Latest stories of our network
Your data matters - simple tips to keep it sage from a new wave of cybercriminial
Doxing. Have you heard of it? If not, here's why you might want to get up to date and some simple tips to keep protected. Essential personal data protection reading.
Open access to data - friend or foe?
The accessibility of information today is one of our most empowering freedoms. But it can also fuel malicious personal attacks, known as doxing or doxxing. We're about to take you through what doxing is, how criminals do it and how to prevent it.
What is doxing?
Doxing is maliciously revealing personal information online, for example, posting an anonymous blogger's real name or address. Doxers aim to punish, intimidate or humiliate their target by finding out sensitive information and using it against them, like selling your credit card details or threatening to burgle your home.
The never-ending black hole of personal information that is the internet means anyone with the time, motivation and interest can weaponize your personal data. And doxing is a growing problem.
How does doxing work?
These are the most common ways doxers grab data to expose someone.
When someone uses one username across multiple platforms, doxers can follow the trail.
Phishing scams are fake emails luring victims to click through to a malicious site where attackers may steal sensitive information.
Stalking social media
Geotagging your photos? Sharing your work location? Doxers can use this to build up a picture of your life and even to deduce the answers to your account security questions.
Is doxing that bad?
Yes. Doxing can have catastrophic consequences.
In 2015, hackers forced entry to dating site for people in committed relationships, Ashley Madison, stealing 32 million users' data. They demanded payment to return the records but didn't get it, so published all the data online, causing professional and personal harm, and probably a divorce or two. And then in 2020 Ashley Madison's attackers came back for more.Doxing knows no bounds. There are no clear good or bad sides. After an anonymous UK-based security researcher saved the world from a powerful cyberattack, the media outed his real identity and address, leaving him open to a revenge attack from the cybercrime group he went out to stop. Marcus Hutchins' story is one of a kind.
Protect yourself from doxers with this checklist
Recent research shows more of our data is being sold to organizations and criminals. Cybercriminals could use almost all of it for doxing or cyberbullying.Credit cards and banking log-ins are the most in-demand. They're used for extortion, phishing schemes and straight-up money theft. Meanwhile, doxxers use personal account access to cause reputational harm. How do you stop it happening to you? This anti-doxing checklist has everything you need to stay safe.
Keen to learn more about doxing and how to prevent it?
Kaspersky, in collaboration with endtab.org, has just released a free doxing training course. You'll learn about the dangers of dox attacks, how to protect against them and what to do if you're a victim.
- Transatlantic Cable podcast, episode 191 | Kaspersky official blog ›
- Transatlantic Cable podcast, episode 198 | Kaspersky official blog ›
Lives today are linked to the world of Star Wars more than many realize
Today is Star Wars Day! What better way to celebrate the iconic movies than by checking out these 4 documentaries that show how Star Wars technology is becoming a daily reality. These short films explore the amazing possibilities of this moment in robotics, cryonics and human augmentation.
Imagine Beyond - The Body (above)
In the final scenes of The Empire Strikes Back, Luke Skywalker's hand – cut off by Darth Vader – is replaced in just 24 hours. Scientists across the world are now working on robotic limbs that can integrate with human bodies. Will we soon become superhuman?
Watch these videos to see how technology is making Star Wars-evoking strides into human augmentation, robotics and cryonics.
Unlocked: Is more tech inside making us better?
Should bionic augmentation aim to restore bodies, or add to them? Tilly Lockey, who has highly customized bionic arms, and Wojtek Paprota, with his implanted chip, discuss the possibilities and advantages of cyborgs and robotic upgrades.
Robotic Relationships: How we could fall in love with machines
Robotic relationships may be a turning point in the age of the machine. Can humans and AI connect on a deep emotional level?
Frozen in time: Is this how we will cheat death?
Eternal life might be possible sooner than we think. What will it mean for our bodies and society?
Ultra-fast gaming and the sports of tomorrow, with Break the Record's Fredrik Lidholt
Completing a game more quickly than opponents is the goal of the esport of speedrunning. It could be Super Mario, Doom or any other game. This week we'll see which elite players can break the speed record playing Minecraft.
Speed is the name of the game
The Break the Record Live Series is a live-streamed event where elite gamers compete to be the fastest ever player. Next week, they'll try to break the Minecraft speed-playing record. The brains behind Break the Record, Fredrik Lidholt (aka Edenal) chats about the future of esports with Marco Preuss and Rainer Bock in the latest episode of Unlocked.
Find out more about next week's Minecraft event here!