FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
Before yesterdayMcAfee Blogs

5 Signs Your Device May be Infected with Malware or a Virus

The malware landscape is growing more complex and costly by the minute, as indicated by the rising number of cyberattacks that grow each year. According to the Federal Bureau of Investigation, in 2024, approximately $1.4 million in losses were reported due to malware. Meanwhile, complaints of ransomware, a type of malware that locks your files until a ransom is paid to release them, rose by 9% from the year prior, with losses totaling nearly $12.5 million. 

With the continued growth of e-commerce, online banking, and artificial intelligence, we can count on even more new cyber threats for all kinds of devices—be it Android, iPhone, PC, or Mac. No device under your family’s roof is immune to cyberattacks. As we speak, one or more of your devices may have already been infected. But would you know it?

In this blog, we’ll dive into the types of viruses and malware that infiltrate devices and their indications, the ways you can remove them, and tips to protect your phones moving forward.

What is malware? 

Malware is malicious software designed to harm your device, steal your personal information, or disrupt your digital life. On mobile devices, malware can take many forms—from apps that secretly collect your data to programs that bombard you with unwanted ads or even lock your device for ransom.

No mobile device is impervious to cyber threats

Mobile devices, including smartphones and tablets, can be infected with malware and other digital threats, even when their operating systems have built-in security features. How does this happen? Your phone can catch viruses and malware in several ways:

  • Malicious apps from unofficial sources. This is the most common way your device could be infected by malware or viruses. Downloading unofficial apps from unvetted third-party websites or app stores significantly increases your device’s risk of being infected with malware that steals your personal information or damages your device.
  • Phishing links. Cybercriminals send deceptive text messages, emails, or social media direct messages that have malicious links. When you tap on these links, they can automatically download malware to your device or redirect you to fake websites that capture your login credentials.
  • Drive-by downloads. This happens when you visit compromised websites that automatically install malware onto your device without your consent or knowledge. Similarly, malicious advertisements on legitimate websites can contain embedded code that infects your device even when just viewed. 
  • Unsecured Wi-Fi networks. Through public Wi-Fi, cybercriminals can create fake networks, monitor traffic on legitimate ones, intercept data, or push malicious content to your device.
  • Outdated operating systems and apps. When you delay or disregard system or software updates, you weaken your security and leave it vulnerable to hackers. Enable automatic updates whenever possible, and regularly check for system and app updates manually, as these include security patches.

Signs of malware or a virus

Malware doesn’t always announce itself with a big flashing sign. On the contrary, it slips quietly into your devices and starts causing trouble behind the scenes. Before long, you will see noticeable changes in its behavior. Here are five key signs of malware or a virus to watch for and catch the problem early, before the damage spreads:

  1. Your device is hot to the touch. When you accidentally download malware, your device’s internal components work harder to support the malware or virus that has been embedded. This may cause your device to feel hot to the touch or even overheat.
  2. Everything feels off. A digital virus can impact every area of a device’s performance, such as causing websites to load more slowly, apps to crash, or your battery to drain more quickly. Overall performance will be sluggish no matter how many times you reboot or delete large files.
  3. More random pop-ups and unfamiliar apps. You may notice an increase in random pop-ups. And if you take a closer look at your app library, you may even see apps you never downloaded.
  4. Fraudulent links sent from your accounts. It’s common for malware to gain access to your phone and then send messages to your contacts to spread the malware. This can happen via email, text, and even social media accounts. You could even see unexpected charges in your phone bill for premium services.
  5. You have unauthorized charges. If you notice unauthorized charges on your credit card or bank statement, a malicious app or malware may have accessed your personal information to make fraudulent purchases or subscriptions. 
  6. Browser redirects or changed search settings. Your web searches redirect to unfamiliar sites, or your default search engine changes without your input. Search malware may have hijacked your browser to generate ad revenue or expose you to harmful websites that can compromise your browsing privacy.
  7. Unknown accessibility services running. Your phone’s accessibility settings show services you didn’t enable. These could have generic names or be disguised as system apps to monitor your activity, capture passwords, and control your device.
  8. Excessive data usage spikes. A dramatic increase in your monthly data consumption while your device usage habits are the same often indicates malware is transmitting your personal information, downloading additional malicious content, or participating in botnet activities using your cellular data.

