Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

July 2024

How to Securely Share Your WiFi Password With Airbnb Guests

You can securely share your WiFi password with Airbnb guests by using a password manager. A password manager is an online solution that lets you create, store, protect and share login information for apps and online accounts. Password managers keep your information safe by storing it in an encrypted, digital vault. As an Airbnb host, you should use a password manager like Keeper because you can securely share your WiFi password for a limited time with each of your Airbnb guests.

How I Use a Password Manager as a College Student

Since starting my internship at Keeper Security, I’ve had the opportunity to enter into the world of cybersecurity, particularly surrounding the role of password management. This eye-opening experience has not only educated me on the dangers of an unprotected online presence, but it’s also encouraged me to follow cybersecurity best practices in my personal and academic life.

How To Know if Your Information Is on the Dark Web

You can find out if your information is on the dark web by using a dark web scan tool, signing up for a dark web monitoring service or checking for the latest data breaches. The dark web is a layer of the internet that allows people to remain anonymous, often used by cybercriminals to find and sell stolen personal information. A dark web scan informs you if your personal information has surfaced on the dark web, which could put your accounts at risk of being compromised.

Strengthening Cyber Resilience in the Defense Industrial Base

The Defense Industrial Base (DIB) consists of over 100,000 companies that provide materials or services to the United States Department of Defense (DoD). These companies provide products needed to defend the nation and are a critical part of the DoD supply chain. DIB companies range in size from large, well-known defense contractors, like Lockheed Martin, Boeing and Northrop Grumman, to small and medium-sized enterprises that provide specialized products and services, such as drones and military vehicles.

Can My Credit Be Frozen Without My Knowledge?

It is possible for your credit to be frozen without your knowledge. A credit freeze stops creditors from accessing your credit report, which can prevent them from approving new loans in your name. Credit freezes do not expire, so to remove them, you must contact each of the three major credit bureaus: Experian, TransUnion and Equifax. Most people place credit freezes if they suspect their personal information or identity was stolen since credit freezes help protect from fraud.

Is It Safe to Password-Protect a PDF File?

No, it’s not safe to password-protect PDF files because your files are not guaranteed to be protected from cybercriminals intercepting and gaining unauthorized access to your information. Often, people password-protect a PDF file to protect sensitive information and set permissions on how the PDF file can be used. If you password-protect a PDF file, you can choose whether you want a recipient of the file to view or edit the file.

My Apple ID Was Hacked. What Should I Do?

If your Apple ID was hacked, some immediate steps you can take include resetting your password and setting up Two-Factor Authentication (2FA). You should also consider placing a fraud alert on your credit report. A fraud alert is helpful because it requires lenders and creditors to go through additional steps to ensure your identity in case whoever hacked your Apple ID was planning on opening credit in your name.

How To Check Your iPhone for Viruses

You can check your iPhone for viruses by checking for unfamiliar apps, seeing if your data usage has spiked, seeing an unusual number of pop-up ads and noticing if specific apps are draining your battery. A virus is a type of malicious software that can infect any device, like your iPhone, and then replicate itself on your device’s programs or files.

Password Hygiene Tips and Best Practices

Password hygiene tips to follow include using unique passwords, enabling Multi-Factor Authentication (MFA) and keeping your passwords safe in a password manager. Password hygiene encapsulates the best practices for protecting your passwords and online accounts. When you practice good password hygiene, your strong passwords will prevent you from becoming a victim of cyber attacks, virus and malware infections, password breaches and more.

Password Management for Healthcare Professionals

Password management in the healthcare industry is essential for maintaining the privacy of patient and employee information. HealthITSecurity reports that in just the first three months of 2024, there were over 115 data breaches in the healthcare industry. One of the most recent and largest data breaches in healthcare impacted over 2.3 million patients of Medical Management Resource Group at the end of 2023.

Keeper Wins Connect Password Manager Test

Keeper Security has once again proven its excellence by winning a group test of leading password managers conducted by Connect in Germany. The comprehensive evaluation, which included nine password managers, saw Keeper emerge as the clear “test winner” for its outstanding security, features and usability. This latest German accolade follows closely behind Keeper’s win in the CHIP Magazine’s Password Manager Test for a second consecutive year.

UPS Text Scam Examples

Some examples of UPS text scams include confirming details about a fake delivery, fake package delivery notifications, fake package delivery fee requests, fraudulent suspicious activity on your UPS account or an error with a delivery. According to the Federal Trade Commission (FTC), in 2023, over $650 million was lost to imposter scams, including UPS text scams. Keep reading to find out what different UPS text scams look like and how you can stay protected against this kind of scam.

Were Your Passwords Leaked in RockYou2024? Here's What To Do.

If your passwords were exposed in the RockYou2024 leak, you should immediately change them, set up Multi-Factor Authorization on your account and monitor your account for suspicious activity. RockYou2024 is now the largest password leak to date, with almost 10 billion passwords revealed on a popular hacking forum. Due to the magnitude of this leak, many people around the world are concerned for their online safety.

