Emerging Threats
Emerging threats
Not only do we notify you of the latest outbreaks to be aware of, we also want to educate you about how to stay safe against these threats.
-
What is riskware + how to spot and avoid it in 2023
Riskware refers to legitimate software that can potentially threaten your cybersecurity. Read our guide to learn how to spot and avoid riskware in 2023.
-
Special Issue Norton Cyber Safety Pulse Report – The Cyber Risks of ChatGPT
In this special issue of the Norton Pulse Report, Norton Labs explores how cyber criminals could leverage Chat GPT to enhance their scams.
-
How hackers access your computer
Most hacking targets are vulnerable, unpatched computers that can be hijacked and used to launch attacks and more. Find out why you’re just as much as a target as the big bank on the corner.
-
Online scams: An overview + 20 internet scams to avoid in 2023
How do online scams work? Use this guide on different types of online scams to help protect your devices and data from internet scamming and other cyberthreats.
-
How to remove a fake virus alert: A step-by-step guide
A fake virus alert is a deceptive hacking tool. Learn how to remove fake virus pop-ups, spot warning signs, as well as tips to help keep your devices safe.
-
115 cybersecurity statistics + trends to know in 2023
Explore these 115 cybersecurity statistics to understand the latest cybercrime rates and cybersecurity trends currently shaping the hacking industry.
-
12 social media threats to watch for in 2023
What’s the difference between the deep web vs. the dark web? Turn to this overview to learn how they both work and for tips for those surfing the deep web and dark web.
-
Ransomware statistics: 102 facts and trends you need to know in 2023
Use this overview of 102 ransomware statistics to learn about the latest ransomware attacks and how to better protect your personal devices and information.
-
What is smishing + smishing attack protection tips for 2022
Use this smishing guide to learn about how smishing attacks work, including real-life smishing examples, and smishing scam protection tips to elevate your mobile device security.
-
Dictionary attack: A definition + 10 dictionary attack protection tips
Use this smishing guide to learn about how smishing attacks work, including real-life smishing examples, and smishing scam protection tips to elevate your mobile device security.
-
Deep web vs. dark web: What’s the difference?
What’s the difference between the deep web vs. the dark web? Turn to this overview to learn how they both work and for tips for those surfing the deep web and dark web.
-
Password spraying 101: An overview + password spraying protection tips
Password spraying is when cybercriminals guess the passwords of their potential victims, often on a large scale. Learn how to protect your credentials.
-
15 types of hackers + hacking protection tips for 2022
Learn about the different types of hackers that exist online and their motives. Plus, pore over a timeline of hacking’s evolution and tips to help keep you safe online.
-
What is malware + how to prevent malware attacks in 2022
Consider this your ultimate guide to malware, including a malware definition and ways to help protect yourself against malware.
-
Password attack 101: A definition + 10 types of password attacks to avoid
This password attack protection guide overviews common types of password attacks, as well as password attack prevention tips to help improve your privacy and cybersecurity.
-
What is the difference between black, white and gray hat hackers?
Hackers can be categorized by the type of metaphorical “hat” they wear. What is the difference between black hat, white hat, and gray hat hackers? Learn more.
-
Shareware: An overview + the cost of ‘free’ software
Shareware is a type of software that is freely distributed to users. The intent of the software developer is to convert free users to paying customers in the future.
-
What is an advanced persistent threat (APT)?
Consider this your go-to guide for advanced persistent threat protection, including how APT attacks work and APT attacks to watch for.
-
Whaling attack: What it is + whaling protection tips
Also known as “executive phishing,” whaling attacks are something high-level executives and digital citizens alike should be aware of. Consider this your go-to guide about what is whaling, plus whaling protection tips.
-
Brute force attack: A definition + 6 types to know
What are data loss prevention tools you can use to protect your network? Read further to educate yourself on some DLP best practices and level up your cybersecurity as a whole.
-
Data loss prevention: What is DLP + how does it work?
What are data loss prevention tools you can use to protect your network? Read further to educate yourself on some DLP best practices and level up your cybersecurity as a whole.
-
Credential stuffing simplified + attack protection tips | Norton
A guide covering just what is credential stuffing, how credential stuffing attacks occur, and methods for protecting your computer’s operating systems.
-
GPS spoofing: What it is + spoofing attacks to watch for
An overview of GPS spoofing, meaning when technology or a person alters data so that a device appears in a different location or time zone, and how to avoid it.