Viruses and malware that infect mobile devices 

As our phones and tablets become extensions of our daily lives, cybercriminals have developed sophisticated malware explicitly designed to infiltrate them, such as:

  • Adware. This is unwanted software that displays intrusive pop-up ads on your device, invading your privacy by tracking your browsing habits and significantly slowing down your device.
  • Spyware and Stalkerware. These types of malware secretly monitor your activities, including messages, calls, and location data, risking your personal safety and privacy and potentially enabling harassment or abuse.
  • Banking Trojans. These target your financial information by mimicking legitimate banking apps or intercepting login credentials, then access your bank accounts, steal your money, or make payments using your accounts.
  • Ransomware. Here, the malware encrypts and locks your personal files, then demands payment before restoring your access to your own data. Whether or not you pay, you could lose important photos, documents, and files.
  • SMS Trojans. These apps send premium-rate text messages or make unauthorized calls without your knowledge, racking up unexpected charges on your phone bill that can accumulate quickly. 
  • Fleeceware. These apps appear legitimate but charge excessive subscription fees after a short trial period, often making cancellation difficult. The frustrating thing is that you face ongoing financial charges for apps that provide no value.
  • Rogue configuration profiles. Unauthorized settings will be installed on your device, enabling cybercriminals to gain access and monitor your activities.

Find the proof of a virus or malware

Sometimes the warning signs are obvious, but at other times, malware operates quietly in the background, stealing data or draining resources without drawing attention. Find out for sure if your device has a virus or malware by following these steps:

  1. Check battery usage statistics. To check this on Android, navigate to Settings > Battery to see which apps are consuming the most power. On iPhone, check Settings > Battery > Battery Usage by App. Look for unfamiliar apps that use excessive power or apps you rarely use that appear at the top of the list.
  2. Inspect your data usage. Review your data consumption on Android by going to Settings > Network & Internet > Data Usage. For iPhone, head to Settings > Cellular. Look for apps that use more data than expected or unfamiliar apps that consume significant amounts.
  3. Look for apps you didn’t download. Review your app list regularly for unfamiliar applications by going to Android’s Settings > Apps, or check your app drawer. On iPhone, swipe through your home screens and check your App Library. Remove apps you didn’t install, especially those with generic names or no clear purpose.
  4. Review app permissions. Malware sometimes modifies app permissions to access your personal information. On Android, go to Settings > Privacy > Permission Manager to seeAdmin Apps to view which apps have access to your camera, microphone, location, and contacts. On iPhone, check Settings > Privacy & Security. Revoke permissions for apps that don’t need them.
  5. Look deeper into security warnings. Both Android and iOS will alert you to potential security threats. Don’t ignore notifications about potentially harmful apps, suspicious activity, or unknown device logins. Take these alerts seriously and investigate immediately.
  6. Run comprehensive scans with reputable security tools. Use trusted antivirus software to perform full system scans on your mobile devices. Many device manufacturers also provide built-in security scanning features, such as Windows Defender on PCs or Google Play Protect on Android devices.
  7. Review account security alerts and login activity. Major platforms provide account activity logs showing recent logins and locations. Check your email, social media, and banking accounts for alerts about suspicious login attempts or password changes you didn’t initiate.

Here are more specific measures to ascertain the presence of a virus or malware, based on your mobile device’s operating system:

Android phones and tablets

  1. Test your device in Safe Mode. Restart your Android device. As it boots up, tap and hold “Power off” until you see “Reboot to safe mode.” In this mode, only pre-installed apps will run. If your device performs normally here but has issues in regular mode, a downloaded app is likely the culprit.
  2. Review device admin and accessibility services. Go to Settings > Security > Device admin apps to see which apps have administrative privileges. Remove any unfamiliar apps immediately. Also, check Settings > Accessibility for services you haven’t enabled and prevent malware from controlling your device.
  3. Run a Google Play Protect scan. Open Google Play Store, tap your profile picture, then select “Play Protect.” Tap the gear icon and ensure that “Scan apps with Play Protect” is enabled. Then, run a manual scan to check for harmful apps.

iPhone or iPad

  1. Check for unexpected configuration profiles. Go to Settings > General > VPN & Device Management (or Profiles & Device Management). If you see vaguely named profiles that you didn’t install, they could be the culprit. Legitimate profiles from your workplace, school, and services will have clear, recognizable names.
  2. Look for unknown enterprise certificates. Navigate to Settings > General > About > Certificate Trust Settings. Any certificates you don’t recognize, particularly those enabled for full trust, warrant investigation.
  3. Review installed apps and web clips. Check your home screen and App Library for applications you didn’t download. Also, examine Settings > Screen Time > See All Activity to identify apps that consume unusual amounts of time or data. Web clips—website shortcuts that mimic apps—from unknown sources could indicate a compromise.
  4. Examine Safari settings changes. Open Settings > Safari and verify your search engine hasn’t been changed. Also, under Settings > Safari > Extensions, check if new content blockers or extensions have been installed. Unexpected changes to your default search engine or new extensions could redirect your browsing activity and compromise your privacy.
  5. Watch for account compromise indicators. Be alert for unexpected password reset emails, new device logins, or changes to your Apple ID settings that you didn’t make. Check Settings > [Your Name] > Sign-In & Security for any unrecognized devices or suspicious activity.

