Dark Web: A Marketplace for Your Personal Information

What do you need to know about the Dark Web?

Newsletter Topics: World Elder Abuse Awareness Day, The Dark Web & Personal Information

πŸ—žοΈ In the News: June 15 is recognized as World Elder Abuse Awareness Day (WEAAD). This day is designated to raise awareness of elder abuse and to promote the dignity and respect of older adults. At Grandpa Got Hacked, we call upon all grandkids to check on their family members to commemorate WEAAD.

πŸ‘€ Today’s Focus: Dark Web - What do you need to know?

The dark web is a part of the internet that is not searchable by traditional browsers like Google, Chrome, and others. Instead, it requires special software. The dark web exists because it allows for:

  • Anonymity - It’s hard to trace.

  • Freedom of Speech - In some countries, accessing certain information or expressing certain opinions can be dangerous. The dark web can provide a platform for these activities.

  • Illegal Activities - Because of its anonymity, the dark web is also used for illegal purposes.

🚨 Although you are unlikely to find yourself navigating the Dark Web, we want to raise awareness of its existence. The Dark Web is a hub for illegal activities and a scammer's playground. When your personal information is stolen through phishing (What is Phishing!) or other methods, it is not just one scammer exploiting your information. Instead, your stolen information is sold on the Dark Web to numerous scammers, spreading quickly like a virus.

😎 Grandkid Tip of the Day:  How can you protect your personal information?

Protecting your personal information involves a combination of good habits, utilizing security tools, and staying informed about threats. Below are a few good habits and strategies, which we will explore further in our upcoming newsletters.

  1. Use Strong, Unique Passwords

  2. Enable Two-Factor Authentication (2FA)

  3. Keep Software Up to Date

  4. Be Wary of Phishing Attempts

  5. Use Secure Connections β†’ Avoid Public Wi-Fi for Sensitive Transactions

  6. Monitor Your Accounts Regularly β†’ Regularly review your financial statements and credit reports for unauthorized activity.

  7. Limit Personal Information Shared Online β†’ Avoid oversharing personal information that could be used to guess passwords or security questions.

  8. Secure Your Mobile Devices β†’ Use Lock Screens and Encryption

πŸ˜‰ If you use an Apple device and take advantage of Apple's Password/Keychain features, Apple can monitor your passwords and alert you if they appear in known data leaks. This allows you to know which passwords need to be changed immediately. Most often, the information stolen in these data leaks ends up on the Dark Web, and immediate action is recommended.

  • Go to Settings  > (1) Passwords > (2) Security Recommendations, then turn (3) Detect Compromised Passwords On.

  • Under (4) High Priority Recommendations, you will find any passwords that are flagged for immediate action.

⭐ Share a story by replying to this email! - If you or someone you know has been hacked or compromised, share your story! We are always looking to raise awareness within our community!

πŸš€ Sponsor a Newsletter! Do you want to sponsor a newsletter? Reply to this email to contact us.

Got this email forwarded? Subscribe below.