-
Hacktivism: An overview plus high-profile groups and examples
Hacktivism is a new type of activism. Here’s an overview of the concept, as well as hacktivism groups that have made headlines through their attacks.
-
What is a smurf attack, plus smurf attack prevention pointers
An overview of what is a smurf attack, the parts that play into smurfing, how it results in DDoS attacks, plus pointers for smurf attack prevention
-
What is a watering hole attack + how to prevent one
Consider this your ultimate guide to watering hole attacks, including what is a watering hole attack, real-life examples, and watering hole prevention tips.
-
How you can fight disinformation on social media
Here’s a look at the challenges facing social media platforms and how you can steer clear of disinformation this season.
-
How to spot deepfake videos — 15 signs to watch for
Deepfake videos could have serious implications during the 2020 election season. Learn why.
-
Reopening, work, and COVID-19: 6 tips to help stay secure
As U.S. businesses start to reopen, employees and employer can team up to help keep company data safe
-
Working from home on your own computer: 12 security tips in the COVID-19 era
Many companies were unprepared to have employees work from home due to the coronavirus outbreak. These security steps can help.
-
Video conferencing risks when working at home: 16 ways to avoid them
Working from home may mean relying on video-conferencing to do your job. But your connection may not be private or secure.
-
Severe Windows 10 vulnerability found by NSA – Update Windows 10 Immediately
The NSA and Microsoft advisories to patch Windows 10 systems are urgent. NSA has never before made such a public disclosure.
-
Home security camera and doorbells: tips to help secure your devices
Hackers can set their sights on Ring and other home security cameras, and that has made some customers feel less than secure.
-
2020 Election Cybersecurity: Protecting U.S. elections against cybercrime
The 2020 U.S. elections face major cybersecurity threats. Learn what they are and what the U.S. is doing to protect elections from hacking.
-
Data breach: Could your email account be compromised?
Cybercriminals can take control of your email accounts, using them to send out fraudulent messages to your contacts or to steal any personal or financial information you’ve sent in past email messages. You can take steps to protect your personal email accounts and their passwords.
-
Ransomware attacks targeting governments are on the rise
Ransomware attacks targeting governments are rising, including everything from city agencies to school districts to police departments.
-
What to do after 5 types of data breaches
Learn what to do after 5 types of data breaches. Find out how to help protect yourself against possible identity theft.
-
2019 data breaches: 4 billion records breached so far
A look at 2019 data breaches so far, arranged by business sector, plus actions you can take help protect against identity theft.
-
Biometric data breach: Database exposes fingerprints, facial recognition data of 1 million people
Biometric data breach: Could cybercriminals use your biometric data to commit identity theft or other crimes?
-
What is a dark web scan and can it protect your identity?
Your personal information might be for sale on the dark web. A dark web scan can help you find out if your information has been exposed.
-
What is a firewall? Firewalls explained and why you need one
Firewalls can help keep your network, computer, and data safe and secure. Here’s how.
-
115 cybersecurity statistics and trends you need to know in 2021
Cybercrimes cost the world $6 trillion a year by 2021, according to cybersecurity ventures. Large data breaches and cyberthreats from foreign locales such as China and Russia threaten elections. Experts worry that 5G technology will create additional cybersecurity challenges for businesses.
-
Election Day 2018: 7 security tips you should know before you vote
Your vote counts. Before casting your ballot, take a look at these 7 tips for election security.
-
Meltdown and Spectre vulnerabilities affect billions of devices
Spectre Next Generation — reportedly a new set of vulnerabilities in computer processors — could put your data at risk.
-
Update your version of Firefox now!
A bug discovered in the Firefox web browser could allow attackers to gain access to files stored on a computer through malicious code injected into the browser’s built-in PDF viewer.
-
Two new vulnerabilities found in Mac OS X
Two vulnerabilities, which are security holes in software, in Mac OS X operating systems affecting OS X versions Mavericks 10.9.5 up to Yosemite 10.10.5 have been confirmed.
-
Third Adobe Flash exploit found in hacking team data dump
Last week, the cyber attack against the hackers-for-hire firm Hacking Team, led to a theft of 400gb of data that exposed two Adobe Flash Player vulnerabilities.