Action plan to remove viruses from your mobile device 

If you discover malicious apps and profiles in your phone, a clear, step-by-step action plan will help you remove them and restore your device to a secure state. Here’s how to tackle mobile malware confidently and get your device back to normal:

  1. Isolate your device immediately. Turn on airplane mode to stop malware from communicating with external servers while you clean your phone. You can still access your device’s settings and installed apps in airplane mode.
  2. Remove suspicious apps and configuration profiles. On Android, go to Settings > Apps and look for unfamiliar applications, especially those requesting excessive permissions. On iPhone, check Settings > General > VPN & Device Management for unknown configuration profiles. Uninstall any apps you didn’t download from official stores and remove suspicious profiles immediately. Pay attention to apps that appeared recently or have names similar to legitimate apps.
  3. Clear your cache. Open your browser settings and clear all browsing data, including history, cookies, cached files, and saved passwords to remove potentially malicious scripts and tracking elements. On Android Chrome, go to Settings > Privacy and Security > Clear browsing data. On iPhone Safari, go to Settings > Safari > Clear History and Website Data
  4. Revoke risky app permissions. Revoke unnecessary permissions for all apps, especially those that access your camera, microphone, location, or contacts. On Android, go to Settings > Apps > App Permissions. On iPhone, check Settings > Privacy & Security. Take note, particularly for recently installed or suspicious applications.
  5. Update your operating system and all apps. Install all available system updates through Settings > System Update (Android) or Settings > General > Software Update (iPhone). Download apps only through the Google Play Store or Apple App Store.
  6. Run a comprehensive security scan. Use a reputable mobile security app to scan your device thoroughly for malware, potentially unwanted programs, and security vulnerabilities. To know if you have McAfee on your phone, search “McAfee” in your device settings.
  7. Restore from a clean backup if necessary. If the infection persists or causes significant damage, consider restoring your device from a backup that was created before the infection occurred. Both Android and iPhone offer cloud backup services via Google Drive/iCloud that let you restore your data while starting fresh. Ensure the backup version isn’t infected by checking when symptoms first appeared versus when the backup was created.
  8. Escalate to professionals if issues persist. Contact cybersecurity professionals or your device manufacturer if your browser continues to redirect to suspicious websites or if you see evidence of credential or financial theft.

Best digital habits to safeguard your family devices

With a few smart habits and simple tools, you can create a safer digital environment for your family members. Here are some practical ways to safeguard family devices and keep threats at bay.

  • Stay on top of updates. Aside from installing comprehensive security software, be sure to update your device’s security features to have the latest protection from specific attacks.
  • Use strong, unique passwords. Every family device should have a strong password and a unique username. This means changing your factory settings immediately and getting your family on a schedule to change passwords.
  • Enable two-factor authentication (2FA). Double the security to your important accounts by requiring a second form of verification. 2FA significantly reduces the likelihood of unauthorized access, even if your password is stolen.
  • Know your apps. Avoid third-party apps and download apps only from trusted sources. Research the app’s safeguards and read reviews before installing. A best practice is to stick to apps from the officially verified app stores.
  • Don’t click that link. Slow down and note your digital surroundings. Does that link or attachment look dubious? Malware and viruses are usually loaded onto your devices through unsolicited emails and text messages, or via trusted social media circles.
  • Lock settings and limit app permissions. A great way to block malware is to make all accounts private and limit app permissions. Instead of keeping an app’s permissions “always-on,” change the setting so it asks permission every time. Decline an app’s request to access your contacts or connect to other apps in your digital ecosystem.
  • Clear browsing history. Go through your history and data to check for suspicious links. Clear browsing history regularly by going to your browser, clicking on the three dots in the upper right corner, and clicking “delete browsing data.”
  • Avoid public Wi-Fi or use a secure VPN. Public networks are often unsecured and can expose your data to cybercriminals. If you must connect while in public, consider using a virtual private network or your mobile data hotspot instead.

