Skip to content

Search Results: yahoo hack

Huge Hack Hits Yahoo! What Do You Do?

It’s almost becoming part of the daily news, or so it seems. You check the weather forecast, the sports scores, and see who was the latest victim of an attack by hackers. In September, the latest news and by far the biggest victim was Yahoo, who announced that the account information of 500 million users…

[Read More]
Figure in gray hood and a painted skull mask making “shh” gesture with his forefinger

Identifying and Protecting Against People Hacking (Social Engineering)

Have you ever received an “Important Message Alert!” or “Warning: Your Computer is at Risk” pop-up while on a random website? Or, have you ever fallen prey to the “IRS is coming to arrest you” phone calls? Most people detect these scams before they can wreak major harm, but they exist because some people fall for them.…

[Read More]

Famous Hacks Throughout History: Key Incidents

Although it hasn’t always been called hacking, breaking into systems that you aren’t supposed to have access to is as old as humans themselves. When we think of hacking in a modern sense, we can trace its roots back to the beginning of the twentieth century. What are some of the most well-known hacks throughout…

[Read More]

How the Biggest Hacks of the 2010s Compromised User Security

The 2010s was one of the worst decades from a cybersecurity standpoint. Some breaches were geopolitical, going after nation-states. But many affected individuals and their data. Here’s a list of some of the biggest hacks of the 2010s that compromised user security and changed the way we think about cybersecurity. The Democratic National Committee The…

[Read More]

Hacking with James Kettle

Have you ever wondered how hackers find vulnerabilities and how companies can find and fix their own? You will find out today! On average 30,000 new websites are hacked every day. Our guest for this episode is James Kettle. James is the Director of Research at PortSwigger Web Security where he explores new ways to…

[Read More]

Ethical Hacking with Brian Self

Ethical hacking may seem like an oxymoron, but having someone that you trust do a penetration test on your network may shock you. Our guest today has been helping people for 20 years to know when they’re vulnerable, and he shares his stories and insights to help you keep your information secure. Today’s guest is…

[Read More]
Email Basics

How Do Hackers Send Emails?

Could you learn privacy tips from them? There are some people out there who would not risk, at least in certain instances, sending emails using an ordinary, everyday email account like Gmail, Outlook, or their company’s email. We pinpoint here the email basics. Who might they be? Hackers People on the run from the law…

[Read More]
Patrick Glennon talks about identity theft protection and recovery.

Identity Theft Protection and Recovery

Online quizzes are entertaining. Links in emails, texts, and social media messages are convenient. But both can put you at risk for identity theft – which can be costly and take months to recover from. Putting some identity theft protection measures in place can help you limit the damage. See Protecting Your Identity with Patrick…

[Read More]
Data Breach

A Data Breach Check Tells if Your Personal Information Has Been Stolen

We look at that news differently. WhatIsMyIPAddress.com looks at how news of another network attack affects the customers of that attacked company. We wonder how it affects you (because perhaps you’re a customer of the company) and want you to know what you should do. There’s a reason for that: the “sensitive data” that was…

[Read More]
Government Spying Isn

US Government Data Breach

Five Million Sensitive Fingerprints Were Stolen. So What Happens Next? The news was bad enough to begin with—the Office of Personnel Management (OPM) announced in early 2015 that the personal information of many Americans had been stolen in a major attack by hackers. The OPM, an official government agency, has the role of “recruiting, retaining…

[Read More]

If You’ve Been Naughty on the Internet, Better Cross Your Fingers

An adult website just got hacked. Customers are nervous, regretful. There’s a good chance that some husbands and wives, boyfriends and girlfriends, soccer moms, up-and-coming young executives and politicians (and millions more) are holding their breath, hoping for the best, changing their ways and may even be headed to church soon. That’s because an adult-oriented…

[Read More]
Gmail Confidential Mode is a step towards email privacy, but it's not a perfect solution.

Gmail Confidential Mode: Useful but Imperfect for Email Privacy

Email is a tool that most of us use every day – sometimes all day. And while most people use common features like forwarding, downloading attachments, and moving emails to folders regularly, there are a lot of other features that many email users don’t know about. If you use Google’s email services Gmail, Confidential Mode…

[Read More]
Data Breaches Explained

Data Breaches Explained: Understanding the Risks and Responses

If any of your personal information is available online, the chances are, it has been exposed to cybercriminals via a data breach at least once. Most corporations have ways to mitigate this exposure and will inform you if a breach has occurred. However, a disastrous personal data breach can lead to identity fraud and a…

[Read More]
Look for a VPN service that explicitly mentions DDoS protection as part of its features.