-
Team GhostShell hacking group is back
A group of hackers known as Team GhostShell, claims to have hacked a multitude of organizations, including financial institutions, government agencies, political groups, law enforcement entities, and universities.
-
Scammers take advantage of Ashley Madison breach
Since the large-scale August 19th data breach revealing millions of user profiles and email addresses from the Ashley Madison online dating site, we have found and blocked a surge in email spam activity related to the Ashley Madison data breach.
-
How to protect your online privacy with a VPN
Did you know that your ISP can see what you do while you’re online? From making purchases to looking up medical conditions, your actions create a digital trail of data that can paint a very detailed picture of you.
-
The personal impact of cybercrime
The Norton Cyber Security Insights Report sets out to understand how consumers are personally impacted by cybercrime and puts a human face on the headlines dominating the news.
-
PC or Mac: Which is more resistant to cyber threats?
Cyber criminals are not run-of-the-mill street hooligans. Assailants of online crimes are educated, tech-savvy, sophisticated individuals who dont care if you prefer PC to Mac or vice versa. There...
-
Over 225,000 Apple ID credentials stolen from jailbroken iOS devices
Cybercriminals have reportedly stolen over 225,000 Apple ID account credentials from jailbroken iOS devices, using a type of malware called, “Keyraider”. The criminals have been using the stolen credentials to make in-app purchases with user accounts.
-
Norton at DefCon
This year, Norton visited DefCon 24, a hacking conference held in Las Vegas. Established in 1993, this conference is designed to bring together people from all realms of the...
-
New Windows zero-day exploit via cyberespionage group Sandworm discovered
On Tuesday October 14th, a new vulnerability was discovered in Microsoft Windows Operating Systems, affecting all supported versions of Windows, from Windows Vista Service Pack 2 up to Windows 8.1. According to the security firm, iSIGHT, this vulnerability has been exploited by a cyberespionage group known as Sandworm, to deliver malware to targeted organizations.
-
New Internet Explorer vulnerability found - update your version now
The security hole in Internet Explorer could allow an attacker to take over a computer. Once the attacker has gained control, they can potentially install programs, view, change, or delete data and more.
-
Is paying for antivirus software worth It?
Since our personal safety takes precedence over everything, it’s safe to say that our digital security is a close second. This brings us to one the biggest challenges of Internet security – free vs paid internet security.
-
Is it safe to download free ebooks online?
As more and more people lean towards reading in a digital format, here are a few things to keep in mind when reading ebooks. Never download pirated ebooks and always buy books and digital content from legitimate retailers. Some ebooks may contain malicious software that can install malware, spyware, and viruses in your computer.
-
Introducing Episode 2 of In Search Of The Most Dangerous Town On The Internet.
Last year, the Norton team brought you a new look into cybercrime via the documentary In Search Of The Most Dangerous Town On The Internet. Through...
-
How to safely and securely use USB memory sticks
You may have noticed growing reports in the media about the dangers of using USB memory sticks. A malicious USB device can install malware such as backdoor Trojans, information stealers and much more.
-
Zero-day vulnerability: What it is, and how it works
A zero-day vulnerability is a software security flaw that is known to the software vendor but doesn’t have a patch in place to fix the flaw. If left unaddressed, vulnerabilities create security holes that cybercriminals can exploit. To keep your computer and data safe, it’s smart to take proactive and reactive security measures.
-
How Do Cybercriminals Get Caught?
Cybercriminals use sophisticated tactics to commit crimes. It takes a village to catch a cybercriminal since the method of how they commit these crimes is so complicated. Law enforcement usually has to coordinate with government agencies, international partners, and private corporations.
-
How a Gmail password stealing scam works
Sophisticated cybercriminals have devised a way to steal email credentials that bypasses two-factor authentication security and doesnt rely on otherwise easy-to-spot phishing methods. Heres what you...
-
What are Denial of Service (DoS) attacks? DoS attacks explained
A Denial of Service (DoS) attack can be easily engineered from nearly any location. Learn more about what it is and how it works.
-
Adobe Flash zero-day vulnerability discovered
A new zero-day vulnerability has been discovered in Adobe Flash. Security researcher Kafeine reports that this vulnerability is currently being exploited in the wild.
-
10 cyber security facts and statistics for 2018
Data breaches, ransomware attacks, cryptojacking, threats to your connected devices all contribute to new rounds of cyber security facts, figures, and statistics. Do you find it hard to keep up? Let’s cherry-pick 10 cyber safety facts to help give you the big picture.
