Tagged: personal information Toggle Comment Threads | Keyboard Shortcuts

  • Geebo 8:00 am on September 5, 2025 Permalink | Reply
    Tags: , personal information, quiz, ,   

    Quizzes That Put Your Privacy at Risk 

    By Greg Collier

    Social media often presents itself as a harmless space for lighthearted interaction. Among the most popular features are quizzes that ask questions ranging from travel habits to favorite fictional characters. While they may appear entertaining, these activities can present real risks when it comes to online security. According to a recent report from FOX5 Las Vegas, cybercriminals are increasingly using these quizzes to gather information that can be exploited for identity theft and account breaches.

    Questions about travel, for example, may indicate whether someone possesses a passport or other forms of identification. Details about a hometown, school, or even where a relationship began can serve as valuable clues to common security questions used for account recovery. Seemingly playful questions about favorite characters or entertainment choices may also reveal hints that help criminals guess or refine password attempts.

    The information given in these quizzes may appear trivial, but once placed in the wrong hands, it can be exploited to commit identity theft or gain access to sensitive accounts. What makes this even more concerning is that criminals rarely rely on a single source. Information shared through quizzes can be combined with details found in public records, leaked databases, or shopping and job websites. When layered together, these fragments create a fuller profile that makes it easier for someone with malicious intent to compromise personal or financial security.

    The most effective approach is to avoid providing personal information in these quizzes altogether. Adjusting privacy and security settings to the highest available levels is also strongly recommended. Beyond individual action, awareness is critical. Sharing the risks with others helps limit the reach of cybercriminals who frequently exploit social connections to target additional victims.

    Online engagement can be enjoyable, but the need for vigilance has never been greater. Thinking carefully about the information shared publicly is one of the simplest and most powerful tools available for protecting personal data. A good rule of thumb is that if something online feels harmless or “just for fun,” it is worth pausing to ask who benefits from the information before participating.

     
  • Geebo 9:01 am on July 10, 2018 Permalink | Reply
    Tags: , hard drives, , personal information, , ,   

    Wipe your devices before selling them 

    Wipe your devices before selling them

    Congratulations. You just bought a shiny new device, but you’re unsure what to do with still functioning older device. You could either donate it, recycle it, gift it, or even sell it on Geebo. However, before you do any of those things, you want to make sure there is no longer any valuable information left on the device.

    Recently, ABC Action News in the Tampa area bought a number of laptops from people who were selling them on online marketplaces. A number of those laptops still had valuable information on them including bank account and social security numbers. Before parting with a device that has been in your service for years you want to make sure that there is no personal information left on it. While Action News mentions taking your device to be professionally wiped, that costs money and could eat into any potential windfall if you’re planning on selling the device. That’s not even taking into account that while most professionals are on the up and up, there are those bad apples who may use this as an opportunity to harvest your data. After backing up the data you want to save, try these tips for wiping the hard drive on your PC or laptop.

    As the video mentions, software like DBAN is probably your best bet for wiping your hard drives of all important information. Apple computers have their own built-in process for wiping the hard drive. The same goes for Android and iOS devices in case you’re selling a phone or tablet.

    In these days of personal information being leaked from just about everywhere taking these few extra steps and a little bit of time are definitely worth the effort and your peace of mind.

     
  • Geebo 10:55 am on December 13, 2016 Permalink | Reply
    Tags: , hello kitty, , personal information   

    Why hackers want your kids’ accounts 

    Why hackers want your kids' accounts

    We’re used to hearing about companies being hacked and personal information being stolen. Usually it’s a tech monolith like Yahoo or a retail giant like Target. However, it seems that some hackers are targeting sites and services used by children. Popular Mechanics has reported that children’s sites like V-Tech and Hello Kitty are being hacked for their users information, and their users are children.

    So what would hackers want with the user information of children? A lot of it is what some would call a long con. Hackers could hold on to this information for years until the child turns 18. Then they could use that information to do the usual with stolen personal information. They could open banking accounts, take out loans, apply for credit cards, etc.

    So while you may think that your 10-year-old’s current personal information may currently be useless, that’s not to say that it can’t be eventually be used for bad intents. What you can do is what most adults do. When signing up your kid for some website or service, use false information. How many sites do we adults sigh up for and give the service fake names and addresses. I’ve lost track of how many services I’ve signed up for where I used the address of 123 Fake Street. Also, I think it goes without saying that you should never let your young children sign up for services on their own as they tend to freely give out their personal information. Plus, this would be a great teaching moment to your kids as to why and how their personal information should be protected.

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel