Xtreme I.C.E. logo with a padlock and binary code, above the text: We Are A Top IT Firm In Atlanta. Providing the best in IT solutions to Metro Atlanta and the entire U.S.
the TransUnion logo on a card, set against a background of red digital numbers. Text at the top reads, "Consumer credit reporting giant TransUnion hacked." Text at the bottom reads, "Millions at risk for identity theft."

The TransUnion breach exposed the personal information of over 4.4 million people, including names and Social Security numbers, due to a hack into a third-party customer support application.

This puts everyday consumers at serious risk of identity theft and financial fraud, as criminals can misuse these details to open fake accounts or obtain loans.

For a straightforward look at what happened and steps to protect yourself, check out our new video and podcast about identity theft.

Cyber podcast logo

Join us for a powerful podcast featuring Eva Velasquez, CEO of the Identity Theft Resource Center, as she shares real-life stories of identity theft and the hard-earned lessons victims have learned. Her insights will help you recognize the risks and take smarter steps to protect yourself.

Cybersecurity News You Can Use

the Gmail logo and a mobile login screen on the left, next to text on a black background that reads, "Spend a little time improving security on your Gmail account."

Earlier this summer, hackers stole a database containing 2.5 billion Gmail accounts, increasing the risk to individuals and businesses. Since the breach, scammers posing as Google employees have been calling and emailing users, urging them to reset their passwords. These attacks are designed to trick people into giving up login details, which can lead to even more serious scams.

Google is now urging users to strengthen security settings on their personal accounts, report any suspicious calls or emails to their IT department, and never share account information over the phone.

How to improve Gmail security.

  • Go to myaccount.google.com/security-checkup.
  • Sign in to your Google account.
  • Google will guide you through a checklist that includes recent sign-ins, connected devices, account permissions, recovery phone number/email, and 2-step verification settings.
  • Follow the prompts to remove old devices, revoke access to risky apps, and tighten security settings.
[xsi]data collected by cars

Update Your Passwords

These organizations say they have been hacked recently. If you do business with any of these companies, change your account password and use two-factor authentication wherever possible.

five company logos on a white background. The top row shows the logos for Farmers Insurance, TransUnion, and PayPal. The bottom row shows the logos for Manpower and DaVita Kidney Care.
Close-up of a hand holding a smartphone with a blurred laptop keyboard in the background. Large text says 'Contact'. Below, headline reads 'Request An IT Consultation' and subtext says 'Xtreme Solutions is here to help you with all your IT needs in Metro Atlanta and across the country.'

One more thing...

a single-panel cartoon showing a salesperson talking to an older couple in an electronics store. The caption below reads: "You wear it on your wrist and it hacks—I mean, tracks—all your personal data."

Answers to Your
Cybersecurity Questions

a high-tech image with several glowing digital padlocks on a metallic surface that has circuit board lines etched into it. The text "Our most-often asked question" is overlaid in yellow at the bottom.

“How do I use a Password Manager on my computer and which providers are best?”

A Password Manager app makes it easy to store and organize all login credentials in one place, so you don’t have to mess with remembering passwords for all the places you visit. The same app should be installed on all the devices you use. You should still use two-factor authentication, where you’re sent a code every time you log in.

Many readers want to know if it’s safe to use this software. After all, it means putting all your passwords in one place. But your chances of suffering a breach are much lower than trying to manage passwords yourself. (Note: a password manager requires a “master password” to use. Once you are assigned one, do NOT lose it!)

To determine which password manager is the best choice for you, conduct a web search. Some apps cost more than others, some offer other valuable features, and some are more complicated to use. Consumer Reports suggests trying free versions of popular password managers like NordPass, 1Password, Dashlane, Bitwarden, or RoboForm to see which one works best for you.

a person's hands holding a smartphone that displays an incoming call from "Your Bank's Name," with options to Accept or Decline. The background is dark and filled with abstract digital data. Red text at the bottom asks, "Is your bank really calling you?"

A reader wanted you to know about his experience receiving a call that appeared on his phone as “Chase Bank.” The voice on the other end claimed that a suspicious Zelle transaction had been made from an old iPhone 8 linked to his account. Then they gave him “security codes” and transferred him to another person.

“When I questioned why the transaction didn’t appear in my account, they insisted they could see it on their end. I texted a friend who works at Chase to verify the names they gave me. Neither showed up in Chase’s internal directory. When I confronted the caller about it, she immediately hung up.

Bottom line: Always call the bank back directly through their official number. And remember that any number that shows up on your phone can easily be faked.

a stylized, close-up view of a computer keyboard illuminated with glowing cyan and red lights, representing data streams. The text "Can cyber criminals see everything you type?" is overlaid in the center.

“Is it possible to track my every keystroke on messages I send?”

Yes, it is. Some cybercriminals use “keyloggers,” which are software programs that can record everything you do on your computer. They can steal private messages, passwords, and personal information. Keyloggers are usually installed when someone clicks on suspicious links in emails or downloads unsafe files.

How do you avoid keyloggers? Three steps: Install antivirus software on your home computer, keep software updated, and avoid those unfamiliar downloads or links.

See? This is why we keep bringing it up!

Send us your cybersecurity question for possible use in a future newsletter.

Cyber cartoon © 2025 Cartoonstock | Original content © 2025 Aware Force LLC