Have you ever tried searching for yourself on Google? Sure, it might seem like fun to see how many times you come up in a Google search. You’ll find your Facebook profile, a talkback you posted a few years ago and some whitepages.com results. Nothing too interesting there. But when you think about it, the very fact that you do come up means you’re being tracked. And it’s all thanks to cookies.
In a past post we discussed how to keep yourself safe from identity fraud. Our ever-increasing reliance on “all things digital” creates the perfect storm for hackers to steal not only passwords and logins, but our very identities, too. Previously, we highlighted some of the most important tactics you need to be aware of to keep your personal details secure in a world that seems to hemorrhage information. With the right habits and tools, you lessen your chances of becoming part of an ID fraud statistic.
But sometimes, you can be doing all the right things, and through no fault of your own, wind up compromised, as was seen in the too-many-to-count hacks of 2015. Last year was truly a watershed year in terms of hacks and it’s estimated that over one half of American adults had their identity compromised in some way. If you were one of those people, there are some things you can do to minimize the impact of the loss of that private information. And when it comes to your identity, time isn’t really on your side. Don’t spend precious moments wondering what to do next, just get going with anything and everything you can to reduce the damage.
Now that the holiday season is behind us, it’s time to get back to the important things in life, the things that really matter most – presents. Chances are, among your pile o’ gifts there were some internet-connected gadgets and they, like any internet-connected device, can be a security and privacy risk.
We’ve come up with some simple things you can do to guarantee your privacy without much hassle.
Do you have a favorite household gadget? Do you reach for your drill or take out your handy roll of duct tape whenever there’s a problem? Most of us have tools that we are partial to, our tried and true saviors that have gotten us out of a bind time and time again.
When it comes to cybercrime, hackers also tend to stick with certain tools, ones that are proven to be more effective and more forceful than the rest. Sure, sometimes hackers may go out on a limb and experiment with a new technique, but by and large, the threats we face all stem from the same tactics, with some tweaks to the code here and there. In 2015, there were some things that proved essential in so many hackers’ tool kits – Why bother with originality when the old tried and true tools work so well?
It’s these standbys that we have to be the most vigilant about, and there’s a lot we can learn from these tools about how we arm ourselves better for 2016 and beyond.
It’s been said before and we’ll say it again – 2015 was the year of the hack.
Sure, there were major hacks and breaches before 2015, but this was the year when hacking became de rigueur, when hacks went mainstream and became front page news. Often. Very often.
One of the most intriguing aspects of the hacks of 2015 was the scope. No sector was spared from data breaches, from top universities to federal agencies to Steam. It seems like everybody was targeted in 2015, as if the perps did their utmost to reach the widest range of victims. Profiled below are an assortment of people and the hacks that affected them most this year.