Final thoughts

While the threat of malware and viruses continues to evolve, you now have the knowledge and tools to stay digitally protected. The signs we’ve discussed—from unexpected device behavior to suspicious pop-ups—serve as warnings, helping you catch problems before they escalate into major security incidents.

Your best defense combines proactive security measures and vigilant behavior. Applying simple, solid digital habits such as updating software, using strong passwords, and staying alert to suspicious activity will thwart the vast majority of common threats. By incorporating these practices into your routine, along with the right online security tools, you are building a robust defense that works around the clock.

The post 5 Signs Your Device May be Infected with Malware or a Virus appeared first on McAfee Blog.

How Data Brokers Sell Your Identity

Data Privacy Week is here, and there’s no better time to shine a spotlight on one of the biggest players in the personal information economy: data brokers. These entities collect, buy, and sell hundreds—sometimes thousands—of data points on individuals like you. But how do they manage to gather so much information, and for what purpose? From your browsing habits and purchase history to your location data and even more intimate details, these digital middlemen piece together surprisingly comprehensive profiles. The real question is: where are they getting it all, and why is your personal data so valuable to them? Let’s unravel the mystery behind the data broker industry.

What are data brokers?

Data brokers aggregate user info from various sources on the internet. They collect, collate, package, and sometimes even analyze this data to create a holistic and coherent version of you online. This data then gets put up for sale to nearly anyone who’ll buy it. That can include marketers, private investigators, tech companies, and sometimes law enforcement as well. They’ll also sell to spammers and scammers. (Those bad actors need to get your contact info from somewhere — data brokers are one way to get that and more.)

And that list of potential buyers goes on, which includes but isn’t limited to:

  • Tech platforms
  • Banks
  • Insurance companies
  • Political consultancies
  • Marketing firms
  • Retailers
  • Crime-fighting bureaus
  • Investigation bureaus
  • Video streaming service providers
  • Any other businesses involved in sales

These companies and social media platforms use your data to better understand target demographics and the content with which they interact. While the practice isn’t unethical in and of itself (personalizing user experiences and creating more convenient UIs are usually cited as the primary reasons for it), it does make your data vulnerable to malicious attacks targeted toward big-tech servers.

How do data brokers get your information?

Most of your online activities are related. Devices like your phone, laptop, tablets, and even fitness watches are linked to each other. Moreover, you might use one email ID for various accounts and subscriptions. This online interconnectedness makes it easier for data brokers to create a cohesive user profile.

Mobile phone apps are the most common way for data brokerage firms to collect your data. You might have countless apps for various purposes, such as financial transactions, health and fitness, or social media.

A number of these apps usually fall under the umbrella of the same or subsidiary family of apps, all of which work toward collecting and supplying data to big tech platforms. Programs like Google’s AdSense make it easier for developers to monetize their apps in exchange for the user information they collect.

Data brokers also collect data points like your home address, full name, phone number, and date of birth. They have automated scraping tools to quickly collect relevant information from public records (think sales of real estate, marriages, divorces, voter registration, and so on).

Lastly, data brokers can gather data from other third parties that track your cookies or even place trackers or cookies on your browsers. Cookies are small data files that track your online activities when visiting different websites. They track your IP address and browsing history, which third parties can exploit. Cookies are also the reason you see personalized ads and products.

How data brokers sell your identity

Data brokers collate your private information into one package and sell it to “people search” websites. As mentioned above, practically anyone can access these websites and purchase extensive consumer data, for groups of people and individuals alike.

Next, marketing and sales firms are some of data brokers’ biggest clients. These companies purchase massive data sets from data brokers to research your data profile. They have advanced algorithms to segregate users into various consumer groups and target you specifically. Their predictive algorithms can suggest personalized ads and products to generate higher lead generation and conversation percentages for their clients.

Are data brokers legal?

We tend to accept the terms and conditions that various apps ask us to accept without thinking twice or reading the fine print. You probably cannot proceed without letting the app track certain data or giving your personal information. To a certain extent, we trade some of our privacy for convenience. This becomes public information, and apps and data brokers collect, track, and use our data however they please while still complying with the law.

There is no comprehensive privacy law in the U.S. on a federal level. This allows data brokers to collect personal information and condense it into marketing insights. While not all methods of gathering private data are legal, it is difficult to track the activities of data brokers online (especially on the dark web). As technology advances, there are also easier ways to harvest and exploit data.

As of March 2024, 15 states in the U.S. have data privacy laws in place. That includes California, Virginia, Connecticut, Colorado, Utah, Iowa, Indiana, Tennessee, Oregon, Montana, Texas, Delaware, Florida, New Jersey, and New Hampshire.[i] The laws vary by state, yet generally, they grant rights to individuals around the collection, use, and disclosure of their personal data by businesses.