-
Mazar BOT malware invades and erases Android devices
Android smartphone users should be aware of a dangerous new type of malware that spreads via spam SMS or MMS messages that link to a malicious app file.
-
This Valentine’s Day, beware of fake apps as cybercriminals look to cash in on love.
Every February, users both single and coupled tend to increase their downloads of Valentines Day-centric apps.
-
Netflix log in credentials being sold on the black market
Attackers are setting their sights on stealing users Netflix credentials in order to sell them on the black market, providing access to the streaming service for less expensive prices.
-
Thousands of websites have been compromised with malicious code
NortonLifeLock has recently identified thousands of websites that have been compromised with malicious code, which is used to redirect users to a compromised website.
-
Ransomware – what can you do about it
Malicious software that uses encryption to hold data for ransom has become wildly successful over the last few years. The purpose of this software is to extort money from the victims with promises of restoring encrypted data.
-
Watch out for "free" movie and television scams during big events
Since streaming video content has become mostly commonplace, cybercriminals have taken notice, and are spreading spyware and malware on many social media platforms via comments
-
Bug in Apple’s iOS and OSX AirDrop could allow malware to be installed silently
A vulnerability in Apple’s AirDrop feature has been discovered by Australian security researcher Mark Dowd. AirDrop is an “over-the-air” file sharing service that uses Bluetooth and WiFi, and is built into iOS and Mac OS X products.
-
Four tax scams to watch out for this tax season
Tax season is a ripe time for phishing and spreading malware; without fail, tax-related online scams remain a most popular type of phishing scam each and every year. Through our threat intelligence network, we have identified four types of tax scams that individuals and businesses should be wary of as they’re preparing to file their taxes in 2016.
-
Phone hijacking: When criminals take over your phone and everything in it
Hackers have figured out a way to hijack cell phones and steal the valuable information contained in them. Find out how criminals go after emails, photographs and payment apps to commit larger crimes like blackmail, fraud and theft. Learn how to keep your identity safe.
-
Do tablets and smartphones need security software?
Tablets and smartphones can be vulnerable to online threats and need security software
-
New variant of Android ransomware takes advantage of the lockscreen's user interface
A new variant of Android ransomware has been discovered, which is displayed on the lockscreen’s user interface (UI). This threat, Android.Lockdroid.E, creates a lockscreen that appears more sophisticated and official by displaying fraudulent legal notices coupled with personal information gathered from the device.
-
iOS malware, XcodeGhost, infects millions of Apple Store customers
iOS apps popular mainly in China have been infected with a piece of malware that can steal your data, and even get you to reveal things like usernames and passwords via phishing.
-
Major news-sites hit with large-scale malvertising campaign
Last weekend several mainstream websites, fell victim to a massive malvertising campaign. The tainted ads in these websites may have directed thousands of unsuspecting users to a landing page hosting the notorious Angler Exploit Kit, a kit that stealthily installs crypto-ransomware and other malware on computers.
-
13 million MacKeeper user accounts exposed
Earlier this week, white hat hacker Chris Vickery announced that he was able to gain access to over 13 million MacKeeper user accounts. A vulnerability was exploited in the company’s servers, which exposed the usernames, email addresses and other personal information of 13 million customers.
-
Windows 10 compatibility with Norton products
As a Norton customer, you are always entitled to download the latest version of your Norton product for free during your service period. Existing customers are...
-
What is the difference between black, white and gray hat hackers?
Hackers can be categorized by the type of metaphorical “hat” they wear. What is the difference between black hat, white hat, and gray hat hackers? Learn more.
-
What is the dark web? The dark web defined and explained
The dark web is often used by cybercriminals. But it’s also visited by journalists, law enforcement agencies and others.
-
What is a distributed denial of service attack (DDoS) and what can you do about them?
A distributed denial-of-service attack is one of the most powerful weapons on the internet. A DDoS attack is a cyberattack on a server, service, website, or network that floods it with Internet traffic. The aim is to overwhelm the website or service with more traffic than the server or network can accommodate.
-
What to look for when buying antivirus software
Selecting the right antivirus software for your devices is one of the most important things you can do for your digital safety. Know what to look for before you choose an antivirus.
-
What is smishing?
Smishing is a form of phishing that involves a text message or phone number. It's becoming an emerging and growing threat in the world of online security. Read on to find out what it is and how you can protect yourself against it.
