You are here: Features Drew's News

Drew's News

What Everyone Should Do as a Result of the Yahoo Breach

Yahoo announced on September 22 that user account information associated with at least 500 million accounts was stolen in late 2014. The information stolen may include names, email address, telephone numbers, dates of birth, hashed passwords, encrypted and unencrypted security questions and answers. The ongoing investigation hasn't uncovered any evidence that unprotected passwords, payment card or bank information was included. Payment card and bank information was not stored in the affected system. Yahoo is notifying potentially affected users by email.

Yahoo has provided the following information:

Read on

Facebook User? Be Alert for These Scams

With millions of daily users, Facebook has become an effective way for scammers to find victims. There are many scams and variations. Most are after your personal information either through phishing or malware. Some disappear for a while but return, sometimes with a new twist. Some of these scams or variants have also appeared in emails or on other sites. While a hoax typically doesn't pose a threat to your personal information, they are deceiving.  Here are some of the most prevalent scams and hoaxes.

Read on

Medical ID Theft: What Do You Need to Know?

Medical identity theft is a fast growing type of identity theft. It is the use of your name and/or your health insurance information, including your social security number and address, to steal medical services. The thieves use the information to see doctors, get prescriptions, file insurance claims, get medical devices or equipment and many other services. And many are savvy enough to avoid raising red flags with service providers.

Read on

Should You Be Worried About Ransomware?

Recently, there has been an increase in businesses and individuals reporting that they have been affected by ransomware. Ransomware is malicious software (malware) that prevents access, usually by encryption, to some or all of the files on computer hard drives. The software then informs the user that the only way to regain access to the files is to pay a ransom. The ransom must be paid using some type of digital currency such as bitcoins. Ransomware can end up on your computer through phishing emails, infected attachments, or infected websites.

Read on

Protecting Your Privacy with the Internet of Things

What do thermostats, activity trackers, light bulbs, light switches, refrigerators, coffee makers, baby monitors, televisions, door locks, security camera and many other devices have in common? They have a version that can connect to the Internet and can be controlled through an app. The term Internet of Things (IoT) describes the capability of everyday devices to connect to other devices and to people through the Internet. While this brings convenience, it also brings concerns about protecting your personal information.

Read on

What Should You Look For in a Privacy Policy?

When was the last time you looked at a website's privacy policy? Typically, most people don't look at privacy policies unless forced. Some sites, when they've updated their privacy policy, don't allow users to view the site until they indicate they have seen the policy. While reviewing privacy policies can be time consuming, it's important to do so to protect the information that is important to you.

Read on

Page 4 of 24