![]() ![]() This is why it's always important to take a breath, step back from the screen and think about what is being said with your logical brain engaged. Your panic is a knee-jerk reaction and one that the scammer hopes will convince you they are in control, and while you are not, will pay the money they are asking for. Breach databases are traded on the dark web and in cybercrime forums, and the sextortion scammers make use of these. ![]() ![]() Whatever, if you recognize the password but can't remember where you used it, then check the excellent and free Have I Been Pwned database to see where passwords associated with your email address have been compromised and exposed. This is sadly all too common a practice and one that needs to change: now would be a good time, it has to be said. If this is the case, the chances are equally high that you'll already have been notified of that breach and advised to change the password anywhere else you use it as well. How so? Well, the first thing to consider is which password do they have? If you only use a small number of passwords repeatedly for different sites and services, the chances are that the password has been found amongst those stolen during a data breach at one of the services involved. It's a little more convoluted than that, though, and this doesn't mean they also have control of your computer, webcam or email. The simple answer is yes, patently they do because it's displayed right there in the Day of Hack email subject line. Editor Does this hacker really know my password? ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |