Tag: credential loss

June 11, 2021

RockYou2021 Password Leak Supercharges Dark Web Danger

The RockYou2021 password leak creates fuel for cybercrime & danger for businesses. here’s how to secure your systems & data from trouble.

Read More
February 25, 2021

Don’t Make Friends With Social Media Phishing Scammers

Social media phishing scammers are proliferating as cybercriminals look for ways to capture credentials & data in a challenging economy.

Read More
protect data from cyberattacks wth secure identity and access management illustrated by a series of cartoon clouds with locks
January 05, 2021

Protect Data from Cyberattacks with 1 Multifunctional Weapon

What if you could protect data from cyberattacks with just one affordable multifunctional security tool? You can – and here’s how to do it.

Read More
stolen data in the pot aty a dark web poker game represented by a computer keyboard with poker ships and cards on it.
October 20, 2020

Is Your Stolen Data in the Pot at a Poker Game?

Cybercriminals are hungry for data like PII and password lists, because data is currency on the Dark Web, and used for everything from payments to poker games.

Read More
September 06, 2018

The Week in Breach

Breaches are flying high this week thanks to Air Canada! China’s hospitality industry targeted and the data shows up on the Dark Web. And, in an effort to cut out Google’s cut, the creators of the game Fortnite create massive security challenges for unwitting gamers.

Read More
June 28, 2018

Big Data Big Breach

Your name, the gender of your kids, your interests, your religion and a lot of the things that make you… well YOU, have been exposed. In the last couple of years, the idea of one’s personal information being obtained by hackers has become more than familiar to the general public. If a website you use is compromised, you change your password. If your credit card was skimmed while filling up your car, you get a new card and contact your bank. One’s digital identity is constantly under attack and most of us have come to accept this. This kind of breach can be countered with identity monitoring, good password hygiene and general attentiveness to one’s activity online. The kind of data that the Florida-based marketing firm Exactis has left exposed, sourced from millions of Americans and businesses, is much more… intimate.

Read More
June 12, 2018

The Week in Breach: 6/04/2018 – 6/10/2018

Breach news to share with your customers! This week shows no shortage of targeted attacks designed to extract large datasets from a broad range of consumer sites. Travel, finance and entertainment sites were targeted, impacting more than 100,000,000 unsuspecting victims. If anything, this week clearly demonstrates why individuals need to proactively monitor for their compromised data with tools like ID Agent’s SpotLight ID – Personal Identity & Credit Monitoring Solutions. The events of this week also clearly demonstrate why businesses must monitor for compromised credentials that can be used to exploit internal systems and to compromise or takeover customer accounts.

Read More
June 06, 2018

The Week in Breach: 5/28/18 – 5/03/18

Breach news to share with your customers! Highlights from The Week in Breach: – Finance sector attacks ramping up – BackSwap JavaScript injections effectively circumventing detection – Honda has leaky buckets too

Read More
May 30, 2018

The Week in Breach: 5/21/18 – 5/27/18

Breach news to share with your customers! Highlights from The Week in Breach: – You’d better reboot your router… NOW! – Nation states injecting malicious apps into play stores to steal your stuff. – Malware infects healthcare system impacting 500,000 Marylanders. – Time from detection to acknowledgment and response getting slower and slower and slower.

Read More
May 23, 2018

The Week in Breach: 5/14/18 – 5/20/18

The Week in Breach: 5/14/18 – 5/20/18 Breach news to share with your customers! Highlight’s from The Week in Breach: Ransomware still plaguing state and local agencies Accidental data disclosures on the rise AWS implementation flaws create security flaws compromised

Read More

Please fill in the form below to subscribe to our blog

[class^="wpforms-"]
[class^="wpforms-"]