Sentrya logo Sentrya Get rid of spam

Extortion Scams: How to Protect Yourself When Scammers Use Your Personal Data

Added on: 28/10/2024 Cybercriminals are escalating their tactics, using personal data in extortion scams to frighten people into sending them money. In a particularly concerning scam, individuals report receiving emails from unknown senders that include alarming details like their name, address, phone number, and even an image of their home. This type of highly targeted scam, known as spear-phishing, is designed to make the threat feel personal, increasing the likelihood that the recipient will comply with the scammer’s demands.

In these spear-phishing emails, scammers typically claim to have gained full access to the recipient’s device, often through malware. They may assert that they control the device’s microphone, camera, and keyboard and have downloaded sensitive data, like photos, browsing history, messages, and social media contacts. Finally, the scammer demands a ransom, typically in cryptocurrency, threatening to release the data or compromising photos unless payment is made.

While these emails can be unsettling, understanding how scammers obtain this information — and knowing what to do if you’re targeted — can help you stay safe.


Where Do Scammers Get This Information?


Scammers gather personal information from multiple sources. Public records, data breaches, and social media accounts can all provide personal data that scammers then use to build a profile on their targets. When people share their location, family relationships, or frequent activities on social media, scammers can use these details to make their threats seem more credible.

In some cases, scammers even use Google Maps’ street view to find an image of a person’s home after locating their address. Other tactics include purchasing compromised data on the dark web, where entire databases of personal information are frequently traded.


What to Do If You’re Targeted


1. Stay Calm: The fear tactic is central to the scam. Staying calm can help you assess the legitimacy of the claims. Remember that scammers often use outdated or publicly accessible information and do not have control over your device.
2. Don’t Engage: Responding to the email can validate your contact information for scammers, potentially leading to further targeting. Avoid replying or paying any ransom.
3. Strengthen Your Security: If the email includes accurate information, take this as an opportunity to update your security practices. Visit sites like HaveIBeenPwned to check if your email or phone number has been part of a breach. If so, change your passwords immediately and consider using a password manager to maintain unique passwords across accounts. Enabling two-factor authentication (2FA) is also highly effective for preventing unauthorized access.
4. Report the Scam: In the UK, you can report phishing emails to report@phishing.gov.uk. Reporting these scams helps authorities track and address fraudulent activity.
5. Be Mindful of Online Sharing: Keep your social media profiles private, avoid sharing overly personal details publicly, and consider using temporary email addresses for website registrations. Tools like Apple’s “Hide My Email” can help minimize exposure.


In a digital age, where our personal data is more accessible than ever, remaining vigilant is essential. Taking precautions, such as limiting public sharing, using strong passwords, and knowing how to react to extortion attempts, can help you safeguard your data and feel confident against online threats. If you suffer financial loss from a scam, contact your bank immediately and report the incident to authorities for further assistance.

Read more

Trump Administration Reverses Data Privacy Protections Exposing Americans to Increased Risks

In a significant policy reversal, the Trump administration has dismantled a Biden-era initiative aimed at limiting the sale of Americans’ personal data by data brokers. This move raises substantial concerns about consumer privacy and national security.<br/><br/><br/><h2 class= "text-heading">Background: The Biden-Era Initiative</h2><br/>Under President Biden, the Consumer Financial Protection Bureau (CFPB) proposed regulations to subject data brokers to oversight akin to credit bureaus. The goal was to protect consumers from the unregulated sale of sensitive personal information, which could be exploited for identity theft, scams, and even national security threats.<br/><br/><br/><h2 class= "text-heading">The Reversal and Its Implications</h2><br/>On May 14, 2025, the CFPB announced the withdrawal of the proposed regulations, stating that they no longer align with the bureau’s policy objectives. Consumer advocacy groups, such as Consumer Reports, have expressed alarm, warning that this decision leaves consumers vulnerable to scams and identity theft.<br/><br/>The rollback also includes the withdrawal of proposals related to digital payment technologies and the prohibition of certain terms in consumer finance products.<br/><br/><br/><h2 class= "text-heading">Risks to Consumer Privacy</h2><br/>The unregulated sale of personal data poses several risks:<br/>• <u>Identity Theft</u>: Personal information can be used to impersonate individuals, leading to financial loss and reputational damage.<br/>• <u>Scams and Phishing</u>: Data brokers can sell information to malicious actors who craft targeted scams and phishing emails.<br/>• <u>National Security Threats</u>: Sensitive data about government officials and military personnel can be exploited by foreign adversaries for espionage.<br/><br/><br/><h2 class= "text-heading">Sentrya: A Consumer-Focused Solution</h2><br/>In light of these developments, consumers seeking to protect their personal information can turn to services like <a href= "https://sentrya.net" class= "content-link">Sentrya</a>. Sentrya offers tools to remove personal data from the web and data brokers, and to clear inboxes of scams and phishing emails. Designed specifically for individual consumers, Sentrya empowers users to take control of their digital privacy.<br/><br/><br/>The Trump administration’s decision to scrap proposed data privacy regulations underscores the importance of individual action in safeguarding personal information. While federal protections may be in flux, consumers can proactively protect themselves using services like <a href= "https://sentrya.net" class= "content-link">Sentrya</a> to mitigate the risks associated with data exposure. Read more

