Connect with us

Technology

Watch out: Biggest data breaches of 2024, so far

Published

on

Watch out: Biggest data breaches of 2024, so far

From big banks to car dealerships, 2024 has been a banner year for data breaches. Yes, I mean that in the worst way possible. I’d be shocked if there’s any American left unexposed at this point. Here are some companies that may have exposed your data.

New! For the first time ever, the award-winning Kim Komando Show is available as a podcast. Find it now in your favorite podcast player.

National Public Data breach: 2.9 billion people exposed

Hard to imagine much worse than a background-check company being hacked. Their entire job is to dig up and collect non-public data. A lawsuit claims it was National Public Data’s negligence that exposed 2.9 billion people. Details include Social Security numbers, full names and addresses. Hacking group ASDoD put the database of the stolen information up for sale for $3.5 million. No word yet on any ransom payment.

2.7 BILLION RECORDS LEAKED IN MASSIVE US DATA BREACH

Advertisement

Through a process called scraping, NPD collects and stores personal data from “non-public sources” to perform background checks. In other words, the company gathers information that wasn’t willingly (or knowingly) handed over. 

Depending on what happens in court, NPD could be required to purge personal data of impacted individuals and to encrypt all collected data going forward.

Ascension ransomware attack: Up to 140 hospitals

In May, an employee at one of the country’s biggest healthcare systems accidentally downloaded malware. What happened next was a cyberattack avalanche.

Ascension runs 140 hospitals in 19 states and Washington, D.C. On May 8, they detected unusual activity within their network. The disruption quickly became so bad that Ascension had to shut down emergency rooms and reroute patients.

Advertisement

Emergency sign outside hospital

Hackers got their hands on 7 of Ascension’s 25,000 servers; who was impacted is still under investigation. Ascension recently said around 500 individuals were affected, but I’m willing to bet the final number will be a lot higher.

CDK global attack: 15,000 car dealerships

One of the biggest car dealership software companies got hit with a double whammy in June. CDK, used by 15,000 dealerships for payroll and finance tasks, shut down its systems after back to back cyberattacks on the 18th and 19th. Rumor has it the ransom payment was worth tens of millions of dollars.

The shutdown majorly disrupted dealership operations and sales. One Lexus dealership in New Jersey reported new car sales down 50% in June.

Advertisement

Change Healthcare attacks

20 TECH TRICKS TO MAKE LIFE BETTER, SAFER OR EASIER

Change Healthcare, a tech firm owned by UnitedHealth, is used by thousands of pharmacies, hospitals and healthcare facilities to receive payments and process claims.

One attack discovered in late February caused massive disruptions for weeks throughout the U.S. healthcare system. UnitedHealth paid a whopping $22 million  ransom to Russian cybercriminal group BlackCat to stop them from sharing the data they stole.

Then another gang of crooks, RansomHub, claimed they stole data, too. In April, UnitedHealth said a “substantial proportion” of Americans’ data was exposed. Estimates say as much as a third of all Americans were impacted. That includes sensitive medical data, including test results, diagnoses and images. 

Advertisement

AT&T breach: 73 million customers

In March, AT&T disclosed that hackers stole data from “nearly all” current and former customers. The data goes back as far as 2019 and includes some really personal information, including Social Security numbers. They reportedly paid hackers a $370,000 ransom to delete the information. 

AT&T logo

Honorable mention

  • Advance Auto Parts (July): Personal information of over 2.3 million individuals was stolen.
  • Roku (April): Through “credential stuffing” aka using logins leaked in other breaches, hackers accessed around 591,000 accounts. No financial info was accessed.
  • Truist Bank (June): Hacking group Sp1d3r stole information about 65,000 employees and posted it for sale online.
  • Tile (June): Life360, the company behind Tile tracker devices, reported a breach that included names, addresses, email addresses, phone numbers and device identification numbers.
  • Ticketmaster (June): This one impacted 560 million customers; data included names, addresses, phone numbers, email addresses, order history and partial payment info.
  • Dropbox (May): Attackers accessed Dropbox Sign’s development environment, compromising customer information.
  • TeamViewer (July): Employee directory data, including names and encrypted passwords, was exposed.

Locked down

You can’t stop a hacker from breaching a major company, but you can protect yourself from the fallout. 

HOW TO SCORE CHEAP STUFF (TO KEEP OR RESELL)

Advertisement

Double-check all healthcare communications. If you receive an explanation of benefits (EOB) or a bill for services you didn’t receive, contact your health care provider and insurance company ASAP. It likely means someone is using your benefits for their own healthcare.

Treat email requests with caution. Be skeptical of anything that seems super urgent. It’s OK to slow down for safety. My rule of thumb: If it’s a strange written request, like a text or email, I make a phone call.

Be wary of “old friends” who appear out of nowhere. It could be a hacker who happens to have a little (stolen) info. Take time to confirm they are who they say they are.

