Connect with us

Technology

Data breach exposes over 56 million clothing store customers

Published

on

Data breach exposes over 56 million clothing store customers

A cybersecurity vendor claimed last month that a hacker stole data from the fashion retailer Hot Topic, including the personal information of millions of customers. At that time, there was no confirmation from the retailer itself. However, a breach notification site has now confirmed that the personal data of 56,904,909 users was found online and leaked from customers of Hot Topic, Torrid and Box Lunch.

This data includes email addresses, physical addresses, phone numbers, purchase history, gender and dates of birth. Partial credit card data was also included in the breach.

I’M GIVING AWAY A $500 GIFT CARD FOR THE HOLIDAYS
Enter by signing up for my free newsletter.

Image of a person shopping (Kurt “CyberGuy” Knutsson)

What you need to know

The breach notification service Have I Been Pwned (HIBP) announced this week that it alerted 56 million Hot Topic customers about a data breach compromising their personal information. While Hot Topic, which operates more than 640 stores across the U.S., has yet to confirm the breach, HIBP reported that it occurred on Oct. 19. Just two days later, a threat actor using the alias “Satanic” claimed responsibility.

Advertisement

Satanic alleges that the database contains details of 350 million users, though that number seems inflated. The leaked data does, however, include names, email addresses, physical addresses and dates of birth; all information collected through Hot Topic’s loyalty program. The hacker is offering the database for $20,000 and demanding that Hot Topic pay $100,000 to prevent its sale.

Hudson Rock, an Israeli cybersecurity firm, initially reported the breach and considers it credible. The firm traced the issue back to a malware infection on an employee’s computer at Robling, a third-party retail analytics firm. Hudson Rock, which operates the cyber intelligence platform Cavalier to monitor compromised devices, discovered the infection and flagged it for clients. 

It’s likely that the threat actor used credentials stolen by info stealer malware to gain access to an analytics platform used by Hot Topic, potentially allowing them to infiltrate the retailer’s cloud environments.

Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)

WINDOWS FLAW LETS HACKERS SNEAK INTO YOUR PC OVER WI-FI

Advertisement

Hot Topic’s silence after the breach is suspicious

Evidence of a data breach at Hot Topic keeps piling up, but the company hasn’t said a word yet. Customers and state attorneys general haven’t been notified, either. Hot Topic’s silence could mean a few things, especially with such a big breach. They might still be investigating, working with cybersecurity experts to confirm what happened and figure out the extent of the damage. Sometimes, companies stay quiet, hoping to delay or dodge bad press. But this strategy can backfire, leading to more scrutiny and skepticism.

We reached out to Hot Topic to request a comment on our story but did not hear back before our deadline.

Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)

CYBER SCAMMERS USE AI TO MANIPULATE GOOGLE SEARCH RESULTS

5 ways you can stay safe in the event of a data breach

1) Keep a strong password: With the Hot Topic data breach exposing sensitive information, it’s essential to update your passwords. Use a strong, unique password for each account, especially for services where your personal details are stored. A mix of letters, numbers and symbols will make it harder for hackers to guess. Consider using a password manager to keep everything secure and easily accessible.

Advertisement

2) Beware of suspicious links: After a breach, phishing attempts increase, and hackers may use your leaked email to send fake links or emails. Never click on suspicious links, especially those that ask for personal information. Always double-check the sender’s email and look out for strange language or urgent requests. If in doubt, go directly to the website instead of following the links in the message.

The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android and iOS devices.

3) Invest in a data removal service: Since your personal information could be floating around on the dark web or public databases, it’s a good idea to invest in a data removal service. Check out my top picks for data removal services here.

4) Watch out for the risk of identity theft: The leaked data includes sensitive details like addresses, birthdays and purchase histories, which could be used for identity theft. Be extra cautious when sharing personal information moving forward, and if you notice anything unusual, report it immediately. If you are a Hot Topic customer, you might also want to consider an identity theft monitoring service. See my tips and best picks on how to protect yourself from identity theft.

5) Monitor your accounts regularly: Keep an eye on your bank accounts, credit card statements and even loyalty programs where your information is stored. Set up alerts for transactions and logins so you can act fast if anything seems off. Regular monitoring can help you catch fraudulent activity early, minimizing the damage if your data is misused.

Advertisement

DON’T LET SNOOPS NEARBY LISTEN TO YOUR VOICEMAIL WITH THIS QUICK TIP

Kurt’s key takeaway

The Hot Topic data breach is alarming, especially since it affects over 56 million people. What makes the situation even more concerning is that Hot Topic has stayed silent about it. The company hasn’t notified those affected, leaving many unprepared for potential cybersecurity threats. Hackers could use this gap to target victims with scams, leading to financial losses. This situation is a strong reminder of the importance of maintaining good cybersecurity hygiene, whether you’re impacted by a breach or not.

