Donald Trump Allegedly Hacked: Cellphone & Social Security Number Compromised


In a YouTube video released Thursday, hacking group Anonymous claims to have compromised Donald Trump.

Just two weeks after Anonymous promised a war against the leading Republican presidential candidate, the group released documents that allegedly include Trump’s Social Security number, cellphone number, birth date, children’s names and other pieces of personal information.

The group said in the video it opposes Trump due to his “agenda of fascism and xenophobia.”

Trump’s campaign released a statement on the hack, saying “The government and law enforcement authorities are seeking the arrest of the people responsible for attempting to illegally hack Mr. Trump’s accounts and telephone information.”

Getting hacked is no new trend for politicians. In 2013, the credit reports of First Lady Michelle Obama and FBI Director Robert Mueller were allegedly posted online. And with the amount of information readily available for political candidates online — you can find Trump’s birth date, children’s names and full legal name easily on his Wikipedia page, for example — it’s not even that surprising that a high-profile individual could be hacked.

But there are a few things the little guys can do to make sure you don’t get “Trumped.” Adam Levin, identity theft expert and co-founder of, recommends the three Ms technique to identity theft protection. Those three Ms are:

You may not be lucky enough to have the resources like Trump has to be able to fix any identity theft damage, so it’s important to do what you can to make yourself a harder target.

More on Identity Theft:

Image: andykatz

The post Donald Trump Allegedly Hacked: Cellphone & Social Security Number Compromised appeared first on

For Mac Users, The Security Bubble Has Burst

Apple’s Mac operating systems are known for their resistance to malware, viruses, hackers and ransomware, which is one reason many people opt for Mac computers.

Still, they’re not invincible, and as a security company recently reported, Mac users should be aware of potential threats. Researchers at Palo Alto Networks reported finding “the first fully functional ransomware seen on the OS X platform,” according to a March 6 post on their site.

What Is Ransomware?

Ransomware is what it sounds like: Cyber criminals infiltrate your computer and hold it (or more specifically, its data) hostage. They demand you pay them if you ever want your files back. They often want payment in digital currency like Bitcoin, because these transactions are difficult to trace — and it’s a hassle for the victim to acquire and transfer.

Apple did not immediately respond to request for comment on the reported attack. However, Palo Alto said in its blog post that, after it reported the occurrence to Apple, the Mac maker shut down the infiltration and updated its anti-virus system.

How to Protect Yourself

Ransomware attacks can be particularly stressful for consumers if the stolen data includes personal information, work data or irreplaceable files (think photos). Not only is this a case to back up your hard drive, it’s also a reminder that you may want to install anti-virus software or malware protection on your computer, no matter how secure you think it is.

Guarding your personal information is no joke. Losing your sensitive information to a criminal puts you at risk for identity theft. It can take a lot of time and money to recover from identity theft, not to mention the credit damage you might suffer. On top of that, if someone gets access to your Social Security number, the risk of fraud never goes away, because the Social Security Administration rarely changes numbers.

Protecting your devices goes hand-in-hand with habits like reviewing your financial accounts for unauthorized activity and monitoring your credit for signs of fraud. (You can see a free summary of your credit report, updated each month, on

Taking steps to prevent cyberattacks is important, but so is having a plan for how to deal with one if it happens. Ideally, such planning will make the incident less stressful and less costly. You can report cyber crime to the Federal Bureau of Investigation and go here to learn what to do if you are a victim of identity theft.

More on Identity Theft:

Image: jrwasserman

The post For Mac Users, The Security Bubble Has Burst appeared first on

A Chinese Company Just Hacked an iPhone Using Play-Doh


If you’re protecting your smartphone with your fingerprint, beware strangers bearing Play-Doh.

A Chinese startup demonstrated at the Mobile World Congress this week how a mold made from the popular children’s toy could be used to unlock an iPhone, CNBC reports.

You can see a truncated version of the purported hack in a video posted to Twitter by tech reporter Arjun Kharpal: Jason Chaikin, president of mobile security firm Vkansee, holds a piece of the molding clay bearing a fingerprint up to Apple’s Touch ID fingerprint sensor and, within a few seconds gains, access to the device.

The Play-Doh print in use, it should be noted, came from the cast of a finger made in dental paste, according to other outlets covering the hack. In order words, it could be fairly labor intensive for criminals to replicate in the real world. Still, the demonstration serves as a reminder to keep an eye on your payment or personal information, no matter what security features you are using to protect your accounts or devices.

Apple did not immediately respond to’s request for comment on the demonstration. It did point Kharpal to its security policy, which states “every fingerprint is unique, so it is rare that even a small section of two separate fingerprints are alike enough to register as a match for Touch ID. The probability of this happening is 1-in-50,000 for one enrolled finger. This is much better than the 1-in-10,000 odds of guessing a typical 4-digit passcode.”

Protecting Your Personal Information

According to CNBC, Chaikin was demonstrating the hack to illustrate a lack of sophistication in current biometric solutions — which authenticate identities via physical or biological information, like a fingerprint, retinal scan or even heartbeat. His company, incidentally, is marketing its own fingerprint sensor, but this isn’t the first time current biometric authenticators has been called into question. Reports have surfaced of Apple’s Touch ID being hacked before and other popular smartphones have weathered similar allegations.

Regardless of these hacks, biometric authenticators are generally considered more secure than traditional alphanumeric passwords, though, on the flip side, there’s also been some debate around what hackers could do, should they get a hold of such sensitive information. That’s why consumers should, at the very least, read all the terms and conditions associated with the biometrics they use to learn, among other things, what is being scanned, where it is being stored and what security features are in place to lock down the information should your device be stolen or otherwise compromised.

And whether using password or fingerprint protection, you should regularly monitor financial accounts for credit card or debit card fraud and check your credit for signs of deeper identity theft. (You can pull your free annual credit reports at and see your credit scores for free each month on Signs of your identity has been stolen include a sudden drop in credit score, mysterious accounts or high balances you weren’t aware of.

More on Credit Cards:

Image: Hemera Technologies

The post A Chinese Company Just Hacked an iPhone Using Play-Doh appeared first on

6 Things in Your Home That Could Get You Hacked


Image: David Sack

The post 6 Things in Your Home That Could Get You Hacked appeared first on