Connect with us

Technology

What exactly is a data breach and why should I care?

Published

on

What exactly is a data breach and why should I care?

Data breaches have become common, and if you’ve actively used online services in the past year, you might have been affected by them. For example, the Advance Auto Parts breach exposed more than 2.3 million users’ personal information, while a recent AT&T incident allowed hackers to access around six months of customer call and text interactions. But what do bad actors do with all this data?

John from Jackson, Mississippi, asked a similar question that I want to highlight and address because it helps all of us:

“What do you mean when you say a company has exposed 2.3 million or whatever in a data breach? This happens often, but there is never any follow-up. It’s like throwing address labels in a trash can, and then they are carried to the landfill. So? What really happens with a data breach?”

I get what you’re saying, John. Data breaches make headlines, but you rarely hear about the fallout. It’s tough to link a specific breach to a specific problem later on. Below is a detailed look at what a data breach actually means.

GET SECURITY ALERTS, EXPERT TIPS – SIGN UP FOR KURT’S NEWSLETTER – THE CYBERGUY REPORT HERE

Advertisement

Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)

Data breach explained

A data breach occurs when an unauthorized person gains access to information that is meant to be confidential, private, protected or sensitive. Think of it this way: You have personal information that you trusted a friend with, but while sharing it, someone who wasn’t supposed to know it overheard it.

A real-life example is the AT&T data breach mentioned earlier. Your call logs and text interactions that were meant to be private and which you trusted AT&T to protect ended up in the hands of hackers. These details can now be used by bad actors to scam you.

Data breaches can happen in a few ways. Hackers might target specific organizations or launch broad attacks hoping to steal certain kinds of data. They can also use targeted cyberattacks to go after specific individuals.

Advertisement

Sometimes, data breaches occur due to honest mistakes or oversights by employees. Weaknesses in an organization’s systems and infrastructure can also leave them vulnerable to data breaches.

Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)

MASSIVE DATA BREACH EXPOSES 3 MILLION AMERICANS’ PERSONAL INFORMATION TO CYBERCRIMINALS

Anatomy of a deliberate data breach

Here’s what typically happens in a data breach that’s deliberately caused:

Research: Cybercriminals often begin by identifying a target, such as a large corporation like AT&T, focusing on the type of data they want, which could include personal customer information. They search for weaknesses in the company’s security, which might involve exploiting system flaws or targeting network infrastructure.

Advertisement

Attack: The attackers make their initial move using either a network or social attack. Common methods include phishing attacks, where individuals are tricked into revealing personal information; malware attacks that can steal or encrypt data; and denial-of-service attacks that disrupt services. These tactics can compromise the personal information of customers, such as names, addresses, phone numbers and even payment information.

Exfiltration: Once inside the company’s systems, cybercriminals tunnel their way to confidential data. For individuals, this means that their personal information can be extracted and sold on the dark web, used for identity theft or for other malicious purposes. The impact on individuals can be severe, including financial loss, damage to credit scores and the emotional stress of having personal information exposed and misused.

Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)

WORLD’S LARGEST STOLEN PASSWORD DATABASE UPLOADED TO CRIMINAL FORUM

What happens once the hackers have the data?

Once the hackers obtain protected and confidential data, they have various ways to profit from it. They can use compromised data for illegal activities, including identity theft, financial fraud, spamming or even extortion. Information such as email addresses and phone numbers can be used in phishing scams.

Advertisement

Sometimes, this data is also posted on dark web forums for sale. It can be purchased by other criminals, who may use it for various illicit activities. Just as you don’t hear about every burglary, homicide or battery, you don’t hear about each instance of these criminal activities.

They only make headlines when something significant occurs, such as the incident where hackers scammed a Colorado woman out of $25,000 or when a man was arrested for scamming a Kalispell, Montana, woman of $150,000.

Data breaches impact not only customers but also the companies involved. These companies may face government fines or lawsuits. For example, AT&T is currently dealing with a class-action lawsuit due to a security breach in 2022 that exposed months’ worth of data from nearly all its customers. Similarly, T-Mobile is facing a lawsuit related to a data breach that affected millions of people.

Illustration of a hacker at work (Kurt “CyberGuy” Knutsson)

CYBERCRIMINALS TAKING ADVANTAGE OF CROWDSTRIKE-LINKED GLOBAL COMPUTER OUTAGE

Advertisement

How to protect yourself from data breaches?

It’s primarily the responsibility of companies or online services to keep your data safe, but if it gets exposed, here are some tips to keep in mind:

1. Change your passwords

If hackers have recorded your passwords, they could access your online accounts and steal your data or money. ON ANOTHER DEVICE (i.e., your laptop or desktop), you should change your passwords for all your important accounts, such as email, banking, social media, etc. You want to do this on another device so that the hacker isn’t recording you setting up your new password on your hacked device. And you should also use strong and unique passwords that are hard to guess or crack. You can also use a password manager to generate and store your passwords securely.

