Is Artificial Intelligence Our Doom?

Voice-Controlled Gadgets

Personal Outsourcing

This Is Cyberwarfare

The Post-Truth Era

Introduction to Blockchain

Carmageddon Is Here

Mobile Payments and Deposits

Welcome to Surveillance Capitalism

Great Websites for Cheap Products

Honoring Fred Rosenberg

The Cyrptocurrency Craze

Voice-Controlled Assistants

Dealing with a Future Without Jobs

Why You Need a Virtual Private Network

How Do You Feel About Being a Cyborg?

Why Artificial Intelligence Is Scary

Google Lens, Amazon Echo, and More Toys

Algorithms Are Us

Best Ways to Spot Fake News

More Options for Cable Cutters

Artificial Intelligence & Neural Nets

Beware of Fake News

Amazon Echo Dot

Driverless Cars Coming Soon

Governments Approve Commercial Drones

The Sharing Economy in Southeastern Iowa

Ad Blocker for Your Web Browser

Virtual Assistants: Siri, Cortana, Alexa

Google Cardboard: Cheap Virtual Reality

Periscope Addiction

Pet, Kid, Keychain Traciers

Google Tips and Tricks

Use Price Alerts to Save Money

Best Gadgets of 2015

Apple TV, Streaming Video Devices

My Favorite Email Newsletters

Peer-to-Peer Lending

3-D Printing

Chromebook, a $150 Laptop

Periscope: Live Video from Around the World

Get Your Questions Answered on Quora

Sling TV — $20 per Month

The Drone Revolution

Bitcoin Mining Flop

Smart Light Bulbs

Revolutionary Apple Watch

Smart Home Gadgets

Buying a Bitcoin Miner

Traveling with Siri

The Sharing Economy: Uber, Airbnb

Storing Your Music in the Cloud

The Internet of Things

Life in Cloud Heaven

2013 Tablet Buyers Guide

What Marketers Know About You

Google Dashboard Knows About You

Stream Video with Google Chromecast

Big Data, NSA, and You

Google's Predictive Search

Bitcoin—Mint Your Own Money

Android Smart TV via $45 Mini PC

MOOCs: Quality Free Online Courses

Beware of Dynamic Pricing

Use Crowdfunding to Raise Money

Tablet Computer Buyer's Guide

Google's Self-Driving Car

Mobile Media/App Stores Compared

Google Nexus 7 vs iPad

Email Follies

Your Million-Dollar Smartphone

Google Drive: Free Cloud Storage

Free and Low-Cost Phone Calls

Google Glasses

Loving iCloud

iPad Wins, Other Tablets Lose

Siri is Revolutionary

Essentials of Computer Backup

Homage to Steve Jobs

Are Your Files Safe in the Cloud?

