英语 英语 日语 日语 韩语 韩语 法语 法语 德语 德语 西班牙语 西班牙语 意大利语 意大利语 阿拉伯语 阿拉伯语 葡萄牙语 葡萄牙语 越南语 越南语 俄语 俄语 芬兰语 芬兰语 泰语 泰语 泰语 丹麦语 泰语 对外汉语

VOA科学技术2024--What to Do If Your Personal Data Has Been Exposed

时间:2024-08-06 09:00来源:互联网 提供网友:nan   字体: [ ]
    (单词翻译:双击或拖选)

As more of our lives move online, the risk of our personal data being stolen or misused1 is increasing.

Personal data includes email addresses, phone numbers, birthdates, and even passwords. And large data breaches3 are happening more often.

In breaches, online criminals can use stolen data to target people with leading messages to get important information. Or they can take out loans and credit cards in their name.

Here are some ways to protect yourself:

Pay attention

Oren Arar is vice4 president of buyer privacy at online security company Malwarebytes. He said in the United States, there is no federal law enforcing companies or organizations to inform individuals of a data breach2.

But he said it is common practice for them to do so and they often provide identity protection services.

The situation is better in the European Union. It requires companies and organizations to tell individuals of some kinds of breaches.

Even after a breach has been made public, cyber security experts say people need to pay attention.

Look out for emails or phone calls that say they are from the hacked6 organization or someone offering help. Contact the organization to see if they can confirm it.

Use official links, do not use any links or contact details in any messages you have been sent.

The Federal Trade Commission's website, identitytheft.gov, can tell you of identity theft victims. And it provides step-by-step advice with how to deal with different situations.

Change your password

If your data has been breached7, the first thing you should do is change your password for the account involved.

Use a strong, long password including letters, numbers and symbols. And make sure to add a second level of security. That may include having an email or text sent to you. It could also mean using a device called a USB authenticator8.

And if you have been using the same, or similar, password for different online accounts, make changes to it for each site. Hackers9 may take your password from one service and try it on your other accounts.

Arar said, "Just because your info shows up in a breach doesn't mean someone's stolen your identity or money. But it does mean you're at risk." He said it is wise to monitor your accounts, change any leaked passwords, set up a second security system, and have a separate email address for less important sign-ups.

Keep monitoring

It can be hard to follow all the different data breaches. But there are online services that you can look at to see if your email has been involved in a data breach.

Darren Guccione is CEO of Keeper Security. It makes password protection programming and offers a tool called BreachWatch. It keeps watch on the dark web to see if your personal information shows up there.

He said, "When public data breaches occur, cybercriminals gather as much data as possible so they can sell it on the dark web."

Tell your bank and credit agencies

If your credit card payment numbers are stolen, inform your bank or credit card company. Explain that your card is at risk of fraud and ask them to warn you of any suspicious activity.

They will likely give you a new card. Additionally, some banks and credit cards permit you to lock your account online.

You can also inform credit agencies. The three main companies are Equifax, Experian and TransUnion. They can freeze your credit. That makes it hard to see your credit report and open a new account. Or they will ask lenders to contact you before lending money.

Take extra care

Online security experts warn that breaches involving a telephone company leave buyers at risk of having their phone numbers stolen. Thieves can use a stolen number to enter accounts that use that phone number as a second security.

To reduce that risk, telephone company AT&T advises creating a password that is needed to make large account changes. Also, delete emails containing personal information from your email account. That will help block possible damage by someone who gains entry to your email account.

Words in This Story

breach - n. an occurrence in which someone is able to get into a place that is guarded or is able to get secret information.

hack5 - v. to secretly get access to the files on a computer or network in order to get information or cause damage

expose - v. to reveal

symbol - n. a letter, group of letters, character, or picture that is used instead of a word or group of words

monitor - v. to watch, observe, listen to, or check (something) for a special purpose over a period of time

occur - v. to happen

fraud - n. the crime of using dishonest methods to take something valuable from another person


点击收听单词发音收听单词发音  

1 misused 8eaf65262a752e371adfb992201c1caf     
v.使用…不当( misuse的过去式和过去分词 );把…派作不正当的用途;虐待;滥用
参考例句:
  • He misused his dog shamefully. 他可耻地虐待自己的狗。 来自《简明英汉词典》
  • He had grossly misused his power. 他严重滥用职权。 来自《简明英汉词典》
2 breach 2sgzw     
n.违反,不履行;破裂;vt.冲破,攻破
参考例句:
  • We won't have any breach of discipline.我们不允许任何破坏纪律的现象。
  • He was sued for breach of contract.他因不履行合同而被起诉。
3 breaches f7e9a03d0b1fa3eeb94ac8e8ffbb509a     
破坏( breach的名词复数 ); 破裂; 缺口; 违背
参考例句:
  • He imposed heavy penalties for breaches of oath or pledges. 他对违反誓言和保证的行为给予严厉的惩罚。
  • This renders all breaches of morality before marriage very uncommon. 这样一来,婚前败坏道德的事就少见了。
4 vice NU0zQ     
n.坏事;恶习;[pl.]台钳,老虎钳;adj.副的
参考例句:
  • He guarded himself against vice.他避免染上坏习惯。
  • They are sunk in the depth of vice.他们堕入了罪恶的深渊。
5 hack BQJz2     
n.劈,砍,出租马车;v.劈,砍,干咳
参考例句:
  • He made a hack at the log.他朝圆木上砍了一下。
  • Early settlers had to hack out a clearing in the forest where they could grow crops.早期移民不得不在森林里劈出空地种庄稼。
6 hacked FrgzgZ     
生气
参考例句:
  • I hacked the dead branches off. 我把枯树枝砍掉了。
  • I'm really hacked off. 我真是很恼火。
7 breached e3498bf16767cf8f9f8dc58f7275a5a5     
攻破( breach的现在分词 ); 破坏,违反
参考例句:
  • These commitments have already been breached. 这些承诺已遭背弃。
  • Our tanks have breached the enemy defences. 我方坦克车突破了敌人的防线。
8 authenticator 725d91977f189d4930c6344b016d55de     
认证器
参考例句:
  • The authenticator contains your name and your workstation's address.验证器包含了你的名字和你工作站的地址。
9 hackers dc5d6e5c0ffd6d1cd249286ced098382     
n.计算机迷( hacker的名词复数 );私自存取或篡改电脑资料者,电脑“黑客”
参考例句:
  • They think of viruses that infect an organization from the outside.They envision hackers breaking into their information vaults. 他们考虑来自外部的感染公司的病毒,他们设想黑客侵入到信息宝库中。 来自《简明英汉词典》
  • Arranging a meeting with the hackers took weeks againoff-again email exchanges. 通过几星期电子邮件往来安排见面,他们最终同意了。 来自互联网
本文本内容来源于互联网抓取和网友提交,仅供参考,部分栏目没有内容,如果您有更合适的内容,欢迎点击提交分享给大家。
------分隔线----------------------------
TAG标签:   VOA英语  慢速英语  科学技术
顶一下
(0)
0%
踩一下
(0)
0%
最新评论 查看所有评论
发表评论 查看所有评论
请自觉遵守互联网相关的政策法规,严禁发布色情、暴力、反动的言论。
评价:
表情:
验证码:
听力搜索
推荐频道
论坛新贴