Should companies be forced to compensate customers whose data has been exposed instead of just staying silent? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Advertisement

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement

Technology

Intel is planning a custom Panther Lake CPU for handheld PCs

Published

on

Intel is planning a custom Panther Lake CPU for handheld PCs

Intel announced yesterday that it’s developing an entire “handheld gaming platform” powered by its new Panther Lake chips, and joining an increasingly competitive field. Qualcomm is hinting about potential Windows gaming handhelds showing up at the Game Developers Conference in March, and AMD’s new Strix Halo chips could lead to more powerful handhelds.

According to IGN and TechCrunch, sources say Intel is going to compete by developing a custom Intel Core G3 “variant or variants” just for handhelds that could outperform the Arc B390 GPU on the chips it just announced. IGN reports that by using the new 18A process, Intel can cut different die slices, and “spec the chips to offer better performance on the GPU where you want it.”

As for concrete details about the gaming platform, we’re going to have to wait. According to Intel’s Dan Rogers yesterday, the company will have “more news to share on that from our hardware and software partners later this year.” The Intel-based MSI Claw saw a marked improvement when it jumped to Lunar Lake, and hopefully the new platform keeps up that positive trend.

Continue Reading

Technology

Don’t lock your family out: A digital legacy guide

Published

on

Don’t lock your family out: A digital legacy guide

NEWYou can now listen to Fox News articles!

This is not a happy topic. But it’s essential advice whether you’re 30 or 90.

If something happened to you tomorrow, could your family get into your digital life? I’m talking about your bank accounts, emails, crypto and a lifetime of memories stored on your phone or computer.

Big Tech and other companies won’t hand over your data or passwords, even to a spouse, without a hassle, if at all.

1. The 10-minute setup

Start with a Legacy Contact. Think of someone you trust who gets access only after you’re gone. Who is that? Good.

Advertisement

SECRET PHRASES TO GET YOU PAST AI BOT CUSTOMER SERVICE

One day, you won’t be here anymore, but your tech will bel. Here’s how to plan for that. (iStock)

· iPhone: Open Settings > tap [Your Name]. Tap Sign-In & Security > Legacy Contact. Go to Add Legacy Contact and follow the prompts.

· Google: Search for Inactive Account Manager in your Google Account settings. Choose how long Google should wait before acting (e.g., three months). Add up to 10 people to be notified and choose which data (Photos, Drive, Gmail) they can download.

Google has an “Inactive Account Manager” feature. (Chesnot/Getty Images)

Advertisement

2. The master key problem

Apple and Google don’t help with banking, insurance, investment or other sites or apps. You need a solid password manager like NordPass that offers emergency access features.

1. Open your Password Manager and look for Emergency Access.

2. Add a Digital Heir: Enter the email of a spouse or trusted child.

3. Set the Safety Delay: Choose a wait period. Usually 7 days is the sweet spot.

4. How it works: If your contact ever requests access, the app sends you an alert. If you’re fine, you hit Deny. But if you’re incapacitated and can’t respond within those seven days, the vault automatically unlocks for them.

Advertisement

Pro tip: Your Emergency Contact only gets viewing privileges. They can’t delete or change anything in your vault.

YOU’LL NEVER TRUST VIDEO AGAIN ONCE YOU SEE WHAT SORA 2 CAN DO

Facebook and Instagram have after-death options for accounts. (Karly Domb Sadof, File/AP )

3. Crypto and social media

· Crypto: Without your seed phrases, that money is gone. Store them physically along with any instructions and receipts of you buying crypto with your estate paperwork. If you use a crypto hardware wallet, keep that in a fireproof safe.

· Social media: On Facebook or Instagram, go to Settings > Memorialization. Choose to either have your account deleted or managed by a contact who can post a final tribute.

Advertisement

Be sure someone knows the passcode to your phone. That’s important for 2FA codes, among other things.

One more thing. If you found this guide helpful, be sure to get my free newsletter at GetKim.com to stay tech-savvy and secure every day!

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Award-winning host Kim Komando is your secret weapon for navigating tech.

· National radio: Airing on 500-plus stations across the US, find yours at komando.com or get the free podcast

Advertisement

· Daily newsletter: Join 650,000 people who read the Current (free!) at komando.com

· Watch: Kim’s YouTube channel at youtube.com/@kimkomando

Copyright 2026, WestStar Multimedia Entertainment. All rights reserved.

Continue Reading

Technology

Power bank feature creep is out of control 

Published

on

Power bank feature creep is out of control 

There was a time not too long ago when buying a power bank was as easy as choosing the cheapest portable battery that could charge your phone and quickly slip into your pocket, purse, or backpack. The hardest part was deciding whether it was time to ditch USB-A ports.

Recently, however, brands have been slathering on features, many of which are superfluous, in an attempt to both stand out from the commodified pack and justify higher price points. It’s especially prevalent amongst the bigger power banks that can also charge laptops, those that butt right up to the “airline friendly” 99Wh (around 27,650mAh) size limit.

At CES 2026, we’re seeing a trend towards power banks with integrated cables, which is very convenient. But a similar trend to slap large, energy-sapping displays onto these portable batteries is just silly. And that’s just the start of the atrocities witnessed in recent months.

