Connect with us

Technology

The dangerous intersection of people search sites and scams

Published

on

The dangerous intersection of people search sites and scams

It’s no secret cybercriminals thrive on personal information to pull off scams, commit bank fraud and engage in identity theft. But did you know that a lot of the information they need is readily available on people search sites? It might surprise you to learn that these companies gather and sell your personal data — everything from your contact details to information about your family — often without you even realizing it.

What’s more, this data can become even more vulnerable to breaches simply by being stored on these sites. For instance, I recently discussed an alarming incident where 2.7 billion records were stolen from a background search site called National Public Data and then shared for free on a cybercrime forum.

Having your personal information floating around on these people search sites and data broker databases significantly increases your risk of falling victim to scams. But don’t worry. I’ll dive into the details of how this happens and, more importantly, what you can do to protect yourself and stop it.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

Illustration of a cybercriminal at work  (Kurt “CyberGuy” Knutsson)

Advertisement

Cybercriminals exploit people search sites for personal data

People search sites like Whitepages, Spokeo and BeenVerified are designed to help users find and connect with others, but they’ve become a goldmine for cybercriminals. Despite warnings against using the data for stalking, harassment or harm, these sites offer a wealth of information that can be exploited by malicious actors.

Scammers can access a wide range of personal details, including addresses, phone numbers, email addresses, birthdates, family information, employment history and even religious beliefs or political affiliations. They can also find property records, court and police records and information about hobbies and interests.

This comprehensive data allows cybercriminals to build detailed profiles of potential victims, making it easier to craft convincing scams or carry out identity theft. The abundance of personal information available through these sites poses a significant risk to individuals’ privacy and security.

woman on laptop

A woman is upset about her personal information being online. (Kurt “CyberGuy” Knutsson)

3 ways scammers use people search sites

Let’s talk about how scammers are using people search sites to find their next victims. It’s pretty alarming, but understanding how this works can help us stay one step ahead.

1. Finding victims

Cybercriminals can easily browse people search sites to dig up information about random individuals. They can look up names and uncover a treasure trove of details — like email addresses, phone numbers and other contact info. This is where things start to get a bit dicey.

Advertisement

WHAT IS ARTIFICIAL INTELLIGENCE (AI)?

2. Profiling victims

Once they have access to this information, scammers can create detailed profiles of their targets. They might find out about someone’s job history, whether they have kids or even if they’re single and looking for love. They can also determine if someone is elderly, which can make them more susceptible to confusing tech jargon. Research indicates that a staggering 60% of cybercrimes against seniors — who are particularly vulnerable — are at least partly fueled by the personal information available online, often through data brokers and people search sites.

3. Putting the plan into action

With all this information in hand, scammers can launch targeted phishing attacks to trick victims into revealing sensitive information. They can create scams designed to steal money or even commit identity theft. There are countless stories of individuals falling prey to these scams and losing their identities. 

In many cases, the scammers likely sourced their information from people search sites. In some shocking instances, certain data brokers — like Epsilon, Macromark and KBM — have been caught red-handed selling personal information directly to scammers, giving them the tools they need to exploit vulnerable individuals.

a laptop

A person using a people search site on their laptop. (Kurt “CyberGuy” Knutsson)

MOST TARGETED CITIES FOR TRAVEL BOOKING SCAMS

Advertisement

4 ways to keep your personal information off people search sites (and away from scammers)

With the threat data aggregators like people search sites pose, it’s definitely a good idea to keep your information off their databases. While it won’t put a definitive stop to scammers, it will make it harder for them to find the information necessary to target you. It will also limit the number of places your data can be found online, thereby reducing the chances of it ending up in a data breach. That said, removing your information from people’s search sites can be easier said than done. It’s not impossible, though. Here’s what to do.

1. Track down and opt out from people search sites that sell your data

The first and most obvious step is to track down people search sites that sell your personal information and make them remove it. Fair warning: This requires a time commitment and ongoing maintenance.

You’ll first have to look up your own name, phone number, email address or home address on any popular search engine. You’ll likely see a bunch of people search sites in the search results. From there, you go through the results pages, visit each website that shows up and send individual opt-out requests to each one.

Since they refresh their databases often, most people search sites will add your personal information again after some time, though. So if you want to keep your data offline, you’ll have to check back every few months and remove it again.

If you have a few bucks to spare, I recommend using an automated personal information removal service. These services remove your data from people search sites and tons of other data broker types. Check out my top picks for data removal services here.

