Pros & Cons

Credit Freeze vs. Credit Lock: What’s the Difference? Credit freezes and credit locks are often confused for one another since they protect consumers’ credit files from fraud in similar ways. They are, however, two different actions. As more people take preventative measures to protect their identity, it’s important to know how each of these actions [...]

What is Email Spoofing? Definition & Protection Tips

When people hear the term “spoof” they often think of a humorous parody of a song, movie, or real situation. It’s all about imitation — just like it is in the context of cybersecurity. But when it comes to cybersecurity, the imitation isn’t about humor or entertainment. In this context, spoofing refers to the [...]

The Deep Web vs. the Dark Web: What’s the Difference?

As the dark web has become a more common topic of discussion, the term "deep web" is often used synonymously with dark web — but there is a significant difference between the two. Read on to learn about the difference between the deep web and the dark web: What is the deep web? Deep web [...]

Watch Out for This Google Calendar Phishing Scam

Email and phone phishing scams are commonplace in the modern age. Their goal is to trick you into providing personal information, such as bank account numbers or personally identifying data, that can be used to commit fraud or identify theft. But thanks to spam filters and call screening, many phishing scams now go ignored. [...]

Instagram Accounts at Risk with New Phishing Scam Using False 2-Factor Authentication

A new phishing scam is using false two-factor authentication to take over Instagram accounts. The scam, recently discovered by researchers, starts with emails stating the recipients have had a login attempt into their Instagram accounts. The email states if the recipients did not attempt to log into their accounts they need to log in [...]

Five Charged in ‘Largest Criminal Case Ever’ of Identity Theft Targeting Military Members and Veterans

Five men have been charged with stealing millions of dollars from military members and veterans as part of an international identity theft and fraud ring that used stolen personal information to gain access to Department of Defense and Veterans Affairs benefit sites. The U.S. Department of Justice has charged Frederick Brown, Robert Wayne Boling [...]

My Information is for Sale on the Dark Web: What Should I Do?

The numerous recent data breaches have exposed the personal information of millions of people and put them at risk of having their information bought and sold on the dark web. The dark web is where cybercriminals go to anonymously buy and sell information – such as names, passwords, credit card numbers, and Social Security [...]

Credit Karma ‘Technical Issue’ Exposes Account Information to Wrong Users

Officials of the credit monitoring site Credit Karma are blaming a “technical issue” for a data breach that exposed users’ credit and personal information to other site users. Users began posting to Reddit and Twitter this week to point out the issue, saying when they logged into the site they were given access to other [...]

The Dark Web is Booming: Is Your Info at Risk?

The dark web has been around for a long time, but it’s recently risen in pop culture — and for many people, it’s a relatively new concept. Increasingly frequent data breaches and cases of identity theft have put the dark web on our radars, but the subject remains strange and unclear to many people. As [...]

4 Realistic Anti-Fraud Changes You Can Make Now

Now is the time to protect yourself against account fraud and identity theft, which can do massive damage to your credit and finances. Luckily, you don’t have to be a finance guru or cybersecurity wizard to better protect your money and identity. Here are four realistic anti-fraud changes you can make immediately to protect yourself: [...]

Black Hat and DEF CON to Highlight Increase in Aircraft Hacking Risks

With the Black Hat and DEF CON conventions – the mecca for both information security professionals and hackers alike – taking place in Las Vegas this month, one major industry focus this year is aviation software vulnerabilities. Black Hat, which runs Aug. 3 – 8, features a presentation on the Boeing 787 software system [...]

Ex-Amazon Employee Arrested for Hacking More Than 100 Million Capital One Customers’ Data

An ex-Amazon employee has been arrested for allegedly hacking the account information of more than 100 million Capital One customers. Paige Thompson, of Seattle, is accused of exposing customers’ personal information – including names, addresses, credit scores, bank account numbers, Social Security numbers, and Canadian Social Insurance numbers – and attempting to share the information [...]

Equifax to Pay Up to $700 Million for Data Breach

Equifax is expected to pay about $700 million for a data breach that put almost half the U.S. population’s personal information at risk, according to the Wall Street Journal. The credit-reporting firm is working to finalize an agreement that includes a $700 million settlement with the Federal Trade Commission, Consumer Financial Protection Bureau, numerous state [...]

FTC Fines Facebook $5 Billion for Privacy Breach of Users’ Data

Social media giant Facebook has agreed to a $5 billion fine – the largest in Federal Trade Commission history – for violating users’ privacy. The record-breaking fine comes after the FTC began investigating the company last spring after political consulting firm Cambridge Analytica gained access to almost 87 million Facebook users’ data without their [...]

British Airways and Marriott Receive Record-Breaking Fines for Data Breaches

British Airways and the hotel chain Marriott are facing record-breaking fines for failing to protect customers’ personal information in two separate data breaches. Britain’s Information Commissioner’s Office this month issued a $230 million (£183.4 million) fine – the largest ever imposed by the ICO – against British Airways for a data breach last year that [...]

4 out of 5 Physicians Report Cyberattacks as Health Care Industry Leads in Data Breaches

Four out of five physicians have experienced some type of cyberattack as health care continues to be the No. 1 industry affected by data breaches, according to a new report by the Healthcare and Public Health Sector Coordinating Councils. The report highlights the increasing and costly trend of data breaches in the health care industry, [...]

Organizations and Businesses Face 500% Increase in Ransomware Attacks

Hackers are going after organizations and businesses with a vengeance as detections of ransomware attacks are up 500% this year compared to this time last year. The staggering increase in the number of detections stems from cybercriminals ramping up their efforts against organizations and businesses by preying on weak credentials, broad user access, and infrastructure [...]

7 Simple Tips for Safer Internet Browsing

There are many ways for your computer or personal information to be compromised on the web. Viruses and malware can infect your machine, phishing scams can trick you into providing information to thieves, and “secure” websites can be hacked. While there’s no 100% guarantee of safe internet use, you can take steps to make your [...]

5 Strategies for Protecting Your Child’s Privacy Online

The internet is an amazing source of information, but it also contains many unique threats. One important concern in the digital age is online privacy; thieves, hackers, and other criminals may be trying to access your data and information for their own personal gain. Kids are just as vulnerable as adults (if not more so), [...]

‘Collection #1’ Data Breach Leaks 773 Million Email Addresses and 21 Million Passwords

Last week, an enormous database of email addresses and passwords was publicly exposed on the internet, leaving hundreds of millions of people vulnerable to fraud, scams, and hacking attempts. The database, known as “Collection #1,” could be the largest recorded public data breach in history. First reported by cybersecurity expert Troy Hunt, Collection #1 contains [...]

A Year in Review: The Worst Data Breach News of 2018

Cybersecurity threats were a major theme in 2018, as last year saw some of the biggest data breaches in history. Security flaws and illegal hacks exposed the personal data of millions and shook up some of the world’s largest organizations. Ultimately, there’s no foolproof way to protect your personal data when it’s in the hands [...]

4 Reasons Identity Theft is a Major Threat During the Holiday Season

Protecting your finances and identity is a year-round endeavor, and you should always be diligent to guard yourself against identity theft. But identity theft and fraud are especially prevalent during the holiday season. According to credit bureau Experian, fraud attempts spike during the holidays, especially on Thanksgiving and the days leading up to Christmas. What [...]

Go to Top