EcoFlow’s modular accessories are easy to lose and that big display sucks power, is difficult to navigate, and requires a screensaver.
Image: EcoFlow

The power bank that pushed things over the edge for me is the $270 EcoFlow Rapid Pro X Power Bank 27k that I received for review. Here’s my review: it’s bad. Do. Not. Buy. As a power bank, it tries too hard to do too much, making it too expensive, too big, too slow, and too heavy.

Advertisement

The snap-on decorative faceplates are ridiculous and the proprietary magnetic modules for its Apple Watch charger and retractable USB-C cable are too easy to misplace.

The giant display EcoFlow uses scratches easily and is too dim to easily read outdoors. The confusing UX on the Rapid Pro X model is especially offensive in its touch-sensitive clumsiness. Nobody needs a display that takes 30 seconds to wake up from sleep and plays swirly graphics and blinking eyeballs when awake, slowly sapping the power bank’s energy reserves. The fact that it has a screensaver tells me that the product team completely lost the plot.

Anker’s also guilty of putting large displays onto its power banks. Most people don’t need anything more than four dots to show the remaining capacity, but it’s becoming increasingly difficult to buy a power bank without a colorful LCD display. In the 20,000mAh range, Anker doesn’t even list a display-less model anymore. I, like many Verge readers, love to see the actually wattage pumping in and out of those ports — but the vast majority of people have no need for that.

Anker’s fast-charging, proprietary dock upsell.

Anker’s fast-charging, proprietary dock upsell.
Image: Anker

Anker, like EcoFlow, also offers power banks with proprietary pogo-pin connectors, Both companies use those connectors to lure owners into buying expensive desk chargers that don’t work with anything else. Those extra-fast charging speeds are unlikely to justify the premium expense for most people.

Most people, even tech savvy Verge readers, don’t even need a power bank that can output 140W of power delivery over USB-C. The majority of non-gaming laptops require 65W or less. And the primary computing device for most people — the phone — only requires about 20W.

Advertisement

We certainly don’t need power banks with built-in hotspots when that’s already built into our Android and iOS phones. Baseus made one anyway.

Bluetooth and Wi-Fi connectivity are becoming a common feature in some flagship power banks. I’m all for remotely monitoring massive power stations used to power off-grid homes and campers, but not a portable power bank that’s charging the phone in your hand or is plugged into a nearby wall jack.

The phone you’re charging also has a flashlight.

The phone you’re charging also has a flashlight.
Image: Pangootek

We also don’t need integrated flashlights. Why random Amazon brand, why?

All these extra “features” just add weight, size, and cost to power banks. They also increase the risk that something will go wrong on a device that’s meant to always be with you and just work when you need it. And power banks don’t need any extra help justifying a recall.

Kickstands and integrated cables are useful features I’ll pay extra for.

Kickstands and integrated cables are useful features I’ll pay extra for.
Image: Kuxiu

One power bank trend I can get behind is integrated cables like the retractable version found on EcoFlow’s Rapid Pro Power Bank 27k (note the lack of “X” in the name). Always having a properly specced cable that matches the device’s max input and output is super convenient. I like that Kuxiu’s S3 MagSafe power bank, for example, neatly wraps the cable around the chassis to plug into a hidden USB-C jack. That way the cable can be replaced if it frays or breaks.

Advertisement

I’m also a fan of adding kickstands to MagSafe power banks that prop phones up at your preferred angle for extended viewing or recording. More importantly, a few companies are now adopting semi-solid state chemistry that makes their power banks less susceptible to thermal runaway, which was an industry plague in 2025. They cost more to buy, but they’re cheaper to own over their extended lifetimes.

Sharge’s counter argument to everything I’ve written.

Sharge’s counter argument to everything I’ve written.
Image: Sharge

I can’t help but enjoy the look of Sharge’s Retractable 3-in-1 Power Bank, even though its integrated wall outlet and underwhelming specs for a battery pack of this size and price completely undercuts my entire argument. I’m a sucker for Braun design, forgive me!

Basic power banks like Anker’s PowerCore 10k are a rarity these days.

Basic power banks like Anker’s PowerCore 10k are a rarity these days.
Image: Anker

There are still basic power banks available that charge phones and even laptops without too much feature creep and attempted upsell. If all you want is to charge your phone then there’s Anker’s trusty $26 PowerCore 10k or, if you’re feeling fancy, Nitecore’s $65 NB10000 Gen 3 Ultra-Slim USB-C Power Bank. If you also want to charge laptops then you might consider INIU’s delightfully named Cougar P64-E1 Power Bank Fastest 140W 25000mAh for $90, or even Belkin’s more capable $150 UltraCharge Pro Laptop Power Bank 27K coming in March.

The fastest and most powerful power banks with lots of gee-whiz features will often generate headlines for pushing the envelope of what’s possible. But the “best” power bank might not be best for you, when basic affordability is all you really need.

Follow topics and authors from this story to see more like this in your personalized homepage feed and to receive email updates.
Advertisement

Continue Reading

Trending