Should I Use ChatGPT to Create Passwords?

No, you should not use ChatGPT to create passwords because it will likely produce the same password for multiple users and what you input will live on in its database. For those of you who are unfamiliar with what ChatGPT is and does, it is an Artificial Intelligence (AI) program used to follow instructions through prompts and provide a user with answers to both simple and complex questions.

Best Practices When Using a Password Manager

When you invest in a password manager, you should follow some best practices when setting it up to ensure your information stays secure. Some of the best practices when using a password manager include creating a strong master password, enabling MFA, changing weak passwords, auditing your passwords and setting a short inactivity logout timer. Continue reading to learn more about the best practices when you use a password manager like Keeper.

What To Do if You Receive an OTP Code You Didn't Request

Receiving a One-Time Password (OTP) code that you didn’t request over text or email could be a sign that someone is trying to log in to one of your online accounts to gain access to your private information. An OTP code is a numeric code used as an additional form of verification to authenticate users before they can log in to their accounts. As the name suggests, this code can only be used once.

What To Know About the CDK Global Ransomware Attack

The CDK Global ransomware attack was first reported in June 2024. Ransomware infected CDK Global, a software vendor that serves thousands of North American car dealerships. This ransomware attack affected over 10,000 U.S. car dealerships, their employees and their customers.

How to Spot and Avoid Grandparent Scams

Grandparent scams happen when a cybercriminal impersonates a victim’s family member, such as a grandchild, to convince them that there is an emergency. Despite the name of this scam, the victim doesn’t always have to be a grandparent or grandchild. The primary goal of these scams is to extort money from a victim by pretending that their loved one is in danger.

Signs of Malware Infection and How To Remove It

Malware is malicious software that can infect your device in many ways, like when you download a free game or movie. Some signs that your device is infected with malware include random pop-ups, freezing or slowing down, suddenly limited storage space and apps you don’t remember installing. Continue reading to learn the 10 most common signs that your device has a malware infection, how to remove malware from your device and how to protect your devices from becoming infected.

What Can Hackers Do With Your Phone Number?

You might think that a threat actor only having your phone number isn’t dangerous, but it can be, which is why it’s important to learn what hackers can do with it. With just your phone number, hackers can send you phishing texts and calls, flood your phone with spam calls, spoof your phone number, swap your SIM card and even steal your personal information. Continue reading to learn more about what hackers can do with your phone number and tips for keeping yourself safe.

How To Know If You've Received a Fake USPS Tracking Number

You can tell if you’ve received a fake USPS tracking number if the number doesn’t match the one in your confirmation email or on the USPS website. Continue reading to learn more about telling signs that the USPS tracking number you have received is part of a scam and how to prevent yourself from becoming a victim of fake USPS tracking number scams.

Is Airport WiFi Safe?

No, using public WiFi in airports is not safe because you could unknowingly be sharing your private data with a cybercriminal. Because public networks are unsecured and airports are filled with people on the go, cybercriminals frequently target them to steal sensitive information and gain access to victims’ online accounts. Continue reading to learn what is so dangerous about using airport WiFi and how to stay safe if you do need to use it while traveling.

How To Protect Yourself from Tech-Support Scams

You can stay protected against tech-support scams by learning to spot them and following tips to avoid them, such as never answering unsolicited calls from unknown numbers, never giving someone remote access to your computer and not clicking on malicious advertisements. Continue reading to learn more about how you can protect yourself against tech-support scams and what to do if you’ve fallen for this type of scam.

What Is a Password Manager?

A password manager is a solution that helps users securely store, manage and share their login credentials. Some password managers also aid in securely storing additional data such as passkeys, documents, files and images. You may be familiar with browser-based password managers, which are the ones built into your browser. Or if you’re an iPhone user, you may be more familiar with the password manager built into your phone called iCloud Keychain.

Pretexting Scam Examples

Pretexting is a type of social engineering attack in which the scammer manipulates their target into sharing private information or sending money by making up a story. Pretexting can occur on the phone, via text message, through email or in person. The goal of pretexting scams is typically to infect your device with malware, steal your money, breach private data and more.

Keeper 101 | Enterprise: How to Use Keeper Commander CLI

Keeper Commander allows you to perform administrative and vault functions from a command line environment on Mac, Windows and Linux. You can start Commander by typing “keeper shell” in a terminal window. Enter your username, password, and complete any 2FA requirements when prompted. If you are logging in for the first time on a new device, you may be prompted for device approval for additional security. More information about login methods, such as SSO, can be found in our documentation.

