Skip to main content

Your say Friday: Has a corporate hack affected you?

say friday corporate hack affected haveyoubeenhackedpoll
Image used with permission by copyright holder
The biggest news in technology over the last week has obviously been the attack on Sony Pictures. What initially seemed a severe but temporary problem has turned into an epic, ongoing, evolving issue that now includes threats against United States citizens and property.

Many people have had their lives shaken by this turn of events. Sensitive private communications have leaked and employee records, including Social Security and bank account information, have made their way to the public. But this is hardly the first hack to have a broad impact. Earlier attacks against retailers like Target also leaked large volumes of consumer information. So many companies have suffered a loss of data that a paranoid person could easily find themselves wondering if any company can be trusted with your data.

But perhaps the issue is overblown. Target’s data breach, for example, has not resulted in the widespread fraud that some observers initially feared – at least so far as anyone can tell. With millions and millions of records leaked forming a clear story is difficult, at best.

So have you been affected by a corporate hack? Or have you weathered the recent cyber storms without issue?


Remember to not just vote, but also leave a comment telling us why you voted as you did. The results of the poll, and our pick for best comment, will be published with next week’s poll.

Last week’s your say: Do you use encryption?

Our previous poll focused on encryption and, specifically, whether or not our readers actually use it. A lot of security experts say some form of encryption is incredibly useful, but the extra steps it adds to using and sharing data can make it a hassle.

That hassle is more than most of you are willing to deal with, it appears. 48 percent of respondents to our poll said they don’t use any form of encryption. That of course means that 52 percent do use encryption, but only 23 percent care to encrypt both local and online files.

Those who do encrypt appear to be dedicated, however, and that includes our commenter of the week. DJ Bolger said “I have encryption activated on my Mac and phone.” We didn’t ask about phones in our poll, but certainly the latest features in the iPhone and some Android devices make it easier than ever before to encrypt on the go.

Image credit: Frank Peters/Shutterstock

Editors' Recommendations

Matthew S. Smith
Matthew S. Smith is the former Lead Editor, Reviews at Digital Trends. He previously guided the Products Team, which dives…
This critical exploit could let hackers bypass your Mac’s defenses
A hacker typing on an Apple MacBook laptop while holding a phone. Both devices show code on their screens.

Microsoft has discovered a critical exploit in macOS that could grant hackers easy access to your Mac’s most important data. Dubbed ‘Migraine,’ it shows why it’s vital to update your Mac as soon as possible.

Migraine is so damaging because it can bypass Apple’s System Integrity Protection, or SIP for short. SIP is enabled by default on modern Macs and works by sandboxing sensitive parts of the computer from outside meddling. Only processes that are signed by Apple (or those with special privileges, like Apple installers) are allowed to alter something guarded by SIP.

Read more
These embarrassing passwords got celebrities hacked
dt10 language and tech motorola razr v3 paris hilton

One thing that celebrities have in common with everyday people is that they are also susceptible to cybersecurity breaches. Many public figures have had their private and public tech accounts hacked over the years and these attacks have often been due to them simply having weak passwords that were easy for bad actors to figure out.

Socialites, actors, politicians, and even prominent tech figures are guilty of lazy password practices, and falling victim to cybercrime that has compromised their passwords.
President Donald Trump

Read more
Hackers are using a devious new trick to infect your devices
A person using a laptop with a set of code seen on the display.

Hackers have long used lookalike domain names to trick people into visiting malicious websites, but now the threat posed by this tactic could be about to ramp up significantly. That’s because two new domain name extensions have been approved which could lead to an epidemic of phishing attempts.

The two new top-level domains (TLDs) that are causing such consternation are the .zip and .mov extensions. They’ve just been introduced by Google alongside the .dad, .esq, .prof, .phd, .nexus, .foo names.

Read more