Advertisement

2. Limit the number of online tools and services you use

You should also exercise some good digital hygiene practices. Like being more discerning about the online tools and services you use. Many of them actually harvest your personal information and sell it to third parties, including people search sites and data brokers.

Even something as seemingly benign and widely used as extensions can be leaking your data online. A study conducted by researchers over at Incogni revealed 44% of Chrome extensions collect your personally identifiable information (PII). Even if they don’t sell it, this increases the risk of data breaches and malicious activity if the extension goes rogue.

You should reevaluate the apps, extensions and online accounts you use. Remove anything you don’t really need. For those that you do need, check the privacy policies for their data collection and sharing practices. You can always find more privacy-conscious alternatives.

3. Use throwaway emails and burner numbers wherever possible

Living in the digital age, I know it’s not really possible to go without any online tools. To sign up for most, you need to share at least an email or phone number. Unfortunately, those details are often shared with third parties, end up with people search sites and data brokers, circulate the web and ultimately result in increased spam and malicious attacks.

Advertisement

It’s a lot safer to use burner numbers and masked or throwaway accounts. This allows you to sign up, receive communication and maintain control of your online accounts while keeping all of the associated data and activity from being linked to your real identity.

4. Use private browsers and search engines

Browsers and search engines are another big source of data. Most of them track and share at least some of your online activity. Thankfully, there are plenty of browsers and search engines designed with privacy in mind.

I’ve previously recommended a few privacy-conscious search engine alternatives. They come with their own benefits and drawbacks but they all keep your search history private. The same goes for the browser itself.

Kurt’s key takeaways

It’s clear that while people search sites can be useful for reconnecting with friends or finding information, they also pose significant risks to our privacy and security. By taking proactive steps to protect our personal data, we can make it much harder for cybercriminals to exploit our information.

In your opinion, what should be the responsibility of companies that collect and sell personal data regarding user privacy? Let us know by writing us at Cyberguy.com/Contact

Advertisement

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Ask Kurt a question or let us know what stories you’d like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

Advertisement

New from Kurt:

Copyright 2024 CyberGuy.com.  All rights reserved.

Advertisement
Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

iPhone 16 Pro and 16 Pro Max hands-on: don’t call it a shutter button

Published

on

iPhone 16 Pro and 16 Pro Max hands-on: don’t call it a shutter button

I just spent a few minutes with the new iPhone 16 Pro and Pro Max, which feature bigger displays with thinner bezels, revamped cameras, and Apple’s new Camera Control button, which is pretty fascinating.

Let’s start with Camera Control, which is a physical button — it depresses into the case ever so slightly, with additional haptic feedback from Apple’s Taptic Engine to make it feel like a chunkier click. You can just click away at it, and it’ll fire off photos from the 48MP main camera with zero shutter lag. I was not able to slow it down in my short demo time, but we’ll see how it goes in real life.

The new camera control on the iPhone 16 Pro Max.
Nilay Patel / The Verge

The button is also ultra sensitive, so pressing it ever-so-lightly brings up swipe-to-zoom controls, and double-pressing it lightly brings up additional controls you can swipe between, like lens selection, exposure, and the new photo styles available on the Pro. It took me a second to figure out how hard to press but it wasn’t hard to figure out.

The phones themselves are slightly taller and wider than the 15 Pro models, making room for larger screens: a 6.3-inch panel on the 16 Pro and a massive 6.9-inch display on the 16 Pro Max, emphasis on Max. It’s made possible partly by new thinner bezels, too.

Advertisement

The big news for the smaller phone is that the regular 16 Pro now comes with the 5x telephoto camera formerly reserved for the Pro Max. Apple has managed to wedge it in alongside the main and ultrawide cameras. That’ll be a welcome addition for anyone who wants a proper zoom lens without having to buy the biggest phone.

If you were hoping for some more vibrant colors on the Pro phones, well, you’ll have to keep waiting. The best Apple has done this year is a darker gold called “desert titanium.” The other color options are familiar restrained neutrals.

Continue Reading

Technology

IFA 2024: the biggest announcements and coolest gadgets

Published

on

IFA 2024: the biggest announcements and coolest gadgets

This camera can detect wild boars and weasels.

The Camovue is a new outdoor camera from the folks behind Reolink that can send alerts when it detects specific animals.

It can spot up to 12 species, including wild boar, deer (bucks and does), mountain lions, elk, ducks, weasels, cattle, goats, turkeys, raccoons, and foxes.

