After a year filled with gargantuan corporate hacks and countless “little ones”, it’s time to face the reality that there is a decent chance that you or someone you love may become a victim of identity fraud sometime soon. While exact statistics for 2015 have not been released yet, in 2014 more than 70 million Americans had their sensitive information exposed in data breaches that could very easily lead to identity fraud.
Do you have a favorite household gadget? Do you reach for your drill or take out your handy roll of duct tape whenever there’s a problem? Most of us have tools that we are partial to, our tried and true saviors that have gotten us out of a bind time and time again.
When it comes to cybercrime, hackers also tend to stick with certain tools, ones that are proven to be more effective and more forceful than the rest. Sure, sometimes hackers may go out on a limb and experiment with a new technique, but by and large, the threats we face all stem from the same tactics, with some tweaks to the code here and there. In 2015, there were some things that proved essential in so many hackers’ tool kits – Why bother with originality when the old tried and true tools work so well?
It’s these standbys that we have to be the most vigilant about, and there’s a lot we can learn from these tools about how we arm ourselves better for 2016 and beyond.
Another New Year’s day has come and gone. As the holiday merriment all but fades away it’s time to start thinking about 2016. ‘Tis is the season when people solemnly swear to themselves to never eat another chocolate chip cookie and to start calling Grandma at least once a week. Great aspirations, to be sure but there is one area that’s often times overlooked when it comes to new year resolutions and it can have huge implications – The resolution to take the safety of your digital identity and assets more seriously in 2016.
As our lives get more digitally-centered by the day, the New Year is the perfect opportunity to assess old habits, ramping up the good ones and throwing out the bad ones. Isn’t your personal information worth just as much pause for thought as that cookie in your hand?
Here are tips to help make sure you are set up for security in 2016.
It’s been said before and we’ll say it again – 2015 was the year of the hack.
Sure, there were major hacks and breaches before 2015, but this was the year when hacking became de rigueur, when hacks went mainstream and became front page news. Often. Very often.
One of the most intriguing aspects of the hacks of 2015 was the scope. No sector was spared from data breaches, from top universities to federal agencies to Steam. It seems like everybody was targeted in 2015, as if the perps did their utmost to reach the widest range of victims. Profiled below are an assortment of people and the hacks that affected them most this year.
2015 is drawing to a close and that can mean only one thing – it’s time to make 2016 predictions! Some people like to prognosticate about which celebs will be dating; others focus on economic forecasts. Some people attempt to prophesy the outcomes of their fantasy football leagues.
Here at ZoneAlarm we extend our totally secure, all the time mantra to peering into the future as well. After all, the bad guys always have one eye on the future, so you should too if you want to stay safe.
To that end, we bring you ZoneAlarm’s predictions for the top 4 PC threats in 2016. These threats are already active, but they seem to be ramping up their game in an alarming way and all of us need to be prepared for them.