2. Enable two-factor authentication

Activate two-factor authentication (2FA) for an extra layer of security on all your important accounts, including email, banking and social media. 2FA requires you to provide a second piece of information, such as a code sent to your phone, in addition to your password when logging in. This makes it significantly harder for hackers to access your accounts, even if they have your password. Enabling 2FA can greatly reduce the risk of unauthorized access and protect your sensitive data.

3. Monitor your accounts and transactions

You should check your online accounts and transactions regularly for any suspicious or unauthorized activity. If you notice anything unusual, immediately report it to the service provider or authorities. You should also review your credit reports and scores to see if there are any signs of identity theft or fraud.

CLICK HERE FOR MORE US NEWS

Advertisement

4. Contact your bank and credit card companies

If hackers have obtained your bank or credit card information, they could use it to make purchases or withdrawals without your consent. You should inform your bank and credit card companies of the situation. They can help you freeze or cancel your cards, dispute any fraudulent charges and issue new cards for you.

You should also contact one of the three major credit reporting agencies (Equifax, Experian or TransUnion) and request a fraud alert to be placed on your credit file. This will make it more difficult for identity thieves to open new accounts in your name without verification. You can even freeze your credit, if need be.

5. Use personal data removal services

Consider investing in personal data removal services that specialize in continuously monitoring and removing your personal information from various online databases and websites. These services employ advanced tools and techniques to identify and eliminate your data from people-search sites, data brokers and other platforms where your information might be exposed. By using a data removal service, you can minimize the risk of identity theft and fraud, especially after a data breach. Additionally, these services often provide ongoing monitoring and alerts, keeping you informed of any new instances of your data appearing online and taking immediate action to remove it. Check out my top picks for data removal services here.

6. Sign up for identity theft protection

Identity theft protection companies can monitor personal information like your home title, Social Security Number, phone number and email address and alert you if it is being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft.

7. Alert your contacts

If hackers have accessed your email or social media accounts, they could use them to send spam or phishing messages to your contacts. They could also impersonate you and ask for money or personal information. You should alert your contacts and warn them not to open or respond to any messages from you that seem suspicious or unusual.

Advertisement

Kurt’s key takeaway

The impact of a data breach may not be immediate, but once your data is on the internet, it can be misused by bad actors. They can steal your hard-earned money, cause emotional and mental harm or affect your loved ones. So, even if you don’t see the immediate impact of a data breach, take action. Ensure your devices are protected, and keep a close eye on your bank accounts.

Have you ever noticed unusual activity in your accounts after a data breach was reported? Let us know by writing us at Cyberguy.com/Contact.

For more of my tech tips and security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Cyberguy.com/Newsletter.

Ask Kurt a question or let us know what stories you’d like us to cover.

Advertisement

Follow Kurt on his social channels:

Answers to the most asked CyberGuy questions:

Copyright 2024 CyberGuy.com. All rights reserved.

Technology

Disney Plus is getting vertical video

Published

on

Disney Plus is getting vertical video

Disney Plus will be getting a vertical video feed later this year, Disney announced as part of its Global Tech & Data Showcase for advertisers at CES.

Based on an interview with Erin Teague, Disney’s EVP of product management for Disney Entertainment and ESPN, Deadline reports that vertical video in the app could include “original short-form programming, repurposed social clips, refashioned scenes from longer-form episodic or feature titles or a combination.”

“Think all the short-form Disney content you’d want in one unified app,” Teague said onstage at Wednesday’s showcase. “Over time, we’ll evolve the experience as we explore applications for a variety of formats, categories, and content types for a dynamic feed of just what you’re interested in — from Sports, News, and Entertainment — refreshed in real time based on your last visit.”

Update, January 7th: Added quote from Disney’s Erin Teague.

Continue Reading

Technology

Plastic bottles could power your devices one day

Published

on

Plastic bottles could power your devices one day

NEWYou can now listen to Fox News articles!

Each year, billions of single-use plastic bottles end up in landfills or oceans. That waste problem keeps growing. Now, a new scientific breakthrough suggests those same bottles could help power your daily life.

Researchers have developed a way to transform discarded plastic water bottles into high-performance energy storage devices called supercapacitors. The work focuses on PET plastic, short for polyethylene terephthalate, which is used in most beverage bottles. 

The research was published in Energy & Fuels and highlighted by the American Chemical Society. Scientists say the discovery could reduce plastic pollution while helping drive cleaner energy technology.

Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.

Advertisement

SCIENTISTS EXTRACT SILVER FROM E-WASTE USING COOKING OIL

Discarded PET water bottles are one of the most common sources of plastic waste worldwide, with hundreds of billions produced each year. (Kurt “CyberGuy” Knutsson)

Why PET plastic waste is such a growing problem

PET plastic is everywhere. According to the researchers, more than 500 billion single-use PET plastic bottles are produced every year. Most are used once and thrown away. Lead researcher Dr. Yun Hang Hu says that scale creates a major environmental challenge.

Instead of letting that plastic pile up, the team focused on upcycling it into something valuable. Their idea was simple but powerful. Turn waste into materials that support renewable energy systems and reduce production costs at the same time.