The company says it’s working on adding more critter-spotting capabilities. The camera is slated for launch later this year.

Continue Reading

Technology

Sleep your way to your destination with this futuristic self-driving sleep pod

Published

on

Sleep your way to your destination with this futuristic self-driving sleep pod

Have you ever had one of those overnight trips that you just couldn’t wait to be over? The kind that leaves you feeling exhausted before you even reach your destination, with cramped seats and noisy cabin passengers disrupting your sleep? We’ve all been there. 

Well, there’s some new technology being explored that could someday turn those dreaded journeys into something you’ll actually look forward to.

We’re talking about the Swift Pod, a futuristic concept that could not only change the game but rewrite the entire rule book of long-distance travel. Intrigued? I thought you might be. So, let’s dive in and see what makes this pod so cool, shall we?

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

The Swift Pod  (xoio GmbH)

Advertisement

Sweet dreams on wheels

Say goodbye to cramped airplane seats and the chaos of airport security. Instead, you’ll be snuggled up in a cozy bed, drifting off to sleep as the world whizzes by outside. No, you’re not on a fancy sleeper train. You’re in the Swift Pod, a sleek futuristic autonomous vehicle that’s part car, part hotel room. This cool concept contraption, designed by Peter Stulz, head designer at xoio GmbH, lets you wake up at your final spot feeling fresh as a daisy and ready to roll.

CLICK HERE FOR MORE U.S. NEWS

sleep pod 2

The Swift Pod  (xoio GmbH)

IS THIS PINT-SIZED ELECTRIC VEHICLE ABOUT TO BE A BIG DISRUPTOR IN THE US?

How the Swift Pod works

Booking a Swift Pod is as easy as ordering your favorite late-night snack. Just hop online, punch in your details, and — voila — your pod will show up right at your doorstep, ready to whisk you away on your nighttime adventure. Once you’re settled in, the pod’s brainy navigation system takes over. It figures out the perfect speed to get you to your destination on time while keeping things eco-friendly.

HOW TO REMOVE YOUR PRIVATE DATA FROM THE INTERNET 

Advertisement
sleep pod 3

The Swift Pod  (xoio GmbH)

THIS CRAZY TWO-IN-ONE ELECTRIC VEHICLE COMES EQUIPPED WITH A TWO-SEAT AIRCRAFT HIDDEN INSIDE 

What’s inside?

The Swift Pod might look compact from the outside, but don’t let that fool you. This future concept vehicle can comfortably fit two travelers, with space for sitting upright during the day and a plush bed when it’s time to hit the hay. And because no road trip is complete without snacks, the pod comes stocked with drinks and nibbles to keep you fueled up. There’s even a nifty media system to keep you entertained. Netflix and chill, anyone?

sleep pod 4

The Swift Pod  (xoio GmbH)

REVOLUTIONARY FLYING CAR PROMISES HIGHWAY SPEEDS AND 3-HOUR FLIGHTS 

Pit stops with a view

Here’s where things get really cool. The Swift Pod doesn’t just zoom you from A to B. It can make pit stops along the way. Craving a coffee or snack with a view? The pod’s got you covered with a constantly updated list of scenic spots to choose from. However, let’s pump the brakes a bit because it is still very much just a concept, and it would likely take years to turn this all into reality.

Advertisement

SUBSCRIBE TO KURT’S YOUTUBE CHANNEL FOR QUICK VIDEO TIPS ON HOW TO WORK ALL OF YOUR TECH DEVICES

sleep pod 5

The Swift Pod  (xoio GmbH)

Kurt’s key takeaways

The Swift Pod could really shake things up in the travel world. It combines comfort, convenience and cool technology to make overnight trips something you’ll actually enjoy. No more dreading those long journeys. Just think about settling into your cozy pod and waking up refreshed at your final destination. As we look to the future, it’s interesting to think about how this innovative concept could change our travel experiences forever.

Would you feel safe enough to trust an autonomous pod like the Swift Pod to get you from point A to point B for overnight travel? Let us know by writing us at Cyberguy.com/Contact

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter

Advertisement

Ask Kurt a question or let us know what stories you’d like us to cover

Follow Kurt on his social channels

Answers to the most asked CyberGuy questions:

New from Kurt:

Copyright 2024 CyberGuy.com.  All rights reserved.

Advertisement

Continue Reading

Trending