Connect with us

Technology

What exactly is a data breach and why should I care?

Published

on

What exactly is a data breach and why should I care?

Data breaches have become common, and if you’ve actively used online services in the past year, you might have been affected by them. For example, the Advance Auto Parts breach exposed more than 2.3 million users’ personal information, while a recent AT&T incident allowed hackers to access around six months of customer call and text interactions. But what do bad actors do with all this data?

John from Jackson, Mississippi, asked a similar question that I want to highlight and address because it helps all of us:

“What do you mean when you say a company has exposed 2.3 million or whatever in a data breach? This happens often, but there is never any follow-up. It’s like throwing address labels in a trash can, and then they are carried to the landfill. So? What really happens with a data breach?”

I get what you’re saying, John. Data breaches make headlines, but you rarely hear about the fallout. It’s tough to link a specific breach to a specific problem later on. Below is a detailed look at what a data breach actually means.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

Advertisement

Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)

Data breach explained

A data breach occurs when an unauthorized person gains access to information that is meant to be confidential, private, protected or sensitive. Think of it this way: You have personal information that you trusted a friend with, but while sharing it, someone who wasn’t supposed to know it overheard it.

A real-life example is the AT&T data breach mentioned earlier. Your call logs and text interactions that were meant to be private and which you trusted AT&T to protect ended up in the hands of hackers. These details can now be used by bad actors to scam you.

Data breaches can happen in a few ways. Hackers might target specific organizations or launch broad attacks hoping to steal certain kinds of data. They can also use targeted cyberattacks to go after specific individuals.

Advertisement

Sometimes, data breaches occur due to honest mistakes or oversights by employees. Weaknesses in an organization’s systems and infrastructure can also leave them vulnerable to data breaches.

Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)

MASSIVE DATA BREACH EXPOSES 3 MILLION AMERICANS’ PERSONAL INFORMATION TO CYBERCRIMINALS

Anatomy of a deliberate data breach

Here’s what typically happens in a data breach that’s deliberately caused:

Research: Cybercriminals often begin by identifying a target, such as a large corporation like AT&T, focusing on the type of data they want, which could include personal customer information. They search for weaknesses in the company’s security, which might involve exploiting system flaws or targeting network infrastructure.

Advertisement

Attack: The attackers make their initial move using either a network or social attack. Common methods include phishing attacks, where individuals are tricked into revealing personal information; malware attacks that can steal or encrypt data; and denial-of-service attacks that disrupt services. These tactics can compromise the personal information of customers, such as names, addresses, phone numbers and even payment information.

Exfiltration: Once inside the company’s systems, cybercriminals tunnel their way to confidential data. For individuals, this means that their personal information can be extracted and sold on the dark web, used for identity theft or for other malicious purposes. The impact on individuals can be severe, including financial loss, damage to credit scores and the emotional stress of having personal information exposed and misused.

Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)

WORLD’S LARGEST STOLEN PASSWORD DATABASE UPLOADED TO CRIMINAL FORUM

What happens once the hackers have the data?

Once the hackers obtain protected and confidential data, they have various ways to profit from it. They can use compromised data for illegal activities, including identity theft, financial fraud, spamming or even extortion. Information such as email addresses and phone numbers can be used in phishing scams.

Advertisement

Sometimes, this data is also posted on dark web forums for sale. It can be purchased by other criminals, who may use it for various illicit activities. Just as you don’t hear about every burglary, homicide or battery, you don’t hear about each instance of these criminal activities.

They only make headlines when something significant occurs, such as the incident where hackers scammed a Colorado woman out of $25,000 or when a man was arrested for scamming a Kalispell, Montana, woman of $150,000.

Data breaches impact not only customers but also the companies involved. These companies may face government fines or lawsuits. For example, AT&T is currently dealing with a class-action lawsuit due to a security breach in 2022 that exposed months’ worth of data from nearly all its customers. Similarly, T-Mobile is facing a lawsuit related to a data breach that affected millions of people.

Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)

CYBERCRIMINALS TAKING ADVANTAGE OF CROWDSTRIKE-LINKED GLOBAL COMPUTER OUTAGE

Advertisement

How to protect yourself from data breaches?

It’s primarily the responsibility of companies or online services to keep your data safe, but if it gets exposed, here are some tips to keep in mind:

1. Change your passwords

If hackers have recorded your passwords, they could access your online accounts and steal your data or money. ON ANOTHER DEVICE (i.e., your laptop or desktop), you should change your passwords for all your important accounts, such as email, banking, social media, etc. You want to do this on another device so that the hacker isn’t recording you setting up your new password on your hacked device. And you should also use strong and unique passwords that are hard to guess or crack. You can also use a password manager to generate and store your passwords securely.