Scams To Look out for During Amazon Prime Day

In 2023, Amazon Prime Day totaled $12.9 billion in sales in only 48 hours. With limited-time deals, many Amazon users get ready to shop during Prime Day and scammers use this to their advantage. As you get ready to shop, it’s important to be aware of the scams that take place before, during and after this event. Some common scams to look out for during Amazon Prime Day include phishing scams, spoofed Amazon websites and deals from other websites that seem too good to be true.

The Importance of Strong Passwords in 2024

Strong passwords are more important than ever in 2024 because they are the first line of defense against cyber attacks. While some companies have started to introduce passkeys to strengthen and expedite the login process, strong passwords are still needed when creating most accounts. A passkey replaces a username and password and has built-in Multi-Factor Authentication (MFA) by design. Strong passwords have been the foundation of any account, and in 2024, they will remain important.

What To Do if Your Password Appears in a Data Leak

If your password has appeared in a data leak, there are several things you should do, starting with changing your password. You may be wondering, “How would I even know if my password was in a data leak?” If you have an iPhone and save your passwords on your iCloud Keychain, you might have seen this message before: This password has appeared in a data leak, which puts this account at high risk of compromise. You should change your password immediately.

Common WhatsApp Scams and How To Avoid Them in 2024

WhatsApp is a messaging app that enables users to message and voice call other WhatsApp users. Many people from all over the world use WhatsApp to communicate. This has made it a common platform for scammers to target people. Some of the most common scams on WhatsApp include an invitation to “WhatsApp Gold,” impersonation scams, WhatsApp tech support scams, as well as charity and romance scams.

How To Protect Your Data if Your Phone Is Lost or Stolen

If your phone is ever lost or stolen, your data could be at risk of being compromised. One of the main ways your stored data could be in danger is if you have a weak passcode, such as 0000 or 1234. If the person who found or stole your phone could guess your passcode, your data would become compromised. Read below to learn more about how to protect your phone when it’s lost or stolen and how to keep your phone’s data safe.

If I Click a Link, Will I Get Hacked?

If you click on a malicious link, also known as a phishing link, there is a possibility that you’ll get hacked. This is because clicking on a phishing link could immediately cause malware to download on your device. Alternatively, clicking on a link can direct you to a dangerous phishing website where you’re prompted to enter your personal information. Continue reading to learn more about how clicking a link can lead to getting hacked and how to avoid clicking on these malicious links.

How To Set up Passkeys on Amazon and Why You Should

Passkeys are a type of passwordless authentication method that enables you to log in to your accounts without having to enter a password. Instead, you authenticate the same way you sign in to your device such as using a passcode, your biometrics or a swipe pattern. Many websites and apps have started to support the use of passkeys including Amazon. Here’s how you can set up a passkey to seamlessly sign in to your Amazon account.

Were You Part of the 2024 AT&T Breach? Don't Panic. Here's What to Do.

If you were one of the 70+ million people affected by the 2024 AT&T data breach, you are likely concerned about the safety of your accounts and the risk of your identity being stolen. Although some of the data is from 2019 or earlier, according to AT&T, the 2024 data breach occurred this past March when stolen customer data was found on the dark web. If you were part of this data breach, your identity could be at risk of being stolen because customers’ Social Security numbers were exposed.

Can My iPhone Get a Virus?

Yes, your iPhone can get viruses. However, it is uncommon for iPhones to get viruses due to the nature of Apple’s iPhone Operating System (iOS). Because iPhone users are only able to download apps from the App Store, this makes it much harder for hackers to infect their devices. Having a jailbroken iPhone would make you more susceptible to getting infected with viruses because you could download unauthorized apps outside of the App Store.

Google Authenticator vs Keeper

An authenticator app is a method of Multi-Factor Authentication (MFA) that adds an extra layer of security to your online accounts. Keeper can be used in place of Google Authenticator as it stores, generates and automatically fills your authentication code along with your login credentials. Continue reading to learn about the downsides of Google Authenticator and why Keeper Password Manager is the better choice.

Should You Change Your Password Every 90 Days?

No, you don’t have to change your password every 90 days. This idea of regularly changing your password is known as password rotation. The main benefit of changing your passwords so often is to prevent unauthorized users from accessing private information. For personal accounts, changing your passwords every 90 days can actually end up being worse than keeping them the same.

Types of Social Engineering Attacks

Some examples of social engineering attacks include phishing, pretexting, scareware, baiting, vishing, smishing and CEO fraud. If you are unsure what qualifies as social engineering, imagine how many ways someone can manipulate you to reveal private information. Threat actors use these psychological techniques, both in person and online, to gain access to your personal or organizational information. These bad actors can install malware on your device, steal your information and even take your identity.

Is It Safe To Accept Cash App Payments From Strangers?

Although using Cash App is a convenient way to receive money from people you already know, Cash App is not safe when receiving money from strangers. Whenever you use a payment app like Cash App, it’s always better to receive money from people you trust to avoid being scammed by a stranger. Other payment apps besides Cash App include PayPal, Venmo, Zelle, Apple Pay and Chime, among others.