{"id":2363,"date":"2020-08-11T18:21:00","date_gmt":"2020-08-11T22:21:00","guid":{"rendered":"https:\/\/joindeleteme.com\/?p=1343"},"modified":"2020-08-11T18:21:00","modified_gmt":"2020-08-11T22:21:00","slug":"top-12-online-security-threats","status":"publish","type":"post","link":"https:\/\/joindeleteme.com\/blog\/top-12-online-security-threats\/","title":{"rendered":"Top 12 Online Security Threats"},"content":{"rendered":"\n<div class=\"wp-block-rank-math-toc-block uk-card-default uk-padding\" style=\"font-size:16px\" id=\"rank-math-toc\"><h4>Table of Contents<\/h4><nav><ul><li><a href=\"#1-malware\">1. Malware<\/a><\/li><li><a href=\"#2-social-engineering-attacks\">2. Social Engineering Attacks<\/a><\/li><li><a href=\"#3-unpatched-security-vulnerabilities\">3. Unpatched Security Vulnerabilities<\/a><\/li><li><a href=\"#4-social-networking\">4. Social Networking<\/a><\/li><li><a href=\"#5-data-brokers\">5. Data Brokers<\/a><\/li><li><a href=\"#6-password-attack\">6. Password Attack<\/a><\/li><li><a href=\"#7-pharming\">7. Pharming<\/a><\/li><li><a href=\"#8-evil-twin-attacks\">8. Evil Twin Attacks<\/a><\/li><li><a href=\"#9-internet-of-things\">9. Internet of Things<\/a><\/li><li><a href=\"#10-web-tracking\">10. Web Tracking<\/a><\/li><li><a href=\"#11-hidden-apps\">11. Hidden Apps<\/a><\/li><li><a href=\"#12-data-collection\">12. Data Collection<\/a><\/li><li><a href=\"#stay-current-on-security-threats\">Stay Current on Security Threats<\/a><\/li><\/ul><\/nav><\/div>\n\n\n\n<p><span style=\"font-weight: 400;\">Most people rarely think about the top online security threats when they browse the internet. The Internet today is loaded with data brokers like Spokeo and Whitepages who compile and sell your personal information. Our guides on topics like <span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;how to remove spokeo profile&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:12416,&quot;10&quot;:2,&quot;15&quot;:&quot;Arial&quot;,&quot;16&quot;:11}\"><a href=\"https:\/\/help.joindeleteme.com\/hc\/en-us\/\">how to remove Spokeo profile<\/a> and <a href=\"https:\/\/help.joindeleteme.com\/hc\/en-us\/\">how to remove your data from Whitepages <\/a><\/span>can clue you into the risks that exist out there.\u00a0<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\"> After all, if you have good antivirus software and are careful about what you click on, the chances that you\u2019re going to get hacked or be taken advantage of by bad actors must be slim, right?&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Not so. Even if you take precautions, your security and privacy are still at risk. Just look at the stats. In 2019, there were <\/span><strong><a href=\"https:\/\/www.statista.com\/statistics\/273550\/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed\/\" target=\"_blank\" rel=\"noopener noreferrer\">more than 1,000<\/a><\/strong><span style=\"font-weight: 400;\"> data breaches, with over 150 million sensitive records exposed. <\/span><strong><a href=\"https:\/\/www.iii.org\/fact-statistic\/facts-statistics-identity-theft-and-cybercrime\" target=\"_blank\" rel=\"noopener noreferrer\">More than 650,000<\/a><\/strong><span style=\"font-weight: 400;\"> people reported identity theft, a 46% increase from 2018. And phishing attacks <\/span><strong><a href=\"https:\/\/www.pcmag.com\/news\/phishing-attacks-increase-350-percent-amid-covid-19-quarantine\" target=\"_blank\" rel=\"noopener noreferrer\">increased by 350%<\/a><\/strong><span style=\"font-weight: 400;\"> during the COVID-19 quarantine.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Even worse, new threats are emerging daily. The only way you can keep yourself protected is by understanding the most common cyber attacks and staying up to date with the latest security vulnerabilities. With that in mind, we compiled a list of the top 12 online security threats you should keep an eye out for in 2020.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"1-malware\"><strong>1. Malware<\/strong><\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">Malware (which stands for \u201cmalicious software\u201d) is software designed to perform a malicious task on a target device without the user\u2019s consent. A malware infection can disable hardware, steal information, corrupt files, delete data, and do all sorts of other damage.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">There are different types of malware out there, including viruses, worms, rootkits, trojan horses, spyware, adware, and ransomware. Each type has varying capabilities. Sometimes, cybercriminals use a combination of malware (known as a \u201cblended threat\u201d) to speed up and increase the severity of the attack.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">One of the most popular ways to distribute malware is through emails. However, malware can also spread via infected software and malicious websites.