What is a DDoS-Protected VPN?

It seems like every day, our real lives get more intertwined with our digital lives. Availability disruptions in the apps and platforms we use can cause major interruptions to our daily lives.  Among the most troubling digital threats is a Distributed Denial-of-Service (DDoS) attack. By flooding networks and servers with malicious traffic, DDoS attacks block…

[Read More]
Anna Rowe talks about romance scam methods and how scammers manipulate their targets.

Tools and Tricks Romance Scammers Use to Manipulate Victims

As technology has changed from postal mail to phone to fax to email, scammers’ tools have changed, too. And the recent rise of sophisticated AI apps that anyone can use has made their job even easier. Romance scams especially have taken advantage of this technology. And that means that the old ways of spotting scammers…

[Read More]
Leo Laporte talks about advances in tech and what we can expect in the future.

Advances in Tech and What They Mean for You

Technology has changed so much over the past few years. New tools and ways to use them are showing up at an unprecedented rate. For those of us who aren’t enthusiasts of fancy tech stuff, it can feel like a lot of these advances only matter to the people who use high-tech gadgets and fiddle…

[Read More]

Email Privacy Matters, Here’s Why

We all rely on email to communicate and stay connected with our friends, family, and colleagues. In fact, more than half of the world’s population actively uses email. But have you ever considered how private your emails really are? What is Email? When it comes to online privacy, many people tend to focus on things…

[Read More]
Our goal is to assist in online fraud prevention through education and awareness.

Online Fraud Prevention: The Importance of Education and Awareness

Chris Parker, founder of WhatIsMyIPAddress.com, started the Easy Prey Podcast with online fraud prevention in mind. He wanted to help listeners learn to avoid being an easy target for scammers and fraudsters, both online and in the real world. Since episode 1 aired on March 18, 2020, he has interviewed some of the most influential…

[Read More]

You Can Stop Stupid with Ira Winkler

Information security is not just technical. There is a human aspect involved and fixing that is more than just identification and awareness. Our guest today is Ira Winkler. Ira is the president of Secure Mentem and the author of the book You Can Stop Stupid. He is referred to as the modern-day James Bond, given his skills…

[Read More]

Tracking Scammers with Wayne May

Many of us have seen James Veitch’s comedic YouTube videos of him interacting with email scammers.  Today’s guest shares how he helps real-world victims of those scams and he has participated in taking down criminal enterprises.  Wayne May is the owner of scamsurvivors.com. He began as a scam baiter in 2005 before concentrating and helping the…

[Read More]

Cyber Security Awareness with Jake Moore

Have you ever wondered what strange things a digital forensic investigator has to dig through? Listen to this episode to find out.  Our guest for this episode is Jake Moore. Jake Moore is a cybersecurity specialist for ESET, Europe’s number one internet security and anti-virus company. Jake previously worked in the police force for 14…

[Read More]
Password Strength and Change is a Key to Block Spies

You Need to Create Stronger Passwords…Now!

Yes, it’s a hassle to remember to create stronger passwords every time you open a new account…and that’s why many people don’t do it. They use simple (“abcd,” “1234”) stupid (“password”) the same password every time. Anything but a strong password. And hackers just love us for it. Almost every medium- to large-size company has…

[Read More]
The ABCs of Encryption. How does it work? What does it do?

Encryption: What It Is and How It Works

One of the benefits of a virtual private network (VPN), experts will tell you, is that any messages or data transmitted through a VPN are encrypted, which makes it all secure and unreadable. On a larger scale, all bank and credit card websites use encryption for transmitting their customers’ data. But just what does encryption…

[Read More]

What is the TCP/UDP Port Number List and Why It Matters

IANA Port Number List The port numbers are divided into three ranges: the Well Known Ports, the Registered Ports, and the Dynamic and/or Private Ports. The Well Known Ports are those from 0 through 1023. DCCP Well Known ports SHOULD NOT be used without IANA registration. The registration procedure is defined in [RFC4340], Section 19.9.…

[Read More]

What is a Private Email Server and Why Does It Cause a Big Fuss?

As most voting-age adults in the United States have heard, someone running for the highest office in the land has made the news in a big way for arranging a unique way to receive their emails. This person set up a private email server. Politically, it has been one of the biggest news stories of…

[Read More]