-
What Is Adware?
Adware, or advertising supported software, displays unwanted advertisements on your computer
-
What is bulletproof hosting?
Youve heard of malware, ransomware, botnets, and the like. What you dont hear about is the technology behind these threats. These threats all have to come from somewhere, theyre not just out there...
-
Episode Two of "The Most Dangerous Town on the Internet"
Today we are proud to announce the launch of the second installment in our documentary series The
-
First targeted iPhone spyware discovered: Update your iOS software immediately
Cyber espionage, also known as cyber spying, is grabbing a lot of headlines lately. The most recent incident affects Apple’s iOS. Researchers at Citizen Lab Have discovered that a highly sophisticated cyber espionage group has deployed a very rare, advanced form of spyware, which can break an iPhone wide open.
-
Jigsaw ransomware wants to play a game, but not in a good way
An unusual strain of ransomware has shown up on the scene, and it isn’t playing nicely at all. Dubbed “Jigsaw,” the ransomware was created in early March and made its way to the black market a week later, selling for around $140 USD. So far, it seems that there has been minimal sales of the malware. Luckily, it is not widespread yet.
-
Hundreds of malicious apps are showing up on the Google Play Store, disguised as legitimate applications.
Hundreds of malicious apps are showing up on the Google Play Store, disguised as legitimate applications.
-
Targeted attacks now moving into the IoT and router space
Recently, there have been reports about state sponsored, targeted attacks moving into the router and IoT security space. Read more to see how this affects you.
-
DDoS attacks: A simplified guide + DDoS attack protection tips
What’s the difference between the deep web vs. the dark web? Turn to this overview to learn how they both work and for tips for those surfing the deep web and dark web.
-
What you need to do about the WPA2 Wi-Fi network vulnerability
Until your Wi-Fi enabled devices have a security patch for the KRACK vulnerability here are some steps to take to help secure your devices.
-
What is social engineering? A definition + techniques to watch for
Social engineering is the act of tricking someone into divulging information or taking action, usually through technology. A typical hacker might look for a software vulnerability, but a social engineer could pose as a technical support person.
-
Cybercrime outlook 2023: It’s all about the economy
A fake virus alert is a deceptive hacking tool. Learn how to remove fake virus pop-ups, spot warning signs, as well as tips to help keep your devices safe.
-
What is a zero-day exploit?
An overview of what is a smurf attack, the parts that play into smurfing, how it results in DDoS attacks, plus pointers for smurf attack prevention
-
Uber announces new data breach affecting 57 million riders and drivers
Hackers have stolen the personal information of about 57 million customers and drivers, according to a report by Bloomberg News. Uber discovered the data breach in late 2016, and then waited to disclose the news almost a year later. The stolen information included the names and driver’s license numbers of around 600,000 drivers in the United States.
-
Cyberattacks on the rise: What to do before and after a cyberattack or data breach
You can’t prevent a cyberattack or a data breach, but there are steps you can take to help prepare for and react to one.
-
Coronavirus Resource Guide: Your COVID-19 online-security questions answered
Answers to questions about working from home, helping to monitor kids’ online activity, and protecting against scams in the COVID-19 era.
-
DoorDash data breach affects 4.9 million users — Have you been affected?
DoorDash disclosed a data breach affecting 4.9 million people. Drivers, restaurants, and customers could be affected.
-
Holiday cybercrime statistics + tips to protect against threats
Holiday cybercrime statistics are hard to break out, but it’s fair to say some cybercrimes are known to appear around holidays. Here’s what you need to know.
-
Norton email scams: Answers to Your Frequently Asked Questions (FAQs)
In a Norton email scam, scammers impersonate Norton through fake emails designed to trick consumers and steal their money and personal information. These answers to your FAQs can help.
-
What are deepfakes and how to spot them
Deepfakes are designed to deceive viewers with manipulated, fake video and voice. Learn why they’re threatening and how you can spot them.
-
What is Formjacking and How Does it Work?
Formjacking is when cybercriminals inject malicious JavaScript code to hack a website and take over the functionality of the site's form page to collect sensitive user information.
-
15 work-from-home security tips: Security best practices for remote workers
If you decide to work remote, it’s important to keep cyber safety in mind. That means protecting your devices and data, just like you would in the workplace.