However, these laws make exceptions for certain types of data and certain types of collectors. In short, these laws aren’t absolute.

Can you remove yourself from data broker websites?

Some data brokers let you remove your information from their websites. There are also extensive guides available online that list the method by which you can opt-out of some of the biggest data brokering firms. For example, a guide by Griffin Boyce, the systems administrator at Harvard University’s Berkman Klein Center for Internet and Society, provides detailed information on how to opt-out of a long list of data broker companies.

Yet the list of data brokers is long. Cleaning up your personal data online can quickly eat up your time, as it requires you to reach out to multiple data brokers and opt-out.

Rather than removing yourself one by one from the host of data broker sites out there, you have a solid option: our Personal Data Cleanup.

Personal Data Cleanup scans data broker sites and shows you which ones are selling your personal info. It also provides guidance on how you can remove your data from those sites. And if you want to save time on manually removing that info, you have options. Our McAfee+ Advanced and Ultimate plans come with full-service Personal Data Cleanup, which sends requests to remove your data automatically.

If the thought of your personal info getting bought and sold in such a public way bothers you, our Personal Data Cleanup can put you back in charge of it.

[i] https://pro.bloomberglaw.com/insights/privacy/state-privacy-legislation-tracker/

 

The post How Data Brokers Sell Your Identity appeared first on McAfee Blog.

RockYou2024: Unpacking the Largest Password Leak in History

This Fourth of July brought fireworks in the form of a digital security breach, one that has been recorded as the most significant password leak in history. Dubbed RockYou2024, this colossal data dump was unveiled by a user named “ObamaCare” on a prominent hacking forum, revealing a staggering 9.9 billion unique passwords in plain text.

The Scale of RockYou2024

The sheer volume of compromised passwords is enough to make any security enthusiast’s head spin. RockYou2024 isn’t just a leak; it’s a behemoth collection of 9,948,575,739 passwords that could potentially affect millions of users worldwide. This event marks a critical point in cybersecurity, underscoring the relentless pace at which digital threats are evolving.

What’s Old is New Again

However, it’s crucial to note that RockYou2024, despite its unprecedented scale, is primarily a compilation of previously leaked passwords, building upon its predecessor, RockYou2021, which contained 8.4 billion passwords. This revelation might diminish the shock value for some, but it doesn’t reduce the threat level.

Implications of the Leak

According to Cybernews, which first reported on this massive compilation, RockYou2024 poses a significant threat to any system vulnerable to brute-force attacks. This includes not just online platforms but also offline services, internet-facing cameras, and even industrial hardware. When paired with other leaked databases that might include email addresses and other personal information, the potential for widespread data breaches, financial fraud, and identity theft escalates dramatically.

How to protect yourself

Despite RockYou2024 being a collection of older breaches, the updated and maintained list means everyone should remain vigilant. It is crucial to take steps to protect yourself from potential fraud or identity theft. While RockYou2024 might predominantly consist of recycled material from past leaks, it serves as a potent reminder of the ongoing cybersecurity battles. Proper password management and security measures are more crucial than ever. In today’s digital age, staying ahead means staying aware and taking proactive steps to protect your digital identity. Consider implementing the following measures:

  1. Monitor Your Accounts: Regularly review your bank statements, credit card statements, and other financial accounts for any unauthorized transactions.
  2. Change Passwords: Update your passwords for all online accounts, including your AT&T account. Use strong, unique passwords and consider using a password manager to securely store them.
  3. Enable Two-Factor Authentication: Enable two-factor authentication whenever possible to add an extra layer of security to your accounts.
  4. Be Cautious of Phishing Attempts: Stay vigilant against phishing emails, calls, or texts that may try to trick you into revealing sensitive information. Be skeptical of any unsolicited communications and verify the source before sharing any personal data
  5. Enroll in an Identity Monitoring service: McAfee+ can help keep your personal info safe, with early alerts if your data is found on the dark web. We’ll monitor the dark web for your personal info, including email, government IDs, credit card and bank account numbers, and more
  6. Protect your Personal info: Protection solutions like McAfee’s Personal Data Cleanup feature can help. It scours the web for traces of your personal info and helps remove it for your online privacy.

McAfee+ provides AI-Powered technology for real-time protection against new and evolving threats. With our data protection and custom guidance (complete with a protection score for each platform and tips to keep you safer), you can be sure that your internet identity is protected.