Make a list of exposed data. Keep this digitally or just on a Post-it. Be suspicious of anyone who references it in an email or phone call. Say the company you financed your car through was hacked. Alarm bells should raise if you get a call out of the blue that there’s a major issue with your loan.

A laptop

(ISSOUF SANOGO/AFP via Getty Images)

Update your PIN and banking login credentials. Even if they weren’t involved directly in the breach, hackers can use your personal info to access it. Keep an eye on your bank and credit card statements for anything out of the ordinary. Set up banking alerts on your phone while you’re at it.

Advertisement

Freeze your credit. This will keep scammers from opening a credit card or loan in your name. Like setting up a fraud alert, you’ll need to contact each of the three credit bureaus.

Get tech-smarter on your schedule

Award-winning host Kim Komando is your secret weapon for navigating tech.

Copyright 2024, WestStar Multimedia Entertainment. All rights reserved. 

Advertisement

Continue Reading
Advertisement
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Technology

Google just changed its ‘G’ logo

Published

on

Google just changed its ‘G’ logo

Google has updated its colorful “G” logo for the first time in almost a decade. An update to the Google app on iOS shows a new logo that blends the logo’s red, yellow, green, and blue colors into a gradient, as reported by 9to5Google.

Google last made a major change to its logo in September 2015, when the company updated its font to a sans-serif typeface. At the time, Google also revealed a new “G” logo that incorporates all of the brand’s colors.

Though this change may be a bit more subtle, the newly blended logo brings it in line with the gradient it uses for the Gemini logo’s design.

So far, it appears Google has only updated its logo on its iOS app. The “G” still appears with distinct borders between colors on Android and the web. Google didn’t immediately reply to a request for comment from The Verge.

Continue Reading

Technology

Hackers can steal money and make your bank account look intact

Published

on

Hackers can steal money and make your bank account look intact

Hackers have become increasingly sophisticated in targeting bank accounts, sometimes stealing money without the account holder realizing it right away. This raises an unsettling concern among many: could someone actually drain your bank account while making it appear as though your balance remains untouched?

As Bruce from Phoenix asks, “Is it true that hackers can wipe out your bank account but make it look like the money is still there?”

The short answer is yes, though it’s rare and requires a high level of skill. Still, even the possibility is alarming, especially when you consider how easily people can fall victim to common tactics hackers use to gain access to accounts in the first place.

Join the FREE “CyberGuy Report”: Get my expert tech tips, critical security alerts and exclusive deals, plus instant access to my free “Ultimate Scam Survival Guide” when you sign up!

A hacker at work (Kurt “CyberGuy” Knutsson)

Advertisement

How do hackers access your bank account?

There’s a long list of methods cybercriminals use to get into people’s financial accounts, and most of them don’t involve “hacking” in the Hollywood sense. Instead, they rely on tricking you into handing over sensitive information. Here are some of the most common techniques.

Fake banking apps and mobile trojans: Some apps are designed to look exactly like your bank’s official app, but they’re actually fakes. If you enter your login info, it goes straight to the scammer. Even more advanced are mobile banking trojans, which hide inside seemingly unrelated apps. Once installed, the trojan watches for when you open your real banking app and then quickly overlays a fake login screen. If you type in your credentials, the trojan grabs them and sends them off to the attacker.

Phishing scams: Scammers send emails or texts that appear to be from your bank, asking you to verify a transaction or log in to resolve an issue. These messages often include links to websites that look identical to your bank’s site but are actually fakes. The giveaway is often a small detail, like a misspelled URL. For example, “captial0ne.com” instead of “capitalone.com.”

Keyloggers: Keyloggers are a type of malware that silently records everything you type. If one gets onto your device, it can capture your banking username, password and anything else you type, all without you knowing.

Man-in-the-middle attacks: These attacks happen when hackers intercept the data being transmitted between you and your bank’s website. This is especially risky if you’re on public Wi-Fi. You may think you’re logging in securely, but a hacker could be watching everything or even redirecting you to a fake version of your bank’s site.

Advertisement

SIM swapping: SIM swapping is where a scammer contacts your phone provider, pretends to be you and asks to transfer your number to a new SIM card. If successful, they receive your text messages, including any verification codes sent by your bank. This gives them access to your account, even if two-factor authentication is turned on.

Hackers can steal money and make your bank account look intact

A person using a bank card to shop via laptop (Kurt “CyberGuy” Knutsson)

SNEAKY SCAMMERS DRAIN BANK ACCOUNT IN SINISTER PHONE PHISHING SCHEME

Advanced account manipulation

This is where it gets unsettling. In rare cases, hackers can actually make it look like your bank balance hasn’t changed, even though they’ve already taken the money. How? By targeting the display layer of your banking app or web interface. If malware is installed on your device, it can manipulate what shows up on the screen. That means your balance might look normal, while your actual funds are long gone. This type of attack is extremely rare and usually requires access to a compromised or jailbroken device, but it’s technically possible and just sophisticated enough to delay you from realizing what happened.

