Connect with us

Technology

How much is your personal information worth on dark web?

Published

on

How much is your personal information worth on dark web?

While privacy is priceless for most individuals, it sells for pretty cheap on the dark web. 

According to Whizcase, years of curating your social media page for your close network could be up for sale for as cheap as $14 for your Facebook log-in in 2023.

And that’s just the beginning. Every access point from Reddit to LinkedIn can be purchased for a price, $6 and $45, respectively.

CLICK TO GET KURT’S FREE CYBERGUY NEWSLETTER WITH SECURITY ALERTS, QUICK VIDEO TIPS, TECH REVIEWS, AND EASY HOW-TO’S TO MAKE YOU SMARTER

Person on the dark web (Kurt “CyberGuy” Knutsson)

Advertisement

How does your info end up on the dark web?

Creating unique and complex passwords for all your online accounts is not just a kitschy tactic to get you to spring for a password manager. Passwords that are simple can be cracked or guessed by diligent hackers, and if you repeat that password across multiple accounts, then all those accounts are also in jeopardy. 

Infuriatingly enough, you can make the concerted effort to create a complex and unique password for all your accounts and even use a password manager, but you will still have your information leaked if the company you are logging onto gets infiltrated. Unfortunately, being notified of having your information compromised in a data breach is more common than not. 

In addition to having your information unwittingly floating around the dark web to the highest bidder, if your device gets hacked and malware or viruses are installed on it, then your log-ins and passwords can be stolen and sold, too.

MORE: WAS YOUR PRIVATE DATA BEING SOLD ON THIS DARK WEB MARKETPLACE?

dark web data

Data on the dark web (Kurt “CyberGuy” Knutsson)

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Advertisement

What should I do if my information ends up on the dark web?

When you get the inevitable notification or letter stating that your information has been compromised, there are action steps you can take to minimize damage and maximize the prevention of future problems.

1. Log out of all devices

Instagram is an example of a social media account that lets you see where and what devices your account is currently open on. They also provide you with the option of logging out of all devices so that your account is not accessible by third parties or on devices that aren’t yours. This is especially helpful if your account is open on a device that might be yours but might also have malware or a virus.

How to view your account’s recent log-in activity on Instagram 

You can view a list of devices that have recently logged into your Instagram account at any time. If you don’t recognize a recent log-in, you can log out of that location or device and let us know that the log-in wasn’t you. Here’s how to do it. 

  • Click the profile icon on the bottom right of the screen
  • Click the three horizontal lines in the upper right
  • Tap Accounts Center
  • Scroll down and tap Password and security
  • Tap Where you’re logged in to view your recent log-in activity for accounts in this Accounts Center
  • To log out of devices you’re currently logged into, tap on one of your accounts, then scroll down and tap Select devices to log out.
  • Select the devices you’d like to log out, then tap Log out.

2. Change your password

If you manage your passwords or have them saved to autofill on browsers like Safari and Chrome, you will get updated if your password has been compromised, weak, or reused. Because having complex, unique passwords for each online account is critical to keeping your information online safe, password managers can help with generating those as well as managing them for you. Get more details about my best expert-reviewed password managers of 2024 here.

Advertisement

3. Turn on two-factor authentication

This step can be annoying when you just want to quickly check an update or post a quick video, but it can be your saving grace when someone has figured out your log-in and is trying to guess your password. If your two-factor authentication is on, you have the opportunity to get alerted of any log-ins or password reset requests. It gives you the opportunity to secure your account. 

4. Install strong antivirus software

While you can’t control what companies do with your information, you can control what information gets out from your personal devices by installing good antivirus software. It can “catch” malware or virus before it gets unleashed on your device and siphon your password and other private information. Get my picks for the best 2024 antivirus protection winners for your Windows, Mac, Android & iOS devices.

5. Remove yourself from the internet

While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for removal services here.

6. Get identity theft protection

Many identity theft protection services provide dark web monitoring services. They continually monitor the dark web to see if any crucial pieces of personal information like your email addresses or social security number end up compromised or up for sale on the dark web. Getting those alerts immediately gives you the opportunity to act faster and take the other steps listed above. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.

DARK web data 2

Data on the dark web (Kurt “CyberGuy” Knutsson)

Kurt’s key takeaways

In the digital age, where our personal data can be as fleeting as a password, it’s a stark reminder that what we hold dear isn’t always locked down tight. It’s unsettling to think that years of personal posts and connections could be reduced to a mere transaction on the dark web. But knowledge is power, and being informed is the first step in strengthening our digital defenses. So, let’s keep those passwords complex, our log-ins secure and our vigilance high.

Advertisement

What role do you think tech companies should play in protecting your data, and how does this shape your expectations of online services? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Advertisement

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Netflix’s ad tier is growing really fast — and that means more ads

Published

on

Netflix’s ad tier is growing really fast — and that means more ads

Amy Reinhard, Netflix’s president of advertising, said the streaming service has “the most engaged audience anywhere,” with subscribers on its ad-supported tier spending an average of 41 hours per month on the service.