NEW TECH RECOVERS 92% OF EV BATTERY METALS

Advertisement

Those upcycled materials come together to form an all-waste-plastic supercapacitor designed for fast charging and long term energy storage. (Kurt “CyberGuy” Knutsson)

How plastic bottles can store and release energy

Imagine a device that can charge fast and deliver power instantly. That is exactly what supercapacitors do. They store and release energy much faster than traditional batteries, which makes them useful for electric vehicles, solar power systems and everyday electronics. 

Hu’s team found a way to build these energy storage components using discarded PET plastic water bottles. By reshaping the plastic at extremely high temperatures, the researchers turned waste into materials that can generate electricity efficiently and repeatedly.

Here is how the process works:

For the electrodes, researchers cut PET bottles into tiny, grain-sized pieces. They mixed the plastic with calcium hydroxide and heated it to nearly 1,300 degrees Fahrenheit in a vacuum. That heat transformed the plastic into a porous, electrically conductive carbon powder.

The powder was then formed into thin electrode layers. For the separator, small pieces of PET were flattened and carefully perforated with hot needles. This pattern allowed electric current to pass efficiently while maintaining safety and durability. Once assembled, the device used two carbon electrodes separated by the PET film and submerged in a potassium hydroxide electrolyte.

Advertisement

CIGARETTE BUTTS MAKE ROADS STRONGER THAN EVER BEFORE

Researchers use extreme heat to convert waste PET plastic into porous carbon materials that can store and move electricity efficiently. (Kurt “CyberGuy” Knutsson)

Why the results surprised scientists

When tested, the all-waste-plastic supercapacitor outperformed similar devices made with traditional glass fiber separators. After repeated charging and discharging, it retained 79 percent of its energy capacity. A comparable glass fiber device retained 78 percent. That difference matters. The PET-based design costs less to produce, remains fully recyclable, and supports circular energy storage technologies where waste materials are reused instead of discarded.

What this means for you

This breakthrough could affect everyday life sooner than you might expect. Cheaper supercapacitors can lower the cost of electric vehicles, solar systems and portable electronics. Faster charging and longer device lifespans could follow. It also shows that sustainability does not require giving something up. Waste plastics could become part of the solution instead of the problem. Although this technology is still in development, the research team believes PET-based supercapacitors could reach commercial markets within 5 to 10 years. In the meantime, choosing reusable bottles and plastic-free alternatives still helps reduce waste today.

Take my quiz: How safe is your online security?

Advertisement

Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.

Kurt’s key takeaways

Turning trash into energy storage is more than a clever idea. It shows how science can tackle two global challenges at once. Plastic pollution continues to grow. Energy demand does too. This research proves that those problems do not have to be solved separately. By rethinking waste as a resource, scientists are building a cleaner and more efficient future from materials we already throw away.

If your empty water bottle could one day help power your home or car, would you still see it as trash? Let us know by writing to us at Cyberguy.com.

CLICK HERE TO DOWNLOAD THE FOX NEWS APP

Sign up for my FREE CyberGuy Report

Advertisement

Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter. 

Copyright 2025 CyberGuy.com. All rights reserved.

Advertisement
Continue Reading

Technology

Amazon’s smart shopping cart for Whole Foods gets bigger, lighter, and adds tap-to-pay

Published

on

Amazon’s smart shopping cart for Whole Foods gets bigger, lighter, and adds tap-to-pay

Amazon is launching a revamped version of its smart shopping cart, which it plans to bring to dozens of Whole Foods locations by the end of this year, according to an announcement on Wednesday. The new Dash Cart features a “more responsive” item scanner that’s now located next to the built-in display, along with a new NFC reader that lets you tap to pay with your credit card or phone.

Amazon’s previous Dash Cart design put scanners beneath and in front of the handle, potentially making them harder to spot. It also only let you pay with the credit card attached to your Amazon account.

With the upgraded Dash Cart, you’ll find a new scale alongside the cart’s handle, which Amazon says “works in tandem with on-cart cameras, weight sensors, and deep learning models to ensure accurate pricing for every item.” The upgraded Dash Cart eliminates the large sensors facing inside the cart as well, offering a 40 percent larger capacity and a 25 percent lighter weight.

The Dash Cart shows an interactive map of the store on its display, similar to Instacart’s smart Caper Cart. You can sync your shopping list created with Alexa, too, and see how much you’re spending as you add more items to your cart. The cart uses built-in sensors and computer vision to detect when you’ve removed an item, allowing it to automatically update your total. When you’re done shopping, you can skip the checkout line and leave the store in a designated Dash Cart lane.

Amazon is launching its new Dash Cart as the company shakes up its grocery business, which has tied Whole Foods more closely to the Amazon brand. The company has already brought its new Dash Cart to three Whole Foods stores in McKinney, Texas; Reston, Virginia; and Westford, Massachusetts, along with two Amazon Fresh stores.

Advertisement
Continue Reading

Trending