In an earlier article , you learned the seven top privacy benefits when you use MySudo virtual cards: You stay private online. MySudo virtual cards are not linked to your name, age, address, phone number, SSN, or any other identifying information, so your private data stays private. Your spending habits can’t be tracked. The charges you make with your […]
When you watch a magician perform, you probably wonder how they manage to pull off the tricks or illusions before your very eyes. This wonder adds to the entertainment value, and comes partly from a technique called misdirection. Misdirection is a planned set of actions and language used to focus your attention away from what makes an […]
There’s a tempting login option online called ‘social login’ which allows you to access a third party website using your existing social account IDs. You’ve seen the buttons: ‘Log in with Google’ or ‘Continue with Facebook’ (or Twitter, Instagram, or LinkedIn). It’s tempting to hit those buttons to save the bother of creating yet another account—and remembering or storing yet another username and password—but when you do, you’re really trading your personal information for […]
Here’s a clever way to think about how Sudo digital identities work in your life: each Sudo identity is like a different hat. We all wear many hats in life. We might wear the employer or employee hat, the business owner hat, the family hat, the friend hat, the soccer mom or dad hat, the college student […]
Picture a large and intricate spider’s web: hundreds of sticky threads, tightly and strategically woven into cross-hatched lines, poised to ensnare unsuspecting prey. Now picture the Internet: billions of tightly and intricately woven connections from the 4.57 billion humans and 25 billion‘things’ now online (which will roughly double in the next 10 years), poised to ensnare unsuspecting prey. […]
When an application, like a dating site, requests personal information from its users, it is in a good position to obtain (or supply to a data broker) a broad spectrum of personally identifiable information (PII) about a user. This PII can divulge highly sensitive information about a user, such as home location, medical details, personal finances, employment […]
Think about this: given the extent of the global data privacy crisis, your personal phone number and email address are probably already compromised beyond repair. It’s an interesting thought, isn’t it? To get the idea, you’ve only got to look at how you use your personal information online, and what happens to your data once […]
Imagine for a moment, you were caught up in one of the 7,098 data breaches reported in 2019 (the highest number on record) or one of the breaches yet to be discovered. Let’s say it’s a shopping site. Perhaps you don’t have to imagine. Perhaps you lived it. If you’re like most of the 4.5 billion internet users, you’ll have […]
When you create a MySudo virtual card, we will ask you for a funding source for that card. Right now, we accept credit and debit cards as a funding source (we are planning additional funding source options to release to you soon). So, you might ask: Why does a digital privacy company want me to enter […]
Whale phishing is a targeted attack on a high-value target or executive to gain sensitive information. Protection against a whale attack includes the combined efforts of IT departments, the C-suite, and individual discrepancy.
Phone phishing is how scammers try to obtain personal or financial information via call or text. Vishing attacks might utilize a number of tactics, including phone number spoofing. Protect yourself and others by reporting spoofed numbers.
“Spear phishing” is a type of phishing that involves gathering information about a person or company in order to carry out a personalized attack with a better chance at success.
Whether it’s a social media account or bank account, it seems that almost everyone gets hacked at some point or another. This article will explain the basics of an increasingly common issue: hacking. It will define the term in the appropriate context, explain how unauthorized users gain access to others’ devices and accounts, and go over some of the most common signs that your resources are likely to have been compromised. It will conclude with a discussion of important things readers should do if they suspect or know that their account was hacked.
The Google Doc phishing scam reached nearly one million people by mimicking the popular Google Docs app. Phishing scams rely on the trust of the user to gain information.
Spam emails and texts are an ever-evolving annoyance. Filters and other methods of blocking spam are constantly being developed, but the spammers simply improve their own methods in response.
Sometimes referred to as identity fraud, identity theft occurs when someone uses your personal information — such as your Social Security Number or driver’s license