The post RockYou2024: Unpacking the Largest Password Leak in History appeared first on McAfee Blog.

What to Do If You’re Caught Up in a Data Breach

It happens with more regularity than any of us like to see. There’s either a headline in your news feed or an email from a website or service you have an account with—there’s been a data breach. So what do you do when you find out that you and your information may have been caught up in a data breach? While it can feel like things are out of your hands, there are actually several things you can do to protect yourself. 

Let’s start with a look at what kind of information may be at stake and why crooks value that information so much (it’s more reasons than you may think). 

What can get exposed in a data breach?  

The fact is that plenty of our information is out there on the internet, simply because we go about so much of our day online, whether that involves shopping, banking, getting results from our doctors, or simply hopping online to play a game once in a while.  

Naturally, that means the data in any given breach will vary from service to service and platform to platform involved. Certainly, a gaming service will certainly have different information about you than your insurance company. Yet broadly speaking, there’s a broad range of information about you stored in various places, which could include:  

  • Username and password 
  • E-mail address 
  • Phone numbers and home address 
  • Contact information of friends and family 
  • Date of birth 
  • Driver’s license number 
  • Credit card and debit card numbers, bank account details 
  • Purchase history and account behavior history 
  • Patient information (in the case of healthcare breaches) 
  • Social Security Number or Tax ID Number 

As to what gets exposed and when you might find out about it, that can vary greatly as well. One industry research report found that the median time to detect breaches is 5 days. Needless to say, the timeline can get rather stretched before word reaches you, which is a good reason to change your passwords regularly should any of them get swept up in a breach. (An outdated password does a hacker no good—more on that in a bit.) 

What do crooks do with this kind of information? 

The answer is plenty. In all, personal information like that listed above has a dollar value to it. In a way, your data and information are a kind of currency because they’re tied to everything from your bank accounts, investments, insurance payments—even tax returns and personal identification like driver’s licenses.  

With this information in hand, a crook can commit several types of identity crime—ranging from fraud to theft. In the case of fraud, that could include running up a bill on one of your credit cards or draining one of your bank accounts. In the case of theft, that could see crooks impersonate you so they can open new accounts or services in your name. Beyond that, they may attempt to claim your tax refund or potentially get an ID issued in your name as well. 

Another possibility is that a hacker will simply sell that information on the dark marketplace, perhaps in large clumps or as individual pieces of information that go for a few dollars each. However it gets sold, these dark-market practices allow other fraudsters and thieves to take advantage of your identity for financial or other gains.  

Most breaches are financially motivated, with some researchers saying that 97% of breaches are about the money. However, we’ve also seen hackers simply dump stolen information out there for practically anyone to see. The motivations behind them vary, yet they could involve anything from damaging the reputation of an organization to cases of revenge.   

Noteworthy examples of data breaches 

A list of big data breaches is a blog article of its own, yet here’s a quick list of some of the largest and most impactful breaches we’ve seen in recent years: 

  • Facebook – 2019: Two datasets leaked the records of more than 530 million users, including phone numbers, account names, Facebook IDs, and more. 
  • Marriott International (Starwood) – 2018. Leakage of 500,000 guest names, emails, actual mailing addresses, phone numbers, passport numbers, Starwood Preferred Guest account information, date of birth, and information about stays. 
  • Equifax – 2017. Approximately 147 million records, including name, address, date of birth, driver’s license numbers, and Social Security Numbers were leaked, as well as credit card information for a further 200,000 victims. 

Needless to say, it’s not just the big companies that get hit. Healthcare facilities have seen their data breached, along with the operations of popular restaurants. Small businesses find themselves in the crosshairs as well, with one report stating that 43% of data leaks target small businesses. Those may come by way of an attack on where those businesses store their records, a disgruntled employee, or by way of a compromised point-of-sale terminal in their store, office, or location. 

In short, when it comes to data breaches, practically any business is a potential target because practically every business is online in some form or fashion. Even if it’s by way of a simple point-of-sale machine. 

What to do if you think your information may have been exposed by a breach 

When a business, service, or organization falls victim to a breach, it doesn’t always mean that you’re automatically a victim too. Your information may not have been caught up in it. However, it’s best to act as if it was. With that, we strongly suggest you take these immediate steps. 

1. Change your passwords and use two-factor authentication 

Given the possibility that your password may be in the hands of a hacker, change it right away. Strong, unique passwords offer one of your best defenses against hackers. Update them regularly as well. As mentioned above, this can protect you in the event a breach occurs and you don’t find out about it until well after it’s happened. You can spare yourself the upkeep that involves a password manager that can keep on top of it all for you. If your account offers two-factor authentication as part of the login process, make use of it as it adds another layer of security that makes hacking tougher.  