Hackers can steal money and make your bank account look intact

Bank alert notification on smartphone (Kurt “CyberGuy” Knutsson)

PREVENTING THIS INSIDIOUS EMAIL FORWARDING SCAM THAT WILL DRAIN YOUR BANK ACCOUNT

8 steps to protect your bank account from sophisticated hackers

The good news? You don’t need to be a cybersecurity expert to protect yourself. Just following these key steps can dramatically reduce your risk.

Advertisement

1) Use official apps only: Cybercriminals will try to trick you with fake banking apps and mobile trojans that overlay fake login screens, so it’s critical to download banking apps exclusively from the Apple App Store or Google Play. Never install apps from links in emails or texts.

2) Turn on two-factor authentication (2FA): SIM-swapping attacks can hijack your phone number and intercept SMS codes, so enable app-based 2FA to block unauthorized logins even if hackers obtain your password.

3) Get text or app alerts: Hackers can manipulate your account’s display to hide stolen funds, so set up real-time transaction alerts to expose unauthorized withdrawals immediately, especially for microtransactions used to test your account.

4) Use strong, unique passwords: Phishing scams and keyloggers often harvest weak or reused credentials, so use a password manager to generate and store complex passwords. Get more details about my best expert-reviewed password managers of 2025 here.

5) Avoid clicking suspicious links and install strong antivirus software: Scammers impersonate banks with phishing emails/texts containing misspelled URLs (e.g., “captial0ne.com”), so always navigate directly to your bank’s official website or app instead of clicking embedded links. Strong antivirus software helps protect your devices from fake apps, keyloggers and other threats. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks of the best 2025 antivirus protection winners for your Windows, Mac, Android and iOS devices.

Advertisement

6) Check your accounts regularly: Don’t just glance at your balance. Review recent transactions at least once a week to catch any suspicious activity.

7) Avoid public Wi-Fi for banking: Hackers exploit unsecured networks to launch man-in-the-middle attacks and spoof banking sites, so use a VPN to encrypt your connection if you must bank on public Wi-Fi. VPNs will protect you from those who want to track and identify your potential location and the websites that you visit. For the best VPN software, see my expert review of the best VPNs for browsing the web privately on your Windows, Mac, Android and iOS devices.

8) Use a personal data removal service: Data brokers sell your contact details and personal information, which hackers can use for targeted phishing attacks or SIM swap scams. These services automatically remove your data from broker databases, reducing the risk of social engineering attempts that could compromise your bank account.

While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here.

GOT A BANK TRANSFER ALERT TEXT? IT MIGHT BE A SCAM. HERE’S WHAT TO DO

Advertisement

Kurt’s key takeaways

Hackers don’t need to break into your bank’s system; they just need to trick you. Whether it’s phishing, malware or SIM swaps, the goal is always the same: get access to your login and verification codes. Fortunately, you can make it much harder for them by using secure habits and staying alert. Your money belongs with you, not in the hands of a scammer.

Has this ever happened to you or someone you know? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Follow Kurt on his social channels:

Advertisement

Answers to the most-asked CyberGuy questions:

New from Kurt:

Copyright 2025 CyberGuy.com. All rights reserved.

Continue Reading

Technology

Mexico is suing Google over how it’s labeling the Gulf of Mexico

Published

on

Mexico is suing Google over how it’s labeling the Gulf of Mexico

Mexican President Claudia Sheinbaum announced Friday that her government is suing Google for relabeling the Gulf of Mexico as “Gulf of America” for US users, CBS News reports. The company had done so in Google Maps after President Trump ordered the name change at the beginning of his Presidential term.

The lawsuit makes good on Sheinbaum’s February threat that Mexico would “proceed to court” if the company didn’t change the name, which it kept as Gulf of Mexico for users in Mexico, but switched to “Gulf of Mexico (Gulf of America)” in regions outside of the two countries. According to a machine-translated transcript of Sheinbaum’s Friday press briefing, she says “the only thing we want is compliance with the decree issued by the United States government,” which, she adds, “wouldn’t have the authority to name the entire Gulf, because that is an international attribution.”

President Sheinbaum continues:

We couldn’t say anything about changing the name of a state, a mountain, or a lake. So, the part of their territory that corresponds to them can be called whatever they decide. The part that corresponds to Mexico can’t be renamed. The part that corresponds to Cuba can’t be renamed, either. So, what we’re saying is, “Google, stick to what the United States government approved.”

Prior to her briefing, Mexico sent letters to Google asking it not to label its territorial waters as Gulf of America, and Sheinbaum shared a reply from Google VP of government affairs and public policy Cris Turner stating the company had no plans to change its policy. CBS News notes that the US House passed a bill on Thursday that would codify the name change.

Google did not immediately respond to The Verge’s request for comment.

Advertisement
Continue Reading

Trending