Skip to content

Search Results: yahoo hack

Huge Hack Hits Yahoo! What Do You Do?

It’s almost becoming part of the daily news, or so it seems. You check the weather forecast, the sports scores, and see who was the latest victim of an attack by hackers. In September, the latest news and by far the biggest victim was Yahoo, who announced that the account information of 500 million users…

[Read More]

Famous Hacks Throughout History

Although it hasn’t always been called hacking, breaking into systems that you aren’t supposed to have access to is as old as humans themselves. When we think of hacking in a modern sense, we can trace its roots back to the beginning of the twentieth century. What are some of the most well-known hacks throughout…

[Read More]

How the Biggest Hacks of the 2010s Compromised User Security

The 2010s was one of the worst decades from a cybersecurity standpoint. Some breaches were geopolitical, going after nation-states. But many affected individuals and their data. Here’s a list of some of the biggest hacks of the 2010s that compromised user security and changed the way we think about cybersecurity. The Democratic National Committee The…

[Read More]

How the Biggest Hacks of the 2010s Compromised User Security

The 2010s was one of the worst decades from a cybersecurity standpoint. Some breaches were geopolitical, going after nation-states. But many affected individuals and their data. Here’s a list of some of the biggest hacks of the 2010s that compromised user security and changed the way we think about cybersecurity. The Democratic National Committee The…

[Read More]

Hacking with James Kettle

Have you ever wondered how hackers find vulnerabilities and how companies can find and fix their own? You will find out today! On average 30,000 new websites are hacked every day. Our guest for this episode is James Kettle. James is the Director of Research at PortSwigger Web Security where he explores new ways to…

[Read More]

Ethical Hacking with Brian Self

Ethical hacking may seem like an oxymoron, but having someone that you trust do a penetration test on your network may shock you. Our guest today has been helping people for 20 years to know when they’re vulnerable, and he shares his stories and insights to help you keep your information secure. Today’s guest is…

[Read More]
Email Basics

How Do Hackers Send Emails?

Could you learn privacy tips from them? There are some people out there who would not risk, at least in certain instances, sending emails using an ordinary, everyday email account like Gmail, Outlook, or their company’s email. Who might they be? Hackers People on the run from the law Criminals Paranoid about privacy Whistleblowers Someone…

[Read More]
Data Breach

A Data Breach Check Tells if Your Personal Information Has Been Stolen

We look at that news differently. WhatIsMyIPAddress.com looks at how news of another network attack affects the customers of that attacked company. We wonder how it affects you (because perhaps you’re a customer of the company) and want you to know what you should do. There’s a reason for that: the “sensitive data” that was…

[Read More]