-
What you need to know about the Petya ransomware outbreak
Petya ransomware is spreading using the EternalBlue exploit similar to the WannaCry attack. Here's what to do when it comes to ransomware.
-
High-profile people and companies among Twitter accounts hacked in Bitcoin scam: Here’s what to watch out for
Twitter hit with hack involving high-profile accounts of billionaires, celebrities, and politicians, in cryptocurrency scam. Learn what happened.
-
What’s a Twitter bot and how to spot one
Twitter bots are automated Twitter accounts controlled by bot software. Learn what they do.
-
10.6 million MGM Resorts guests had personal info exposed in breach
The personal info of more than 10.6 million guests who stayed at MGM Resorts was exposed in a data breach and posted on a hacking forum.
-
Check-date fraud: Date your checks “2020” — here’s why
If you don’t date your checks by using the full four-digit year in 2020, you could increase your chance of becoming a victim of check fraud.
-
Microsoft accidentally exposed 250 million customer records — What you should know
A Microsoft security breach exposed 250 million customer records on a database without password protection. Learn more.
-
Data leak exposes millions of bank loan and mortgage documents
Data leak exposes millions of bank loan and mortgage documents. Here’s what you need to know.
-
Fake WhatsApp Android apps downloaded over a million times
Several malicious apps have been downloaded from the Google Play Store millions of times, disguised as legitimate versions of the popular messaging platform “WhatsApp.”
-
100 million credit card applications were recently exposed, some including Social Security numbers.
Learn how to help protect yourself in the event of a data security incident.
-
Massive data breach hits hospitality giant. Up to 500 million guests affected — Here’s what you can do
Massive data breach at large hotel brand affects up to 500 million guests, potentially exposing them to identity theft and other crimes.
-
VPNFilter malware now targeting even more router brands. How to check if you're affected.
VPNFilter malware targets over 500,000 routers. Here's how to help protect yourself.
-
T-Mobile investigating data breach. Data of more than 40 million existing and prospective customers exposed
T-Mobile has confirmed unauthorized access to its data and is investigating the extent of the incident, after reports that sensitive data of 100 million T-Mobile USA customers is for sale on the web.
-
Up to 880,000 Credit Cards Accessed in Orbitz Data Breach - What to Do Next
Hackers attack Orbitz. 880,000 credit card or payment card information accessed in data breach. Find out what to do next.
-
Millions of customers’ credit card information may have been stolen in Sonic breach
Hot on the heels of another large data breach, Sonic, America’s Drive-In, appears to be the latest victim of a potential data breach. This could mean almost 5 million customers may end up with their credit card information traded in the underground economy.
-
Alteryx Data Leak Exposes 123 Million Households: What You Need to Know
More than 120 million U.S. households had information exposed in a data leak, potentially raising the risk of identity theft for the impacted American families.
-
5 election scams to avoid
Here’s a sample of common election scams and advice for outwitting the scammers behind them.
-
Make the switch to Norton — security you can trust
In today’s connected world, cybercrime is a reality we all face. Therefore, you must choose trustworthy companies to handle your information
-
FaceApp goes viral and raises privacy worries: What you need to know
If you download FaceApp, you can “age” your face — but possibly give up your privacy. Learn more.
-
267 Million Facebook Users May Have Had Personal Information Exposed Online
More than 267 million Facebook users had their personal data exposed in an online database. Here’s what you need to know.
-
Marriott discloses data breach: Up to 5 million guests affected
The personal information of up to 5.2 million guests was accessed, including names, mail and email addresses, and phone numbers.
-
Hacking group Magecart claims another victim in a recent wave of data breaches
The threat group dubbed “Magecart” has been targeting the payment information entered into forms on various websites.
-
50 million Facebook accounts compromised — here’s what you need to know
Everything you need to know about Facebook’s 50 million compromised accounts.
-
Hacker sentenced to 5 years for 2014 Yahoo breach
A U.S. judge sentences a Canadian man to five years in prison for his role in the 2014 Yahoo data breach.
-
MyHeritage data breach exposes info of more than 92 million users
MyHeritage DNA testing and family tree website investigating email and password breach, resetting all user passwords.
-
Personal information of 143 million people may have been exposed in Equifax data breach
Equifax has announced that cybercriminals have exploited a vulnerability in their website, allowing them to gain access to certain files. The data breach appears to have taken place from mid-May through July 2017.