Search Results: yahoo hack
It’s almost becoming part of the daily news, or so it seems. You check the weather forecast, the sports scores, and see who was the latest victim of an attack by hackers. In September, the latest news and by far the biggest victim was Yahoo, who announced that the account information of 500 million users…
[Read More]Have you ever received an “Important Message Alert!” or “Warning: Your Computer is at Risk” pop-up while on a random website? Or, have you ever fallen prey to the “IRS is coming to arrest you” phone calls? Most people detect these scams before they can wreak major harm, but they exist because some people fall for them.…
[Read More]Although it hasn’t always been called hacking, breaking into systems that you aren’t supposed to have access to is as old as humans themselves. When we think of hacking in a modern sense, we can trace its roots back to the beginning of the twentieth century. What are some of the most well-known hacks throughout…
[Read More]The 2010s was one of the worst decades from a cybersecurity standpoint. Some breaches were geopolitical, going after nation-states. But many affected individuals and their data. Here’s a list of some of the biggest hacks of the 2010s that compromised user security and changed the way we think about cybersecurity. The Democratic National Committee The…
[Read More]Have you ever wondered how hackers find vulnerabilities and how companies can find and fix their own? You will find out today! On average 30,000 new websites are hacked every day. Our guest for this episode is James Kettle. James is the Director of Research at PortSwigger Web Security where he explores new ways to…
[Read More]Ethical hacking may seem like an oxymoron, but having someone that you trust do a penetration test on your network may shock you. Our guest today has been helping people for 20 years to know when they’re vulnerable, and he shares his stories and insights to help you keep your information secure. Today’s guest is…
[Read More]Could you learn privacy tips from them? There are some people out there who would not risk, at least in certain instances, sending emails using an ordinary, everyday email account like Gmail, Outlook, or their company’s email. We pinpoint here the email basics. Who might they be? Hackers People on the run from the law…
[Read More]Online quizzes are entertaining. Links in emails, texts, and social media messages are convenient. But both can put you at risk for identity theft – which can be costly and take months to recover from. Putting some identity theft protection measures in place can help you limit the damage. See Protecting Your Identity with Patrick…
[Read More]We look at that news differently. WhatIsMyIPAddress.com looks at how news of another network attack affects the customers of that attacked company. We wonder how it affects you (because perhaps you’re a customer of the company) and want you to know what you should do. There’s a reason for that: the “sensitive data” that was…
[Read More]Five Million Sensitive Fingerprints Were Stolen. So What Happens Next? The news was bad enough to begin with—the Office of Personnel Management (OPM) announced in early 2015 that the personal information of many Americans had been stolen in a major attack by hackers. The OPM, an official government agency, has the role of “recruiting, retaining…
[Read More]An adult website just got hacked. Customers are nervous, regretful. There’s a good chance that some husbands and wives, boyfriends and girlfriends, soccer moms, up-and-coming young executives and politicians (and millions more) are holding their breath, hoping for the best, changing their ways and may even be headed to church soon. That’s because an adult-oriented…
[Read More]Email is a tool that most of us use every day – sometimes all day. And while most people use common features like forwarding, downloading attachments, and moving emails to folders regularly, there are a lot of other features that many email users don’t know about. If you use Google’s email services Gmail, Confidential Mode…
[Read More]If any of your personal information is available online, the chances are, it has been exposed to cybercriminals via a data breach at least once. Most corporations have ways to mitigate this exposure and will inform you if a breach has occurred. However, a disastrous personal data breach can lead to identity fraud and a…
[Read More]It seems like every day, our real lives get more intertwined with our digital lives. Availability disruptions in the apps and platforms we use can cause major interruptions to our daily lives. Among the most troubling digital threats is a Distributed Denial-of-Service (DDoS) attack. By flooding networks and servers with malicious traffic, DDoS attacks block…
[Read More]As technology has changed from postal mail to phone to fax to email, scammers’ tools have changed, too. And the recent rise of sophisticated AI apps that anyone can use has made their job even easier. Romance scams especially have taken advantage of this technology. And that means that the old ways of spotting scammers…
[Read More]Technology has changed so much over the past few years. New tools and ways to use them are showing up at an unprecedented rate. For those of us who aren’t enthusiasts of fancy tech stuff, it can feel like a lot of these advances only matter to the people who use high-tech gadgets and fiddle…
[Read More]We all rely on email to communicate and stay connected with our friends, family, and colleagues. In fact, more than half of the world’s population actively uses email. But have you ever considered how private your emails really are? What is Email? When it comes to online privacy, many people tend to focus on things…
[Read More]Chris Parker, founder of WhatIsMyIPAddress.com, started the Easy Prey Podcast with online fraud prevention in mind. He wanted to help listeners learn to avoid being an easy target for scammers and fraudsters, both online and in the real world. Since episode 1 aired on March 18, 2020, he has interviewed some of the most influential…
[Read More]Information security is not just technical. There is a human aspect involved and fixing that is more than just identification and awareness. Our guest today is Ira Winkler. Ira is the president of Secure Mentem and the author of the book You Can Stop Stupid. He is referred to as the modern-day James Bond, given his skills…
[Read More]Many of us have seen James Veitch’s comedic YouTube videos of him interacting with email scammers. Today’s guest shares how he helps real-world victims of those scams and he has participated in taking down criminal enterprises. Wayne May is the owner of scamsurvivors.com. He began as a scam baiter in 2005 before concentrating and helping the…
[Read More]Have you ever wondered what strange things a digital forensic investigator has to dig through? Listen to this episode to find out. Our guest for this episode is Jake Moore. Jake Moore is a cybersecurity specialist for ESET, Europe’s number one internet security and anti-virus company. Jake previously worked in the police force for 14…
[Read More]Yes, it’s a hassle to remember to create stronger passwords every time you open a new account…and that’s why many people don’t do it. They use simple (“abcd,” “1234”) stupid (“password”) the same password every time. Anything but a strong password. And hackers just love us for it. Almost every medium- to large-size company has…
[Read More]One of the benefits of a virtual private network (VPN), experts will tell you, is that any messages or data transmitted through a VPN are encrypted, which makes it all secure and unreadable. On a larger scale, all bank and credit card websites use encryption for transmitting their customers’ data. But just what does encryption…
[Read More]IANA Port Number List The port numbers are divided into three ranges: the Well Known Ports, the Registered Ports, and the Dynamic and/or Private Ports. The Well Known Ports are those from 0 through 1023. DCCP Well Known ports SHOULD NOT be used without IANA registration. The registration procedure is defined in [RFC4340], Section 19.9.…
[Read More]As most voting-age adults in the United States have heard, someone running for the highest office in the land has made the news in a big way for arranging a unique way to receive their emails. This person set up a private email server. Politically, it has been one of the biggest news stories of…
[Read More]