Skip to content

Search Results: yahoo hack

Huge Hack Hits Yahoo! What Do You Do?

It’s almost becoming part of the daily news, or so it seems. You check the weather forecast, the sports scores, and see who was the latest victim of an attack by hackers. In September, the latest news and by far the biggest victim was Yahoo, who announced that the account information of 500 million users…

[Read More]
Email Basics

How Do Hackers Send Emails?

Could you learn privacy tips from them? There are some people out there who would not risk, at least in certain instances, sending emails using an ordinary, everyday email account like Gmail, Outlook, or their company’s email. Who might they be? Hackers People on the run from the law Criminals Paranoid about privacy Whistleblowers Someone…

[Read More]
Data Breach

A Data Breach Check Tells if Your Personal Information Has Been Stolen

We look at that news differently. looks at how news of another network attack affects the customers of that attacked company. We wonder how it affects you (because perhaps you’re a customer of the company) and want you to know what you should do. There’s a reason for that: the “sensitive data” that was…

[Read More]
Government Spying Isn

US Government Data Breach

Five Million Sensitive Fingerprints Were Stolen. So What Happens Next? The news was bad enough to begin with—the Office of Personnel Management (OPM) announced in early 2015 that the personal information of many Americans had been stolen in a major attack by hackers. The OPM, an official government agency, has the role of “recruiting, retaining…

[Read More]

If You’ve Been Naughty on the Internet, Better Cross Your Fingers

An adult website just got hacked. Customers are nervous, regretful. There’s a good chance that some husbands and wives, boyfriends and girlfriends, soccer moms, up-and-coming young executives and politicians (and millions more) are holding their breath, hoping for the best, changing their ways and may even be headed to church soon. That’s because an adult-oriented…

[Read More]
Password Strength and Change is a Key to Block Spies

You Need to Create Stronger Passwords…Now!

Yes, it’s a hassle to remember to create stronger passwords every time you open a new account…and that’s why many people don’t do it. They use simple (“abcd,” “1234”) stupid (“password”) the same password ever time. Anything but a strong password. And hackers just love us for it. Almost every medium- to large-size company has…

[Read More]
The ABCs of Encryption. How does it work? What does it do?

Encryption: What It Is and How It Works

One of the benefits of a virtual private network (VPN), experts will tell you, is that any messages or data transmitted through a VPN are encrypted, which makes it all secure and unreadable. On a larger scale, all bank and credit card websites use encryption for transmitting their customers’ data. But just what does encryption…

[Read More]

TCP/UDP Port Number List

IANA Port Number List The port numbers are divided into three ranges: the Well Known Ports, the Registered Ports, and the Dynamic and/or Private Ports. The Well Known Ports are those from 0 through 1023. DCCP Well Known ports SHOULD NOT be used without IANA registration. The registration procedure is defined in [RFC4340], Section 19.9.…

[Read More]