Amazing Uses of iPhone Camera

Use Carbonite Online Backup

Cloud Services Roundup

Tablet Computer Roundup

Project Watson Wins at Jeopardy

Stream Video by Connecting a Computer to Your TV

The Appeal of Apple TV

Roundup of Streaming TV Devices

Options for Streaming Video to a TV

Dealing with Cell Phone Radiation

Ebook Readers & Tablet Computers

Dreaming of 4G

Google TV

The iPad in Your Future

The Magic of Google Translate

iPhone: There's an App for That

3-D TV and Robots in Your Future

More Goodies from Google

Google Wave — Better than E-mail

Growing Up with the Internet

Bing: Better than Google

Google Voice — Great free service

The Twitter Revolution

Virtualization and You

Death of Newspapers

Netbook Computers

Great New Search Engines

Boxee — Free Online TV

Mozy — Free Offsite Backup

Amazon's Video-on-Demand

Wanting a Kindle

iPhone Love

Better than Google

Cloud Computing and MobileMe

Digg and Other Social Media Sites

Hulu.com: Free TV & Movies

Pandora: Best Source for Streaming Music

Cell Phones Changing

Intro to HDTV

Best Free Phone Resources

Free Online TV: Joost

Movies, TV Go Online

Scary Internet Stories

Facebook

The YouTube Election

Google Street View

Twitter, Twittervsion, and Flickervision fun

E-mail Tricks for Addicts

Cool PDA Phones

Webtop: Free Online Software

Useful Google Tidbits

My Yahoo, RSS, and Blogs

Google Earth

Online Videos

Web 2.0

Crowdsourcing

Virtual Worlds: Second Life

InTrade Predicts the Future

The MySpace Revolution

Wikipedia — A Free Encyclopedia

Wikipedia as Emergent Phenomenon

Wikipedia Lies

Free Calling with Skype

Intro to Podcasts

Intro to File Sharing: BitTorrent

Dangers of Wireless Hotspots

Google Maps

Free Online Credit Reports

Making Money with Your Web Site

Beware of Spoofing and Phishing

Free Virus and Spyware Protection

Virus, Spyware Protection -- Part 2

A Brief History of the Internet

The Gadget Goddess

Free Open Source Software

Keeping Your Mac Tuned Up

Starting a Weblog

Getting Started with RSS

Latest Google Features

Selling on eBay & Half.com

Safe Online Shopping

Health-Related Web Sites

Free Virus Protection

Google Culture

Online Photo Sharing

Intro to GPS

Intro to Weblogs

Avoiding Spyware

Loving Google News

Testing your Internet Literacy

Urban Legends and Hoaxes

Buying and Selling on Half.com

Personalizing Yahoo

Stopping Spam

Useful New Search Engines

Conspiracy Theories

Online Nature Guides

Intro to Wireless

Yahoo Groups Are Fun and Useful

The Joys of Broadband

Free Expert Help

Asking questions online

Finding the lowest price

Movie information

Online Reference

Rebates

The Internet bazaar

MP3 music

Noah's Ark and the Internet

Link Rot

The Geek Report

About this site

Today's News and weather

Hot tips

Google
 
 

My Password Has Been Hacked at Least 27 Times

March 2019

Do this right away. Go to the website Have I Been Pwned (haveibeenpwned.com), enter your email address, and click “pwned.” The site will show you whether the bad guys got access to your personal data when they hacked into the computer systems of companies such as Target, Adobe, LinkedIn, and 337 others.

When I entered the email address that was my primary email for 15 years, it showed there have been nine occasions when the criminals got access to my email and password. This included data breaches at the websites Dailymotion, Dropbox, LinkedIn, and MySpace.

My Yahoo and Gmail email addresses and my university email address have each been exposed in six breaches.

In short, there are databases out there that any criminal can access in order to get my email address and password. In some cases, the breaches also include address and phone number.

Perhaps the most damaging breach was in June 2018 when the bad guys broke into Exactis, a company that collects consumer data to sell to political organizations, marketers, and anyone else wanting to know everything about you. In this instance, the breach revealed:

credit status information, date of birth, education level, email addresses, ethnicity, family structure, financial investments, gender, home ownership status, Income level, IP addresses, marital status, names, net worth, occupation, personal interests, phone numbers, physical addresses, religion, and spoken languages.

Yikes.

What can you do? Yep, change your password.

Criminals who access these databases of email addresses and passwords use that information to see if you have accounts they can break into. Maybe you don’t really care if they got the email address and password you used with your old MySpace account, but if you used that same email and password for your credit card account or Amazon or banking website, you could be at risk of having them access that account.

In many of the breaches above, I’ve since changed the passwords associated with those email addresses. I’m especially careful about using a unique password on accounts related to my finances. But I could do better.

Experts these days tend to recommend using a password manager. The ones I often see recommended are 1Password and LastPass. When a website asks you to create a password, these password managers automatically generate a strong password – and a different password for each website.

In addition, the next time you go to that website, the password manager will automatically fill in the password for you. You need not remember anything.

My Mac has a password manager built into the operating system. Not only does it automate creating and inserting passwords, and also inserting my username or email address, it also automatically shares those passwords across my devices. If I create an account on my computer and then access that website via my iPad, the password is automatically available to be inserted via my iPad. I need only touch my iPad’s Home button, and it uses fingerprint recognition to verify my identity, then inserts the password.

Of course, a question arises: if all my passwords are stored in one place on my computer, and in the cloud (in the case of password managers that share information across devices), what happens if the bad guys access my collected passwords?

Experts say the risk is small because password companies use strong encryption for their vault of customers’ passwords. And password managers typically use multifactor authentication, which would make it very difficult for someone to access passwords stored on your computer.

The greater risk, of course, is using weak passwords or using the same password on multiple sites.

One interesting side note to these data breaches: security experts have examined the data to determine the most popular passwords. The most common passwords of 2018 included 123456, password, 111111, qwerty, and iloveyou. Don’t ever use these.

If you decide not to use a password manager, be sure your password is at least eight characters and a combination of letters, numbers, and special characters, such as # and ^.

A better option may be to use a passphrase, such as “A stitch in time saves nine.” Experts say that password-cracking tools are limited to about 10 characters and that a phrase is easier to remember. Plus, a phrase will likely entail upper and lower case, as well as punctuation, making it even stronger.

Fortunately, so far the stealing of my passwords hasn’t affected me, other than the emails I’ve been receiving in recent months that appear to come from my own email account and claiming the sender has compromised my computer. To prove it, the sender includes my original password from years ago. He makes threats and demands that I transfer bitcoin to his account.

But I know it’s a scam – because I changed that password years ago.

© 2019 by Jim Karpen, Ph.D.

E-mail Jim Karpen

In Association with Amazon.com

 

Learn More Click Here to Pay

 

 

Hosted by the webmasters at: US-Webmasters.com(TM)

Start here to find it FAST!(TM)

PayPal Fraud, Part 1

Internet Fraud, Part 2

Internet Fraud, Part 3

Suing My Credit Card Company

Bored.Com is fun

Best source for news

Guinness World Records

Tellme voice portal

eHow.Com tells you how

Free graphics online

Low-cost movies, software

Cheap airfares

Simple, free money transfer

Government information