Cyber Security Articles & News

Who Has Your Data?

Hackers are getting bolder. Here’s how to fight back

Imagine you've just had your smartphone stolen and are desperate to get it returned, along with the data it contains. You track it with the Find My iPhone app and send messages offering to buy it back. In response, you get a link to click. That’s a trap designed to steal your username and password. Click it and enter your credentials, and you’ll join the ranks of those hacked by crooks playing on a weakness—your urgent need to get back your phone. 

According to the Identity Theft Resource Center, data breaches hit an all-time high in 2016, up 40 percent over 2015. Over half of those hacks resulted in Social Security numbers and other critical data being stolen.

Watching out for these common scams will help keep your identity safe.

Read the scams here.

Source: AARP

Topics: spear phishing, smartphone, cyber security expert, data breaches increasing, hackers, keynote speaker, Social Security numbers, personal data, phishing, ransomware, remote PC-repair plans, Identity Theft Resource Center, Kevin Mitnick, malicious software

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

What's Included in a Penetration Test Report?

Penetration tests are an extremely useful exercise to mitigate risks and patch your security gaps. If you’ve been asking yourself why do penetration t..

Read more ›

What Is Pivoting in Cyber Security and What Does It Mean for Pentesters?

Data breaches in 2022 were abundant and sophisticated. Realistically, it’s expected that this year we will continue to see threat actors test their li..

Read more ›

What Is One-time Password (OTP) Social Engineering?

Even if your business has a mature cybersecurity program, there may be one vulnerability that threat actors can still use to steal your company data: ..

Read more ›
tech-texture-bg