An update to security software Dashlane promises to alert users to the moment their information is shared on the dark web. The latest iteration of the popular password manager monitors the murky depths of the internet for leaked personal details, including email addresses and passwords. The dark web is a hidden corner of the internet not catalogued by search engines or accessible using traditional web browsers, which is home to a number of nefarious websites that trade in drugs, stolen login and banking details, arms, and prostitutes. Dashlane is now able to flag-up when users' data is shared online, and pinpoint which online accounts are now at risk from hackers. Cyber criminals trade stolen account details on the dark web.
Jefferson Graham shows how to change your security settings on Facebook, Twitter, Google and Microsoft for two-factor authentication, which security experts say is your best, quick defense against a hack. LOS ANGELES - It's World Password Day, a marketing gimmick dreamed up by chipmaker Intel and supported by many organizations, including Amazon and Dell, designed to get you to beef up your online security. Don't let the hype get in the way of a good message -- hackers have never been busier -- as witnessed by the big Google Docs hack attempt this week. So today is as good as any to stop, take a minute and update your online security. The most common password used, even to this day, is "password" and 123456.
A new study has identified security flaws in five of the most popular password managers. Now for some counterintuitive advice: I still think you should use a password manager. So do the ethical hackers with Independent Security Evaluators who came to me with news of the flaws -- and other security pros I spoke to about the study, published Tuesday. You wouldn't stop using a seat belt because it couldn't protect you from every kind of vehicle accident. The same applies to password managers.
Apple Inc. touted the iPhone as a very secure device but that didn't stop the FBI from finding a third-party vendor who, in March this year, broke in to the phone of one of the San Bernardino mass shooters. And just last week, internet giant Yahoo was embarrassed when it admitted hackers had stolen details of over 500 million of its users in 2014. Such incidents may portray the company involved in a bad light, but what matters to customers and end users is their own privacy, which episodes of hacking violate blatantly. And according to security experts, the increasing dependence on mobile smartphone technologies goes hand in glove with the risk faced by users, whether it be from malicious hackers doing it for money or government agencies conducting surveillance. While technology companies upgrade their systems to provide their customers the safest products and services they can, what can end users do to make their own data and devices safer?
One of the biggest controversies of last year -- the hacking of the Democratic National Congress' chairman John Podesta emails -- happened using a very simple methodology. A hacker made Podesta believe that his account had been compromised and made him change his password on a pseudo screen that looked just like the actual Google email login screen. The password was never changed but the hackers gained access to Podesta's email account. The emails were later published by WikiLeaks and seem to have affected the course of the 2016 presidential election. This is just one of the ways your Gmail account can be hacked.