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"2-social-engineering-attacks\">2. Social Engineering Attacks<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">Imagine this: You receive a text from a bank asking you to supply additional details via a link they\u2019ve included. There\u2019s just one problem: you don\u2019t have an account with that specific bank. Ignoring the text, you just avoided falling victim to a phishing scam, a type of social engineering attack.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Social engineering is a manipulation technique that cybercriminals use to trick you into disclosing sensitive information or performing a specific action (like submitting your financial details via a fake website).&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Phishing is just one example of social engineering. There\u2019s also \u201cvishing\u201d (a type of phishing that refers specifically to phone fraud), baiting (where a cybercriminal offers you something hard to resist, like a download to a recently released movie that\u2019s actually malware) and quid pro quo (a variant of baiting where a bad actor promises to give you something in return for information).<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"3-unpatched-security-vulnerabilities\">3. Unpatched Security Vulnerabilities<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">There are two types of people in this world: those who install software updates as soon as they become available and those who put off this small but annoying task indefinitely. If you fall within the latter category and have software that needs updating, you might want to get on it immediately.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Many threats rely on unpatched security vulnerabilities in common applications and browsers. For example, in 2017, <\/span><a href=\"https:\/\/www.kaspersky.com\/resource-center\/threats\/ransomware-wannacry\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">t<strong>he WannaCry attack<\/strong><\/span><\/a><span style=\"font-weight: 400;\">, which affected over 200,000 computers worldwide, took advantage of a security weakness in the Microsoft Windows operating system.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The thing is: Microsoft had released a security patch for this vulnerability about two months before the attack. Had those affected taken five minutes out of their day to update their operating systems, they could have avoided the hack.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"4-social-networking\">4. Social Networking<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">If the Facebook-Cambridge Analytica data scandal did not convince you to ditch social media for good, this might. According to <\/span><strong><a href=\"https:\/\/www.bromium.com\/press-release\/cybercriminals-earning-over-3b-annually-exploiting-social-platforms\/\" target=\"_blank\" rel=\"noopener noreferrer\">a recent report<\/a><\/strong><span style=\"font-weight: 400;\"> by <\/span><span style=\"font-weight: 400;\">Dr. Mike McGuire<\/span><span style=\"font-weight: 400;\">, a <\/span><span style=\"font-weight: 400;\">criminology expert at the University of Surrey, social media cybercrime grew by over 300-fold between 2015 and 2017. Facebook messenger, for example, was found to spread a cryptocurrency mining bot disguised as a video file and several ads on YouTube hijacked viewers\u2019 computers to secretly mine cryptocurrencies.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">According to the report, at least 40% of malware on social media comes from malvertising, whereas 30% comes from plug-ins and apps. As soon as the user clicks on a fake ad or plug-in, the malware executes, allowing the hacker to carry out an attack or steal data.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The information you share on social media is also a treasure trove for cybercriminals (who might use the data to figure out when you\u2019re away from home or commit identity theft) and data brokers (who will use the information to compile a detailed profile about you and then sell it to third-parties).<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"5-data-brokers\">5. Data Brokers<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">Speaking of data brokers: Even if all your social media accounts are set to private, major people search sites likely still have a profile on you, which can include things like your name, address, telephone number, marital status, and more.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Contrary to what you might think, it\u2019s not against the law for data brokers to gather this type of information about you, mostly because it\u2019s publicly available.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">However, just because it\u2019s legal doesn\u2019t mean that you have to put up with it. Data brokers will sell your data to anyone with a credit card. Luckily, you can opt-out of most data broker sites by following <\/span><strong><a href=\"https:\/\/help.joindeleteme.com\/hc\/en-us\/\" target=\"_blank\" rel=\"noreferrer noopener\">our detailed guide<\/a><\/strong><span style=\"font-weight: 400;\"><strong>.