2. Enable two-factor authentication

Activate two-factor authentication (2FA) for an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.

3. Monitor your accounts and transactions

You should check your online accounts and transactions regularly for any suspicious or unauthorized activity. If you notice anything unusual, immediately report it to the service provider or authorities. You should also review your credit reports and scores to see if there are any signs of identity theft or fraud.

CLICK HERE FOR MORE US NEWS

Advertisement

4. Contact your bank and credit card companies

If hackers have obtained your bank or credit card information, they could use it to make purchases or withdrawals without your consent. You should inform your bank and credit card companies of the situation. They can help you freeze or cancel your cards, dispute any fraudulent charges and issue new cards for you.

You should also contact one of the three major credit reporting agencies (Equifax, Experian or TransUnion) and request a fraud alert to be placed on your credit file. This will make it more difficult for identity thieves to open new accounts in your name without verification. You can even freeze your credit, if need be.

5. Use personal data removal services

Consider investing in personal data removal services that specialize in continuously monitoring and removing your personal information from various online databases and websites. These services employ advanced tools and techniques to identify and eliminate your data from people-search sites, data brokers and other platforms where your information might be exposed. By using a data removal service, you can minimize the risk of identity theft and fraud, especially after a data breach. Additionally, these services often provide ongoing monitoring and alerts, keeping you informed of any new instances of your data appearing online and taking immediate action to remove it. Check out my top picks for data removal services here.

6. Sign up for identity theft protection

Identity theft protection companies can monitor personal information like your home title, Social Security Number, phone number and email address and alert you if it is being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.

7. Alert your contacts

If hackers have accessed your email or social media accounts, they could use them to send spam or phishing messages to your contacts. They could also impersonate you and ask for money or personal information. You should alert your contacts and warn them not to open or respond to any messages from you that seem suspicious or unusual.

Advertisement

Kurt’s key takeaway

The impact of a data breach may not be immediate, but once your data is on the internet, it can be misused by bad actors. They can steal your hard-earned money, cause emotional and mental harm or affect your loved ones. So, even if you don’t see the immediate impact of a data breach, take action. Ensure your devices are protected, and keep a close eye on your bank accounts.

Have you ever noticed unusual activity in your accounts after a data breach was reported? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Advertisement

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Technology

New York sues Valve, alleging its loot boxes are ‘quintessential gambling’

Published

on

New York sues Valve, alleging its loot boxes are ‘quintessential gambling’

New York Attorney General Letitia James is suing Valve for “illegally promoting gambling” through the loot box systems it has built for video games like Counter-Strike 2, Team Fortress 2, and Dota 2, according to a press release. The attorney general seeks to “permanently stop Valve from promoting gambling features in its games, disgorge all ill-gotten gains, and pay fines for violating New York’s laws.”

“This loot box model that Valve has developed — charging an individual for a chance to win something of value based on luck alone — is quintessential gambling, prohibited under New York’s Constitution and Penal Law,” the lawsuit says. Valve has made “tens of millions of dollars” selling loot box keys to “thousands” of New York residents and has “made millions of dollars more in commissions from New Yorkers who sold virtual items obtained from loot boxes.” The company’s loot boxes are also “particularly pernicious” because they’re popular with children and adolescents, according to the complaint.

Users can purchase keys to open loot boxes in some Valve games and receive randomly-selected virtual items as rewards. If they want, users can then sell those rewards on the Steam Community Market and on third-party marketplaces; the rarer items can be worth “thousands of dollars,” the lawsuit says. These systems, however, require that users pay Valve $2.49 plus tax to open the loot boxes, and users often get items that are “worth less than what the user spent on the key”. The lawsuit also notes that Valve’s experience for opening a loot box in Counter-Strike 2 resembles that of a slot machine.

Valve didn’t immediately reply to a request for comment.

Continue Reading

Technology

Think your New Year’s privacy reset worked? Think again

Published

on

Think your New Year’s privacy reset worked? Think again

NEWYou can now listen to Fox News articles!

At the start of the year, you did everything right. You searched your name, opted out of several data broker sites and deleted listings that exposed your address, phone number and relatives.

At first, it felt like a clean slate. However, here’s the uncomfortable truth: your data rarely stays gone. In many cases, February is when it quietly returns.

