article thumbnail

The Data Breach "Personal Stash" Ecosystem

Troy Hunt

LeakedSource services were often advertised on hacking forums and there was suspicion that its operators were actively looking to hack organizations whose data they could add to their database. You may only search information about yourself, or those you are authorized in writing to do so. That's not going to keep you out of trouble!

article thumbnail

MY TAKE: How consumer-grade VPNs are enabling individuals to do DIY security

The Last Watchdog

I’ve written this countless times: keep your antivirus updated, click judiciously, practice good password hygiene. The leading B2C VPNs all recognize this and have begun promoting the use of personal VPNs as, essentially, a DIY security tool. Related: Privacy war: Apple vs. Facebook. percent ten years ago.

B2C 214
article thumbnail

Be Wary of Scammers in the Holiday Season

Security Through Education

In October, Cybersecurity Awareness Month taught us the importance of safe practices such as the use of multifactor authentication, strong passwords, and VPNs. These may come in the form of phishing emails, text messages or advertisements while online shopping. Also, beware of fake in-app purchases or shared links on social media.

Scams 59