Still think this is not a big deal? Your information will be used to make purchases, commit crimes, request new credit cards, provide medical care to others, and more.
All the charges are in your name. And you have to prove it wasn't you! It isn't easy. The criminals have so much information about you, and they have much more experience in it than you do.
Every online action puts your information at risk.Protect your family
Latest news and videos
Click on the image to watch the video
Review pricing and buy now
What is happening in cyber
The news tends to blame hackers for cyber breaches. But research shows there is another cause for over 80% of breaches. This Insight looks at that cause, how it occurs, and suggests ways to be safer.
Apple aims to keep tight control over its environment. This has led to lawsuits to force acceptance of app stores other than Apple’s. In this case browser extension apps in the other stores were corrupted. Anyone downloading apps from the non-Apple store got malware in the app that could steal your data.
Apple's tight security vindicated
Ransomware attackers are exploiting Amazon Web Services own encryption to encrypt user data. If the demanded ransom is not paid within 7 days, the data is deleted by the attackers.