Privacy does not work as a one-time cleanup. Instead, it requires ongoing maintenance, because data brokers design their systems to outlast your best intentions.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

STOP DATA BROKERS FROM SELLING YOUR INFORMATION ONLINE
 

Cybersecurity advocates urge continuous monitoring to prevent data brokers from recreating deleted profiles. (Smith Collection/Gado/Getty Images)

How data brokers re-list your information (even after you delete it)

Most people assume that once they remove their profile from a data broker site, it’s gone for good.

That’s not how the system works. Data brokers don’t “store” your information the way a normal website does. They rebuild it constantly using automated data feeds from:

  • Credit headers
  • Property and mortgage records
  • Utility registrations
  • Loyalty programs
  • App tracking efforts
  • Court filings and public databases
  • Online purchases and subscriptions

Every few weeks, their systems can re-ingest new records and match them to your identity. That means:

  • Your old address gets replaced with your new one
  • Your new phone number appears
  • Your relatives are updated
  • Your age, job history and household data refresh
  • Your digital footprint grows more detailed over time

Even if you removed your profile in January, the next data refresh can quietly re-create it in February under a slightly different variation of your name. This is why people often say: “I removed my data… and then found it again a month later.” It wasn’t a mistake. It’s how the business model works.

Why January cleanups still leave you exposed

Manual opt-outs feel empowering at first. However, they rarely last. The real issue is scale: hundreds of data brokers collect, trade and republish personal information, and many share data with one another. As a result, removing your profile from one site does not stop the spread. Instead:

Advertisement
  • Another broker re-adds you using a new source
  • A third site scrapes the refreshed profile
  • A fourth copies the updated record
  • The cycle starts again

You’re not fighting one website. You’re fighting a self-healing network of databases that rebuild your profile every few weeks. That’s why January cleanups don’t protect you throughout the year. Scammers know this. They don’t just scrape old databases; they wait for newly refreshed lists that contain your:

  • Current phone number
  • Correct address
  • Relatives
  • Likely income range
  • Age and life stage

By February and March, those lists are already circulating again.

10 SIGNS YOUR PERSONAL DATA IS BEING SOLD ONLINE

Experts warn January privacy cleanups may not last as data broker databases refresh in February. (Jason Alden/Bloomberg via Getty Images)

What scammers get when your profile is rebuilt

When your data comes back, it doesn’t just sit on a website. It becomes fuel for:

That’s why scams feel personal now.  Criminals often have access to:

  • Your current address
  • Names of relatives
  • Your age
  • Your likely income range

Rather than guessing, scammers search your profile and build their pitch around real details. That precision is what makes today’s fraud attempts so convincing.

What ‘ongoing removal’ actually protects against

This is where most people misunderstand privacy tools. The real threat isn’t the old profile you deleted. It’s the next version that gets created.

Advertisement

Ongoing removal means:

  • Your data is constantly scanned across broker networks
  • New profiles are detected as soon as they appear
  • Fresh listings are removed automatically
  • Re-created records don’t get time to circulate.

Instead of playing whack-a-mole once a year, you block the rebuild cycle itself. This is the only way to stay ahead of systems designed to outlast you.

SPYWARE CAN HIJACK YOUR PHONE IN SECONDS

Ongoing data removal services aim to stop personal profiles from reappearing across broker networks. (Elisa Schu/picture alliance via Getty Images)

How to stop data brokers from rebuilding your profile

If you truly want to stay off data broker sites, you need a system that:

  1. Scans for new profiles
  2. Removes them as they appear
  3. Keeps doing it every month.

That’s what a data removal service was built for. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren’t cheap, and neither is your privacy. 

These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It’s what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. 

Advertisement

By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you.

Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting Cyberguy.com.

Get a free scan to find out if your personal information is already out on the web: Cyberguy.com.

Why this matters more in February than January

In January, people clean up their digital footprint. By contrast, February is when many data brokers refresh their databases and scammers begin working from newly updated lists. Instead of sending alerts, brokers quietly republish your details. 

You receive no warning when your profile reappears, and no notification when someone resells your information. As a result, most people only realize what happened after a scam email hits their inbox or a suspicious call lights up their phone. 

Advertisement

For that reason, February becomes the moment of confusion. That is when readers often say, “I thought I already handled this.”