The new ad formats are part of Netflix’s in-house advertising platform, which is now live in the US after arriving in Canada. It plans to bring the platform to all 12 countries with ad-supported plans by June. “The foundations of our ads business are in place,” Reinhard said. “And going forward, the pace of progress will be even faster.”

Continue Reading

Technology

Fake PayPal email let hackers access computer and bank account

Published

on

Fake PayPal email let hackers access computer and bank account

Online scams are becoming more dangerous and convincing every day. Cybercriminals are finding new ways to gain not just your login credentials but full control of your computer and your bank accounts.

Take John from King George, Virginia, for example. He recently shared his alarming experience with us. His story is a powerful warning about how quickly things can escalate if you respond to suspicious emails.

Here is what happened to John in his own words: “I mistakenly responded to a false PayPal email notifying me of a laptop purchase. The message looked real, and I called the number listed. The person on the phone gave me a strange number to enter into my browser, which installed an app that took control of my PC. A warning popped up saying ‘software updating – do not turn off PC,’ and I could see my entire file system being scanned. The scammer accessed my bank account and transferred money between accounts. He told me to leave my PC running and go to the bank, keeping him on the phone without telling anyone what was happening. I shut everything down, contacted my bank, and changed my passwords.”

John’s quick thinking in shutting down his computer and alerting his bank helped minimize the damage. However, not everyone is as lucky.

Join the FREE “CyberGuy Report”: Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free “Ultimate Scam Survival Guide” when you sign up!

Advertisement

Fake PayPal scam email (Kurt “CyberGuy” Knutsson)

How this scam works

This type of scam is known as a remote access scam. It often begins with a fake email that appears to come from a trusted company like PayPal. The message claims there is an issue, such as an unauthorized charge, and urges the victim to call a phone number or click a link. 

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

Once the scammer makes contact, they guide the victim to enter a code into their browser or install a program, claiming it will fix the problem. In reality, this grants the scammer full control of the victim’s computer. 

Once inside, scammers often search for sensitive files, access banking websites, steal login credentials or install malware to maintain long-term access. Even if the immediate scam is stopped, hidden malware can allow scammers to reenter the system later.

Advertisement
hacker on laptop

A hacker at work (Kurt “CyberGuy” Knutsson)

THE URGENT PAYPAL EMAIL SCAM YOU CAN’T AFFORD TO IGNORE

Key takeaways from John’s experience

John’s close call highlights several important lessons.

Fake emails are harder to spot than ever: Scammers create emails that look almost identical to real ones from trusted companies like PayPal. They copy logos, formatting and even fake customer support numbers. Always double-check the sender’s email address and verify communications by visiting the official website or app directly instead of clicking links inside emails.

Remote access scams can escalate fast: Once scammers gain control of your device, they can steal sensitive data, move funds between accounts and install hidden malware that stays behind even after the scammer disconnects. It often takes only minutes for serious damage to be done, making fast recognition critical.

Psychological pressure plays a big role: Scammers rely on creating a sense of urgency and fear. By keeping you on the phone and urging secrecy, they isolate you from help and rush you into making bad decisions. Recognizing when you are being pressured is key to breaking the scammer’s control.

Advertisement

Fast action can make all the difference: By quickly disconnecting his computer and contacting his bank, John limited the scammer’s access to his accounts. Acting within minutes rather than hours can stop further theft, block fraudulent transactions and protect your sensitive information from being fully compromised.

laptop

A warning on a laptop home screen (Kurt “CyberGuy” Knutsson)

DON’T CLICK THAT LINK! HOW TO SPOT AND PREVENT PHISHING ATTACKS IN YOUR INBOX

How to protect yourself from remote access scams

Taking simple but strong security steps can protect you from falling victim.

1. Never call a number listed in a suspicious email: Scammers often set up fake phone numbers that sound professional but are designed to manipulate you into handing over control or information. Always find verified contact information through a company’s official website or app, not links/numbers provided in suspicious messages.

Advertisement

2. Be skeptical of unusual instructions: No legitimate company will ask you to install software or enter strange codes to protect your account. If anything seems unusual, trust your instincts and stop the communication immediately.

3. Install strong antivirus software on all devices: Antivirus programs can detect suspicious downloads, block remote access attempts and help prevent hackers from taking over your system. Having strong antivirus protection installed across all your devices is the best way to safeguard yourself from malicious links that install malware and attempt to access your private information. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

4. Use identity theft protection: These services monitor financial accounts, credit reports and online activity for signs of fraud, alerting you to suspicious transactions. See my tips and best picks on how to protect yourself from identity theft.

