Connect with us

Technologies

5 Ways to Help Lock Down Your Data After PayPal’s Data Breach

PayPal is the latest company to investigate a digital breach. You can’t prevent these incidents, but here are ways to protect yourself online.

PayPal is the latest company to report a data breach, but it’s certainly not the only one. With cyber threat actors targeting big corporations, software companies and even apps on your phone, your personal data could be at risk. If your private information has been compromised, you often won’t learn about it until a company notifies you about a data breach. By that time your birthday, Social Security number, credit card number or health records will have already been exposed or stolen. (Here’s what to do if you think your Social Security number was stolen in the PayPal breach.)

Any stolen information that leads data thieves to your identity can let hackers do everything, from making purchases and opening up credit accounts in your name, to filing for your tax refunds and making medical claims posing as you. Billions of these hacked login credentials are available on the dark web, neatly packaged for hackers to easily download for free.

You can’t stop sites from getting hacked, but after a cyberattack, monitoring tools can alert you to which of your stolen credentials are out on the dark web, giving you a running start at limiting the damage the thieves can do. Here’s how to use two free monitoring tools — Google’s Password Checkup and Mozilla’s Firefox Monitor — to see which of your email addresses and passwords are compromised so you can take action.

Steps you can take before a data breach

First, use a password manager that creates unique passwords for each of your logins and make sure you are following password best practices. That way, if one site gets breached, your stolen password won’t give hackers access to your accounts on other sites. A good password manager can help you administer all your login information, making it easy to create and use unique passwords.

And once you find out a company or service with your credentials has been hacked, change that password, regardless if you are notified that your information was exposed in the data breach or not. You don’t want to wait days to act while the company works to uncover the extent of the hack.

How to use Google’s Password Checkup

As part of its password manager service,Google offers the free Password Checkup tool, which monitors usernames andpasswords you use to sign in to sites outside of Google’s domain andnotifies you if those login credentials have been exposed. (You mayremember Password Checkupwhen it was a Chrome extension you had to add separately to Google’sbrowser. This is the same tool folded into Google’s password manager.)

1. If you use Google’s password service to keep track of your login credentials in Chrome or Android, head to Google’s password manager site and tap Go to Check passwords.

2. Tap Check Passwords and verify it’s you.

3. Enter the password for your Google account.

4. After thinking for a bit, Google will display any issues it’s found, including compromised, reused and weak passwords.

5. Next to each reused or weak password is a Change password button you can tap to pick a more secure one.

How to use Mozilla’s Firefox Monitor

Mozilla’s free Firefox Monitor service helps you track which of your email addresses have been part of known data breaches.

1. To start, head to the Firefox Monitor page.

2. Enter an email address and tap Check for Breaches. If the email was part of a known breach since 2007, Monitor will show you which hack it was part of and what else may have been exposed.

3. Below a breach, tap More about this breach to see what was stolen and what steps Mozilla recommends, such as updating your password.

You can also sign up to have Monitor notify you if your email is involved in a future data breach. Monitor scans your email address against those found data breaches and alerts you if you were involved.

1. Near the bottom of the Firefox Monitor page, tap the Sign up for Alerts button.

2. If you need to, create a Firefox account.

3. Tap Sign in to see a breach summary for your email.

4. At the bottom of the page, you can add additional email addresses to monitor. Mozilla will then send you an email at each address you add with a subject line «Firefox Monitor found your info in these breaches» when it finds that email address involved in a breach, along with instructions about what to do about following the breach.

How else to watch for fraud

Besides using the tools from Mozilla and Google, you can take a few more steps to watch for fraud.

View your digital footprint. Bitdefender provides a dashboard with its Digital Identity Protection subscription that shows where your personal information has appeared online. It also pinpoints data breaches where your info has been leaked in the past, notifies you when your personal info appears in breaches going forward and provides recommended steps to secure your data. It also tells you whether your info is on the dark web and lets you know if someone appears to be impersonating you on social media.

Monitor your credit reports. To help you spot identity theft early, you can request one free credit report a year from each of the three major credit bureaus — Equifax, Experian and TransUnion — to check for unfamiliar activity, such as a new account you didn’t open. You should also check your credit card and bank statements for unexpected charges and payments. Unexpected charges can be a sign that someone has access to your account.

Sign up for a credit monitoring service. To take a more active hand in watching for fraud, sign up with a credit monitoring service that constantly monitors your credit report on major credit bureaus and alerts when it detects unusual activity. With a monitoring service, you can set fraud alerts that notify you if someone is trying to use your identity to create credit. A credit reporting service like LifeLock can cost $9 to $24 a month — or you could use a free service like the one from Credit Karma that will watch for credit fraud but not ID fraud, such as someone trying to use your Social Security number.