Kurt’s key takeaways

At the start of the year, you did what most people avoid. You searched your name, opted out of broker sites and took control of your information. However, privacy does not work like a one-time spring cleaning. Instead, it works more like lawn care. The moment you stop maintaining it, the growth returns. Data brokers constantly refresh and rebuild profiles. They pull from public records, commercial feeds and shared databases. As a result, when your profile reappears, scammers do not treat it like old data. They treat it like fresh intelligence. That is exactly why February matters. While January feels proactive, February is when many databases quietly update and republish information. So if you want lasting control, you need consistent monitoring and ongoing removal, not a single annual cleanup. The real objective is not simply deleting an old profile. Rather, it is stopping the next version from spreading in the first place. Ultimately, privacy is not about what you remove. It is about what never comes back.

Have you ever removed your personal information from a data broker site, only to find it listed again weeks later?  Let us know your thoughts by writing to us at Cyberguy.com

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

Advertisement

Copyright 2026 CyberGuy.com. All rights reserved.

Related Article

Stop data brokers from selling your information online
Continue Reading

Technology

Resident Evil Requiem is still scary as hell on the Switch 2

Published

on

Resident Evil Requiem is still scary as hell on the Switch 2

It took me a while to recover from the first big scare in Resident Evil Requiem. There I was, hunched over with a screen inches from my face and headphones in my ears, when a gigantic woman began chasing me through a dimly lit hallway intent on, well, eating me. It was a heart-racing sequence, and when I finally got to a save room I had to put the game down for a few minutes. It was an early indication that Requiem was a great game, and further evidence that the Switch 2 is becoming a welcome home for third-party titles.

Since Nintendo’s latest console launched last June, there have been few chances to see how it directly stacks up to other platforms. The successful cross-platform launch of Tony Hawk’s Pro Skater 3+4 was a good early sign for the Switch 2, but Requiem might be the best test so far. It’s a blockbuster action-horror game launching simultaneously across the Switch 2, PS5, Xbox, and PC. And while there are certainly some compromises on Nintendo’s platform, Requiem is a surprisingly solid experience on the Switch 2.

Requiem brings together two different types of Resident Evil games: the fast-paced action of Resident Evil 4 and the more visceral first-person terror of Biohazard and Village. Those two sides are represented through two playable characters. RE4 hunk Leon returns as a grizzled action hero, while newcomer Grace is a more hapless FBI agent who does a lot of running and hiding. Impressively, you can seamlessly swap between viewpoints at any point, letting you experience Grace’s scares in first person or help Leon wield a chainsaw in third person (or vice versa).

On a purely functional level, I haven’t had any issues with the game on the Switch 2. There haven’t been any noticeable slowdowns or hitches, aside from one time when the corpse of a zombie butcher disappeared briefly, which gave me a scare thinking he’d come back to life after a tense shootout. But there’s been nothing game-breaking, and that’s been true in both portable and TV modes.

The main compromise, of course, is visual. Requiem on the Switch 2 simply does not look as good as it does on PC or the other consoles. There are a lot of blurry textures, particularly when you get up close to objects or walls, and things overall just don’t look as sharp or clear as they do on, say, a PS5. It’s especially noticeable in first-person mode when you’re up closer to objects and characters. I also spotted some wonky hair physics, with hair occasionally deciding to defy the laws of gravity and float whichever way it wanted. Again, none of these are game-breaking issues, but they do cut into the tension Requiem works so hard to build.

Advertisement

This is a busy week for Resident Evil fans who also own a Switch 2. In addition to Requiem, Capcom has released belated ports of Biohazard and Village. And while these are older games, my experience was much the same. I played through the beginning area of Biohazard again for the first time in nearly a decade — which I regret, because it is so freaking scary — and it similarly performed well but was plagued by fuzzy textures and impossible floating hair.

Honestly, that’s about the best-case scenario for ports like these. We all know the Switch 2 is underpowered compared to its direct competitors, so a game like Requiem is always going to feel hamstrung in some way. A port of Requiem that’s good enough, even if it’s not the best version of the game, goes a long way to helping Nintendo continue to flesh out the Switch 2’s library, which has grown steadily in both size and quality despite a notable lack of major first-party titles from Nintendo. And let’s not forget the fact that what you lose in visual splendor you make up for in portability.

Requiem is a good sign for the Switch 2’s viability as a platform for major third-party games, but an even better sign would be seeing releases like this more frequently. We won’t have to wait too long to see the next big test: Capcom’s sci-fi action game Pragmata launches across most major platforms, Switch 2 included, in April. I can’t wait to see how hair floats in space.

Continue Reading

Trending