2. Keep an eye on your accounts 

If you spot unusual or unfamiliar charges or transactions in your account, bank, or debit card statements, follow up immediately. That could indicate improper use. In general, banks, credit card companies, and many businesses have countermeasures to deal with fraud, along with customer support teams that can help you file a claim if needed. 

3. Sign up for an identity protection service 

If you haven’t done so already, consider signing up for a service that can monitor dozens of types of personal information and then alert you if any of them are possibly being misused. Identity protection such as ours gives you the added benefit of a professional recovery specialist who can assist with restoring your affairs in the wake of fraud or theft, plus up to $1 million in insurance coverage 

What if I think I’m the victim of identity theft? 

Our advice is to take a deep breath and get to work. By acting quickly, you can potentially minimize and even prevent any damage that’s done. With that, we have two articles that can help guide the way if you think you’re the victim of identity theft, each featuring a series of straightforward steps you can take to set matters right: 

Again, if you have any concerns. Take action. The first steps take only minutes. Even if the result is that you find out all’s well, you’ll have that assurance and you’ll have it rather quickly. 

The post What to Do If You’re Caught Up in a Data Breach appeared first on McAfee Blog.

How to Protect Yourself From Identity Theft After a Data Breach

Did you just get word that your personal information may have been caught up in a data breach? If so, you can take steps to protect yourself from harm should your info get into the hands of a scammer or thief. 

How does that information get collected in the first place? We share personal information with companies for multiple reasons simply by going about our day—to pay for takeout at our favorite restaurant, to check into a hotel, or to collect rewards at the local coffee shop. Of course, we use our credit and debit cards too, sometimes as part of an online account that tracks our purchase history.  

In other words, we leave trails of data practically wherever we go these days, and that data is of high value to hackers. Thus, all those breaches we read about.  

Data breaches are a (sad) fact of life  

Whether it’s a major breach that exposes millions of records or one of many other smaller-scale breaches like the thousands that have struck healthcare providers, each one serves as a reminder that data breaches happen regularly and that we could find ourselves affected. Depending on the breach and the kind of information you’ve shared with the business or organization in question, information stolen in a breach could include:  

  • Usernames and passwords  
  • Email addresses  
  • Phone numbers and home addresses  
  • Contact information for friends and family members  
  • Birthdays and driver’s license numbers  
  • Credit and debit card numbers or bank account details  
  • Purchase history and account activity  
  • Social security numbers  

What do crooks do with that data? Several things. Apart from using it themselves, they may sell that data to other criminals. Either way, this can lead to illicit use of credit and debit cards, draining of bank accounts, claiming tax refunds or medical expenses in the names of the victims, or, in extreme cases, assuming the identity of others altogether.   

Examples of data breaches over the recent years  

In all, data is a kind of currency in of itself because it has the potential to unlock several aspects of victim’s life, each with its own monetary value. It’s no wonder that big breaches like these have made the news over the years, with some of the notables including:  

  • U-Haul – 2022: A breach which accessed their customer contracts system between November 2021 and April 2022 exposed the names, driver’s license numbers, and state ID numbers of 2.2 million renters.  
  • Los Angeles Unified School District – 2022: Hackers released 500 GB of highly sensitive information after a breach and when their subsequent ransomware demands were not met, exposing Social Security and passport numbers, health information, and psychological assessments of some students. 
  • Facebook – 2021: Two sets of data exposed the records of more than 530 million users, including phone numbers, account names, and Facebook IDs. According to Facebook, the source of the breach dated back to 2019, at which time the flaw was remedied, even though the information was exposed in 2021. 
  • Marriott International (Starwood) – 2018: Half a million guests had names, email and physical mailing addresses, phone numbers, passport numbers, Starwood Preferred Guest account information, dates of birth, and other information about their stays exposed.  
  • Equifax – 2017: Some 147 million records that included names, addresses, dates of birth, driver’s license numbers, and Social Security Numbers were exposed, along with a relatively small subset of 200,000 victims having their credit card information exposed as well.  

As mentioned, these are big breaches with big companies that we likely more than recognize. Yet smaller and mid-sized businesses are targets as well, with some 43% of data breaches involving companies of that size. Likewise, restaurants and retailers have seen their Point-of-Sale (POS) terminals compromised, right on down to neighborhood restaurants.  