For more on how to keep your data secure, see our guides on how to protect your phone’s privacy, the best VPN services and why you should never trust a free VPN.

Technologies

Waymo Expands Its Robotaxi Fleet to Las Vegas, San Diego and Detroit. Everything to Know

Here’s everywhere the self-driving company operates now and where it’s heading soon.

Continue Reading

Technologies

Apple Plans to Use a Custom Model of Google’s Gemini AI to Power Siri, Report Says

Apple reportedly chose Google over Anthropic for financial reasons.

Apple is turning to Google to make a custom Gemini AI model to power the next version of its virtual assistant Siri for spring 2026, according to a report from Bloomberg’s Mark Gurman on Sunday. 

According to the report, Apple was evaluating whether to use Google or AI competitor Anthropic for the next version of Siri. Gurman says Google offered a better financial deal. In an earlier Bloomberg report, he says Anthropic would have cost Apple $1.5 billion per year. The report doesn’t reveal Apple’s own financial offer.


Don’t miss any of our unbiased tech content and lab-based reviews. Add CNET as a preferred Google source.


This custom Gemini model will run on Apple’s private cloud compute servers. Apple’s own models will continue to run on devices for personal data, while Gemini would operate on servers for more complex tasks. Gurman also says that Apple won’t highlight Google’s involvement in the company’s marketing. 

Representatives for Google, Apple and Anthropic did not immediately respond to requests for comment.

With major tech companies pivoting toward AI, Apple has largely been left behind. The tech company was slow to adopt AI and hasn’t developed AI models that are competitive. It instead turned to companies like OpenAI, the creator of ChatGPT, to help add generative capabilities on top of existing Apple systems. 

Even then, the promise of a truly agentic Apple Intelligence has failed to materialize, although it has improved. Apple CEO Tim Cook also hasn’t ruled out the possibility of acquiring an AI company.

(Disclosure: Ziff Davis, CNET’s parent company, in April filed a lawsuit against OpenAI, alleging it infringed Ziff Davis copyrights in training and operating its AI systems.)

Apple also has a close relationship with Google. The search giant pays Apple $20 billion annually to remain the default search engine on Apple devices. It’s a relationship that nets Apple money and prevents it from building a competitor to Google Search, a claim Apple denies. This arrangement was an important factor in the Department of Justice’s case against Google, where a judge ruled that the company was operating an illegal monopoly. 

Despite falling behind on AI, Apple is doing well financially. Last month, it surpassed a $4 trillion market cap

Continue Reading

Technologies

Today’s NYT Connections Hints, Answers and Help for Nov. 4, #877

Here are some hints and the answers for the NYT Connections puzzle for Nov. 4, #877.

Looking for the most recent Connections answers? Click here for today’s Connections hints, as well as our daily answers and hints for The New York Times Mini Crossword, Wordle, Connections: Sports Edition and Strands puzzles.


Today’s NYT Connections puzzle has a diverse mix of topics. They’re not too tough, but let’s hope you recognize your computer-related phrases. If you need help, you’re in the right place. Read on for clues and today’s Connections answers.

The Times now has a Connections Bot, like the one for Wordle. Go there after you play to receive a numeric score and to have the program analyze your answers. Players who are registered with the Times Games section can now nerd out by following their progress, including the number of puzzles completed, win rate, number of times they nabbed a perfect score and their win streak.

Read more: Hints, Tips and Strategies to Help You Win at NYT Connections Every Time

Hints for today’s Connections groups

Here are four hints for the groupings in today’s Connections puzzle, ranked from the easiest yellow group to the tough (and sometimes bizarre) purple group.

Yellow group hint: Point in the right direction.

Green group hint: Like a veneer, or veil.

Blue group hint: Like JPG.

Purple group hint: Musical instrument.

Answers for today’s Connections groups

Yellow group: Steer.

Green group: Thin layer.

Blue group: File extensions.

Purple group: ____ guitar.

Read more: Wordle Cheat Sheet: Here Are the Most Popular Letters Used in English Words

What are today’s Connections answers?

The yellow words in today’s Connections

The theme is steer. The four answers are direct, drive, guide and pilot.

The green words in today’s Connections

The theme is thin layer. The four answers are coat, film, leaf and sheet.

The blue words in today’s Connections

The theme is file extensions. The four answers are doc, mid, tiff and zip.

The purple words in today’s Connections

The theme is ____ guitar. The four answers are air, electric, rhythm and slide.

Continue Reading

Trending

Copyright © Verum World Media