<\/strong> But if you need a hand or if you\u2019re worried that your profile will reappear (it inevitably will), think about <\/span><strong><a href=\"https:\/\/joindeleteme.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">subscribing to DeleteMe<\/a><\/strong><span style=\"font-weight: 400;\"><strong>,<\/strong> a monthly service that\u2019ll do all the hard work for you.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"6-password-attack\">6. Password Attack<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">If you use the surprisingly popular \u201c123456\u201d as your password or reuse the same password over and over again, don\u2019t be surprised if a third party gains access to your accounts.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Hackers employ a variety of methods to steal your login details, including, but not limited to, the above-mentioned phishing attack as well as:<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><b>Brute force attack. <\/b><span style=\"font-weight: 400;\">A trial and error method that sees hackers trying all possible combinations of a targeted password.<\/span><\/li>\n\n\n\n<li><b>Dictionary attack.<\/b><span style=\"font-weight: 400;\"> A technique that involves using popular words and phrases.<\/span><\/li>\n\n\n\n<li><b>Credential stuffing.<\/b><span style=\"font-weight: 400;\"> A method where hackers use login details made public following a data breach.<\/span><\/li>\n<\/ul>\n\n\n\n<p><span style=\"font-weight: 400;\">To avoid falling victim to a password attack, make sure all your passwords are complex, use two-password authentication, and never use the same password more than once (a <\/span><strong><a href=\"https:\/\/www.abine.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">password manager<\/a><\/strong><span style=\"font-weight: 400;\"> can help with that).<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"7-pharming\">7. Pharming<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">Pharming, a combination of the words \u201cphishing\u201d and \u201cfarming,\u201d is a type of scam that\u2019s meant to redirect the victim to a fake website with the goal of obtaining their personal information.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">While most people can avoid phishing scams by being careful about who they respond to and what links they click on, pharming is much scarier because it compromises internet traffic at the server level. As such, even if the victim types in the correct URL or visits the site via their bookmarks, they\u2019ll still be redirected to the bogus website.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Pharming is typically carried out either by a malicious download\/email or through DNS poisoning, which can affect countless people. The latter is particularly dangerous because users don\u2019t need to have been infected by malware to fall victim to this scam.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"8-evil-twin-attacks\">8. Evil Twin Attacks<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">Ever heard of an evil twin attack? If you regularly use public WiFi networks, you might have. This scam tricks people into connecting to a malicious WiFi network that looks more or less like the real deal.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Cybercriminals tend to use one of two approaches when it comes to executing an evil twin attack. The first is imitating a captive portal that asks people to enter their login information on a specific page before they\u2019re allowed to connect to the internet, which acts as a social engineering scam (i.e., you\u2019ve just handed over your login details for a real WiFi network). The second is setting up a fake WiFi network. Once you connect to the fake WiFi network, cybercriminals can intercept your information.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Because it\u2019s almost impossible to detect an evil twin, your best bet is always to use a VPN when connecting to a public WiFi \u2014 or even better, avoid public WiFi all together.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"9-internet-of-things\">9. Internet of Things<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">Smart gadgets can undoubtedly make your life easier. But they can also pose a serious risk to your privacy. That\u2019s because there\u2019s currently no security standards for the billions of Internet-of-Things devices, which means that your smart doorbell or fridge might be susceptible to simple hacking techniques. IP cameras are <\/span><strong><a href=\"https:\/\/www.zdnet.com\/article\/cybersecurity-these-are-the-internet-of-things-devices-that-are-most-targeted-by-hackers\/\" target=\"_blank\" rel=\"noopener noreferrer\">the most targeted<\/a><\/strong><span style=\"font-weight: 400;\"> IoT devices, followed by smart hubs, network-attached storage devices, printers, and smart TVs.