Staying secure in light of data breaches  

When a company experiences a data breach, customers need to realize that this could impact their online safety. If your favorite coffee shop’s customer database gets leaked, there’s a chance that your personal or financial information was exposed. However, this doesn’t mean that your online safety is doomed. If you think you were affected by a breach, you can take several steps to protect yourself from the potential side effects.   

1. Keep an eye on your bank and credit card accounts 

One of the most effective ways to determine whether someone is fraudulently using one or more of your accounts is to check your statements. If you see any charges that you did not make, report them to your bank or credit card company immediately. They have processes in place to handle fraud. While you’re with them, see if they offer alerts for strange purchases, transactions, or withdrawals.  

Our credit monitoring service can help you keep an eye on this. It monitors changes to your credit score, report, and accounts with timely notifications and guidance so you can take action to tackle identity theft. 

2. Monitor your identity with the help of a service

Breached and stolen information often ends up in dark web marketplaces where hackers, scammers, and thieves purchase it to commit yet more crime. Once it was difficult to know if your information was caught up in such marketplaces, yet now an identity monitoring service can do the detective work for you. 

Our service monitors the dark web for your personal info, including email, government IDs, credit card and bank account info, and more. This can help keep your personal info safe with early alerts that show you if your data is found on the dark web, an average of 10 months ahead of similar services.​ From there, you’ll get guidance that you can act on, which can help protect your info and accounts from theft. 

3. Place a fraud alert

If you suspect that your data might have been compromised, place a fraud alert on your credit. This not only ensures that any new or recent requests undergo scrutiny, but also allows you to have extra copies of your credit report so you can check for suspicious activity. You can place one fraud alert with any of the three major credit reporting agencies (Equifax, Experian, TransUnion) and they will notify the other two. A fraud alert typically lasts for a year, although there are options for extending it as well.  

4. Look into freezing your credit if needed 

Freezing your credit will make it highly difficult for criminals to take out loans or open new accounts in your name, as a freeze halts all requests to pull your credit—even legitimate ones. In this way, it’s a far stronger measure than placing a fraud alert. Note that if you plan to take out a loan, open a new credit card, or other activity that will prompt a credit report, you’ll need to take extra steps to see that through while the freeze is in place. (The organization you’re working with can assist with the specifics.) Unlike the fraud alert, you’ll need to contact each major credit reporting agency to put one in place. Also, a freeze lasts as long as you have it in place. You’ll have to remove it yourself, again with each agency.  

You can centrally manage this process with our security freeze service, which stops companies from looking at your credit profile, and thus halts the application process for loans, credit cards, utilities, new bank accounts, and more. A security freeze won’t affect your credit score. ​ 

5. Update your passwords 

Ensure that your passwords are strong and unique. Many people utilize the same password or variations of it across all their accounts. Therefore, be sure to diversify your passcodes to ensure hackers cannot obtain access to all your accounts at once, should one password be compromised. You can also employ a password manager to keep track of your credentials, such as the one you’ll find in comprehensive online protection software.  

6. Consider taking out identity theft coverage 

If the unfortunate happens to you, an identity theft coverage & restoration service can help you get back on your feet. Ours offers $1 million in coverage for lawyer fees, travel expenses, and stolen funds reimbursement. It further provides support from a licensed recovery expert who can take the needed steps to repair your identity and credit. In all, it helps you recover the costs of identity theft along with the time and money it takes to recover from it. 

7. Clean up your personal data online

You can take this step any time, even if you haven’t been caught up in a data breach. The fact is that data broker companies collect and sell thousands of pieces of information on millions and millions of people worldwide, part of a global economy estimated at $200 billion U.S. dollars a year. And they’ll sell it to anyone—from advertisers for their campaigns, to scammers who will use it for spammy emails, texts, and calls, and to thieves who use that information for identity theft.  

Yet you can clean it up. Our personal data cleanup service can scan some of the riskiest data broker sites and show you which ones are selling your personal info. It also provides guidance on how you can remove your data from those sites and, with select products, even manage the removal for you. 

8. Use online protection software and expand your security toolbox 

Comprehensive online protection software will offer you the tools and services listed above, along with further features that can protect you online. That includes a VPN to keep your time online more private from online data collection while protecting it from thieves who’re out to steal credit card and account information. It also includes web browsing protection that can warn you of sketchy websites and malicious downloads that look to steal your information. In all, it’s thorough protection for your devices, privacy, and identity. And in a time of data breaches, that kind of protection has become essential.   

The post How to Protect Yourself From Identity Theft After a Data Breach appeared first on McAfee Blog.

❌