5. React immediately if you suspect a scam: Disconnect your device from the internet, contact your bank or credit card company immediately and change your passwords, especially for banking and email accounts. Monitor your accounts closely for unauthorized activity and report the scam to the Federal Trade Commission as well as the company that was impersonated. Acting quickly can prevent further access and limit the damage scammers can cause.

6. Use multifactor authentication (MFA): MFA adds a critical layer of security beyond passwords, blocking unauthorized logins even if credentials are stolen. Enable MFA on all accounts, especially banking, email and payment platforms, to stop scammers from bypassing stolen passwords.

Advertisement

7. Update devices and software immediately: Regular updates patch security flaws that scammers exploit to install malware or hijack systems. Turn on automatic updates wherever possible to ensure you’re always protected against newly discovered vulnerabilities.

8. Employ a password manager with strong, unique passwords: Avoid password reuse and use complex passphrases to minimize credential-stuffing attacks. A password manager generates and stores uncrackable passwords, eliminating the risk of weak or repeated credentials. Get more details about my best expert-reviewed password managers of 2025 here.

9. Never share screen access or grant remote control: Scammers exploit screen-sharing tools to steal passwords and manipulate transactions in real time. Legitimate tech support will never demand unsolicited screen access; terminate the call immediately if pressured.

10. Invest in personal data removal services: These services automate requests to delete your personal information from data brokers and people-search sites, reducing publicly available details scammers could exploit for phishing or impersonation. While no service promises to remove all your data from the internet, having a removal service is great if you want to constantly monitor and automate the process of removing your information from hundreds of sites continuously over a longer period of time. Check out my top picks for data removal services here.

PROTECT YOURSELF FROM TECH SUPPORT SCAMS

Advertisement

Kurt’s key takeaways

John’s story is a reminder that online scams are evolving quickly and becoming more aggressive. Staying skeptical, verifying all suspicious messages and acting quickly if something feels wrong can make the difference between staying safe and losing sensitive information. Protect your devices, trust your instincts and remember it is always better to be cautious than to take a risk with your security.

Have you or someone you know been targeted by a scam like this? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Advertisement

Follow Kurt on his social channels:

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Technology

Meta’s beef with the press flares at its antitrust trial

Published

on

Meta’s beef with the press flares at its antitrust trial

Long-simmering tension between Silicon Valley and the press that covers it is surfacing during the Federal Trade Commission’s antitrust trial against Meta.

During a heated cross-examination of the FTC’s key economic expert, Scott Hemphill, Meta’s lead attorney, Mark Hansen, noted that Hemphill joined Facebook co-founder Chris Hughes and former Biden official Tim Wu in pitching regulators on an antitrust probe of the company back in 2019. The pitch deck for the probe that was shown in court included “public recognition” of the company’s aggressive acquisition strategy from two reporters: Kara Swisher, who currently hosts two podcasts for The Verge’s parent company, Vox Media, and Om Malik, the founder of the early tech blog GigaOm who is now a venture capitalist.

In an attempt to undercut Hemphill’s credibility, Hansen caught Swisher and Malik in the crossfire. He called Malik a “failed blogger” with an axe to grind against Meta. He then suggested that Swisher, whom he referred to as a Vanity Fair columnist (she last wrote for the site in 2015), was similarly biased against the company. In court, he projected a headline about her recently calling Mark Zuckerberg a “small little creature with a shriveled soul.”

The 2019 pitch deck shown at court by Hansen also cited a Post story to support that Facebook should be investigated as a monopoly. Meta’s Hansen asked if Hemphill agreed that “The New York Post is a scandal sheet,” to which he replied that he didn’t “have a view one way or another.” Hansen showed the infamous Post front page headline, “Headless Body in Topless Bar,” to make his point.

The exchange resurfaced years-old tensions between the press and tech titans. After experiencing relatively positive coverage during the early, aspirational days of Silicon Valley, Facebook and a handful of startups grew to become the largest platforms in the world. Along the way, they’ve chafed at increasingly critical coverage of their businesses.

Advertisement

Malik and Swisher have indeed both criticized Meta and its executives. In 2016, Malik critiqued Facebook’s intentions for offering free access to its apps and others in India, after board member Marc Andreesseen blamed local resistance to the program on “anti-colonialism” in a later-deleted tweet. “I am suspicious of any for-profit company arguing its good intentions and its free gifts,” Malik wrote at the time.

It was not the first time Meta has pointed a finger at the media while at trial

Tuesday’s exchange was not the first time that Meta has pointed a finger at the media while at trial. When discussing major scandals like Cambridge Analytica from the witness stand, company leaders have chalked up downswings in user sentiment to negative media attention and testified that Meta’s services haven’t seen comparable declines in engagement.

The FTC has argued that this fact is a sign of monopoly power because people can’t leave Facebook and Instagram without viable alternatives. A judge will ultimately decide if that is true or not. In the meantime, Meta’s grudges with the press are on full display.

Advertisement
Continue Reading

Trending