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Another worry is that smart devices might be listening to everything you say all the time, not just when you give them a command. And even if they do listen to you only when activated, who else is paying attention to every word you say? Hint: If you have Alexa, it\u2019s <\/span><strong><a href=\"https:\/\/www.cnn.com\/2019\/04\/11\/tech\/amazon-alexa-listening\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">Amazon employees<\/a><\/strong><span style=\"font-weight: 400;\">.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Alright, so Amazon\u2019s employees are listening in on your conversations so that Alexa can understand human speech better. But why are some IoT devices tracking your habits and preferences and <\/span><a href=\"https:\/\/www.cpomagazine.com\/data-privacy\/smart-devices-leaking-data-to-tech-giants-raises-new-iot-privacy-issues\/\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\"><strong>sharing your data<\/strong><\/span><\/a><span style=\"font-weight: 400;\">, including usage habits and location, with third-parties? One thing is certain: if you\u2019re becoming increasingly reliant on smart devices, make sure the tech you choose is secure and the company behind it transparent about the way it uses data.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"10-web-tracking\">10. Web Tracking<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">You\u2019ve probably noticed that you&#8217;re asked to accept cookies every time you visit a new site. When you do, the cookie is stored on the site so that when you return to the site in the future, it can remember you from your last visit. This helps improve the browsing experience (for example, that\u2019s how the site remembers the items in your shopping cart) and customize ads specifically for you.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">However, in most cases, it\u2019s not just the site you visit that\u2019s tracking you (i.e., first-party cookie). Third-party cookies are cookies tracked by someone other than the site you\u2019re visiting, usually marketers. Over time, these third-parties may develop a detailed profile about you and your online activities and habits.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The issue here is that most users are not aware of all the third-parties tracking them. According to <\/span><strong><a href=\"https:\/\/reutersinstitute.politics.ox.ac.uk\/sites\/default\/files\/2018-08\/Changes%20in%20Third-Party%20Content%20on%20European%20News%20Websites%20after%20GDPR_0_0.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">a 2018 factsheet<\/a><\/strong><span style=\"font-weight: 400;\"> by the Reuters Institute and the University of Oxford, an average European news site uses about 40 third-party cookies per page. Because this is done without your knowledge, it can be seen as a breach of browser security.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The good news is that Google is planning to <\/span><strong><a href=\"https:\/\/www.theverge.com\/2020\/1\/14\/21064698\/google-third-party-cookies-chrome-two-years-privacy-safari-firefox\" target=\"_blank\" rel=\"noopener noreferrer\">phase out<\/a><\/strong><span style=\"font-weight: 400;\"> third-party cookies entirely within the next two years. In the meantime, use a browser privacy tool like <\/span><strong><a href=\"https:\/\/abine.com\" target=\"_blank\" rel=\"noopener noreferrer\">Blur<\/a><\/strong><span style=\"font-weight: 400;\"> or <\/span><strong><a href=\"https:\/\/privacybadger.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Privacy Badger<\/a><\/strong><span style=\"font-weight: 400;\"> to see who is tracking you or block access to third-party cookies <\/span><strong><a href=\"https:\/\/support.google.com\/chrome\/answer\/95647?co=GENIE.Platform%3DDesktop&amp;hl=en\" target=\"_blank\" rel=\"noopener noreferrer\">on Chrome<\/a><\/strong><span style=\"font-weight: 400;\">, <\/span><strong><a href=\"https:\/\/support.mozilla.org\/en-US\/kb\/clear-cookies-and-site-data-firefox\" target=\"_blank\" rel=\"noopener noreferrer\">Firefox<\/a><\/strong><span style=\"font-weight: 400;\">, or <\/span><strong><a href=\"https:\/\/support.apple.com\/en-gb\/guide\/safari\/sfri11471\/mac\" target=\"_blank\" rel=\"noopener noreferrer\">Safari<\/a><\/strong><span style=\"font-weight: 400;\"><strong>.<\/strong>&nbsp;<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"11-hidden-apps\">11. Hidden Apps<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">According to the 2020 <\/span><strong><a href=\"https:\/\/www.mcafee.com\/content\/dam\/consumer\/en-us\/docs\/2020-Mobile-Threat-Report.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee Mobile Threat Report<\/a><\/strong><span style=\"font-weight: 400;\">, hidden apps are the newest security threat to mobile devices. In 2019, hidden apps were responsible for almost half of all mobile malware, a 30% increase from 2018.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Cybercriminals typically distribute malicious apps through links in gamer chat apps and YouTube videos. Fake apps are hard to spot, mostly because they mimic the icons of legitimate apps, like Spotify, FaceApp, and Call of Duty. Once downloaded the icon changes to one that looks like Settings. Clicking on the icon will return the error message \u201cApplication is unavailable in your country. Click OK to uninstall.