Tag - personal data

Typeform breach update: here’s what happened

On Friday, June 29, at 19:25, we received a notification from Typeform that they suffered a data breach that compromised some of their data.

Because we use Typeform to send infrequent surveys to our users, we immediately took action to see if CyberGhost users’ data was impacted in any way.

No confidential information was exposed

We wanted to have the full details about the situation before making any formal announcements, so here they are.

Typeform informed us that cybercriminals managed to compromise data backups containing information about surveys that were active before May 3rd, 2018. Only two such surveys for CyberGhost users were involved in the breach. Read More

Implementation of ePrivacy Regulation – re-gain control over your personal data

A privacy law proposed by the European Commission is about to set a new model in terms of online privacy for people residing in Europe. The ePrivacy Regulation was initially drafted in 2002 and was revised in 2009. In the beginning of 2017, the EU updated the text and introduced new policies regarding users’ prior consent when it comes to websites and marketing companies processing and controlling their own personal data.

The updates will bring significant changes to the web surfing activity, if they are indeed accepted. The legislation still needs to be approved by the member states during a vote that will be held in a Parliament plenary session in Strasbourg next week.

These new privacy proposals align with changes suggested by the GDPR (EU General Data Protection Regulation); the organization has as main aim to make sure EU citizens enjoy online privacy and are protected from data breaches. The difference between the two is that GDPR wants to enhance Article 8 of the European Charter of Human Rights referring to personal data protection, while the ePrivacy regulation is meant to complement Article 7 of the charter in respect to a person’s private life.

The fundamental changes of the ePrivacy rules refer to:

  1. Cookies law – give your consent for web tracking

Read More

Behind closed doors – how do hackers use your personal information?

You may have been the victim of a data breach or online hack. Or you may have just heard about the bad things a risky situation such as identity theft can cause to someone. But do you know exactly what a hacker can do with your personal and financial information?

Hackers operate in different ways, but the end result is mainly the same: they would steal your information and use it in their benefit. Surprisingly enough, they are not always interested in making money; some are just so ambitious that they just want to prove a point, such as how vulnerable the online system of a big company is.

Regardless of the reasons that lie behind their actions, it’s time that you find out the possible risks you’re exposed to when a mass data breach (such as the most recent and much talked about Equifax case) occurs.

First, here is the big picture: online fraud cases similar to Equifax are the most dangerous because they would reveal the most important of your private information: social security number along with financial information (credit and debit card details, amount of your salary, etc.), plus personal information like birth date and home address. These are like wholesale candy for hackers and this information combined would make it all easier to commit frauds.

Here is what a hacker can do with your personal details such as social security number, e-mail address and/or phone number:

  1. Apply for a loan or credit card

With your social security number, a hacker can open a bank account or apply for a loan in your name. As you may guess, the moment the loan needs to be repaid, the hacker will simply consider it’s not his/her duty to do that, so you’ll start receiving calls from the bank, since your name and personal details are linked to the loan or bank account.

       2. Rent a home under your name

Read More

Why Android Malware is worse than you thought

The future will not only be about thinner, faster, and bendable smartphones, but it will definitely also be about security and bigger online threats.

Let’s imagine a scenario where you don’t need to take photos anymore because Google will simply choose the best pictures from a live stream of the day’s events just to make your life easier.

Soon you won’t even need to decide what to eat, your Android phone will know exactly what you need and what you like, showing you the most suitable foods for your age. So long decision paralysis, right?

hs

But there’s so much hype around the future of Android that we forget to see the obvious threats, the alarmingly increasing number of Android malware, and the criminal activities carried out on smartphones.

Read More

New Red Couch Show Episode!

The collaboration between the US government and hackers has been a hot and caused a lot of controversy during the last years.

Now, another incident raised again the attention to this subject, when a group of hackers claimed responsibility for attacking the US Court System website and the US authorities denied it. So we decided to looked a bit deeper into it in our latest Red Couch episode. We actually interviewed the European Cyber Army, the hacker group that claimed the attacks on the US Court System website, so watch this episode now to see what they said: Read More

© 2017 CyberGhost