\u201d Clicking on \u201cOK\u201d won\u2019t delete the app, though. It\u2019ll do the exact opposite \u2014 complete the installation and then hide the icon, making it incredibly difficult for the user to remove the malware.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Hidden apps bombard users with ads to generate fraudulent revenue, collect sensitive information, and distribute other malicious apps. You can avoid downloading these malicious apps by sticking to official app stores, reading app reviews, and keeping your operating system and all existing apps up to date.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"12-data-collection\">12. Data Collection<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">It\u2019s not just hidden apps that track you. Some legitimate apps spy on you, too. <\/span><strong><a href=\"https:\/\/arxiv.org\/abs\/1804.03603\" target=\"_blank\" rel=\"noopener noreferrer\">A 2018 study<\/a><\/strong><span style=\"font-weight: 400;\"> by Oxford University, which looked at almost one million free Android apps, found that most of them transfer information, which may include <\/span><strong><a href=\"https:\/\/www.nytimes.com\/interactive\/2018\/12\/10\/business\/location-data-privacy-apps.html\" target=\"_blank\" rel=\"noopener noreferrer\">your precise location<\/a><\/strong><span style=\"font-weight: 400;\">, back to companies such as Google, Facebook, Twitter, and Amazon.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">The study also found that the average app can transfer data to 10 third parties, whereas one in five apps can share data with over 20 third parties. A more <\/span><strong><a href=\"https:\/\/blog.appcensus.io\/2019\/02\/14\/ad-ids-behaving-badly\/\" target=\"_blank\" rel=\"noopener noreferrer\">recent research paper<\/a><\/strong><span style=\"font-weight: 400;\"> seems to back this up, claiming that at least 17,000 Android apps collect identifying data.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">In some cases, reading an app\u2019s privacy policy may help. In other instances, it won\u2019t. According to <\/span><strong><a href=\"https:\/\/www.ieee-security.org\/TC\/SPW2019\/ConPro\/papers\/okoyomon-conpro19.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">a 2019 study<\/a><\/strong><span style=\"font-weight: 400;\"><strong>,<\/strong> which analyzed almost 70,000 apps, about 10% of apps share users\u2019 personal information with third parties without telling them that they do so in their privacy policies. Moreover, <\/span><strong><a href=\"http:\/\/taoxie.cs.illinois.edu\/publications\/usenixsec19-policylint.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">another study<\/a><\/strong><span style=\"font-weight: 400;\"> found that almost 15% of apps contain contradicting statements in their policies.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"stay-current-on-security-threats\">Stay Current on Security Threats<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">Now that you know the top 12 online security threats, you can take the necessary measures to protect your device and data. Keeping your device safe is probably easier than safeguarding your sensitive information. If you\u2019re worried that your data is already out there, consider <\/span><strong><a href=\"https:\/\/joindeleteme.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">subscribing to DeleteMe<\/a><\/strong><span style=\"font-weight: 400;\">. For only $10.75 a month, we\u2019ll remove you from all the major data brokers out there, including Spokeo, MyLife, and Whitepages. Not only that, but we\u2019ll also do our best to ensure that your profile is never relisted.&nbsp;<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most people rarely think about the top online security threats when they browse the internet. The Internet today is loaded with data brokers like Spokeo and Whitepages who compile and sell your personal information. Our guides on topics like how to remove Spokeo profile and how to remove your data from Whitepages can clue you [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":6322,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[26],"tags":[],"class_list":["post-2363","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-privacy-tips"],"acf":[],"_links":{"self":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/posts\/2363","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/comments?post=2363"}],"version-history":[{"count":0,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/posts\/2363\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/media\/6322"}],"wp:attachment":[{"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/media?parent=2363"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/categories?post=2363"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/joindeleteme.com\/wp-json\/wp\/v2\/tags?post=2363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}