Your Airline Might Be Sharing Your Data with ICE: Here is What You Need to Know

Have you ever booked a flight thinking it was just between you, your airline, and your destination? You might want to think again. Recent reporting from Jacobin has exposed a chilling truth: airlines and travel companies are quietly sharing your personal travel data with U.S. Immigration and Customs Enforcement (ICE). And it’s happening without your consent, knowledge, or any real way to opt out.<br/><br/>Let’s break down what’s going on—and what it means for you.<br/><br/><br/><h2 class= "text-heading">Your Data Is Being Sold—Not Just Shared</h2><br/>You probably don’t know what the Airlines Reporting Corporation (ARC) is. That’s by design. ARC is a behind-the-scenes player that processes flight bookings between travel agencies (think Expedia, Priceline, or even a local agency) and over 200 airlines. That includes the biggest names: Delta, American, United, JetBlue, and more.<br/><br/>When you book a ticket, your itinerary, payment information, and travel history don’t just stay with the airline. They flow into ARC’s massive system. And from there? That data is being sold directly to ICE, as part of something called the “Travel Intelligence Program.”<br/><br/>Yes, sold.<br/><br/>This isn’t a targeted subpoena for a specific criminal investigation. This is bulk data sharing—ICE getting access to your travel habits, international flights, layovers, and even payment methods, all neatly packaged. Whether you’re a citizen, a visa holder, or just someone trying to visit family, that data can land in a government file, without your knowledge.<br/><br/><br/><h2 class= "text-heading">Why This Should Deeply Worry You</h2><br/>This isn’t just about immigration enforcement. This is about your right to privacy—and how it’s being traded away.<br/><br/>1. <em>You never consented to this.</em><br/>When you hit “purchase” on that ticket, did you get a notice saying your personal information might be sold to a federal law enforcement agency? Of course not.<br/><br/>2. <em>You have no control over where your data goes.</em><br/>Even if you use third-party travel sites, ARC is the middleman. And ARC is owned by the very airlines you’re booking with—so they’re profiting off your data in multiple ways.<br/><br/>3. <em>You could be flagged for future surveillance without doing anything wrong.</em><br/>Maybe you fly often to a country ICE is scrutinising. Maybe you paid for a ticket for someone else. Maybe you booked with cash. These perfectly legal activities can appear suspicious when viewed out of context by an algorithm or agency.<br/><br/><br/><h2 class= "text-heading">Real People, Real Risks</h2><br/>Imagine you’re visiting family abroad and come back to find you’ve been flagged for extra screening—no explanation, just delays and discomfort. Or ICE shows up at someone’s door based on flight data you unknowingly shared when you booked a ticket for them. These aren’t hypotheticals. This data is being used for real enforcement actions, with real consequences.<br/><br/>And no, there’s no easy opt-out.<br/><br/><br/><h2 class= "text-heading">What You Can Do to Protect Yourself</h2><br/>Unfortunately, you can’t completely stop airlines from selling your data—at least, not yet. But you can take steps to limit your exposure:<br/>• <u>Avoid big-name platforms</u> when booking, or research which agencies work with ARC. Smaller, privacy-conscious travel services may reduce how much data is shared.<br/>• <u>Pressure airlines and lawmakers</u> to stop this. If enough consumers speak up, companies and legislators will take notice.<br/><br/><br/><h2 class= "text-heading">This Isn’t Just a Policy Issue—It’s Personal</h2><br/>You deserve to travel without fear that your movements are being logged, sold, and scrutinised by law enforcement. This isn’t about politics. It’s about privacy, consent, and basic digital rights.<br/><br/>Next time you book a flight, take a moment to think about where your data is going—and who might be watching. Read more

19 Billion Passwords Leaked in 2025: What You Need to Know and How to Protect Yourself

In what cybersecurity experts are calling one of the largest password leaks in internet history, over <u>19 billion compromised credentials</u> have surfaced in a massive data dump dubbed “RockYou2024.” This trove of exposed data is not from a single breach but a massive aggregation of credentials from more than <em>200 past incidents</em>, spanning over a decade. First revealed by Forbes, this leak is now widely circulating on hacker forums and underground markets—posing a serious threat to personal and corporate cybersecurity.<br/><br/><br/><h2 class="text-heading">What Is the RockYou2024 Password Leak?</h2><br/>The RockYou2024 leak, analysed by cybersecurity researchers at Cybernews, is a 19-billion-entry compilation of previously stolen passwords, many of which are still actively used. The passwords are in plaintext format, which means hackers don’t need to decrypt anything—they can use them immediately.<br/><br/>Key stats from the leak include:<br/>• <u>19,030,305,929 passwords</u> compiled from global breaches<br/>• <u>94% of passwords are reused across multiple sites</u><br/>• Popular entries include “123456”, “password”, and “admin”<br/>• Most passwords are between 8–10 characters and lack complexity<br/>This dataset isn’t just big—it’s <b>weaponisable</b>, giving cybercriminals an enormous arsenal for launching attacks on personal, business, and government systems.<br/><br/><br/><h2 class="text-heading">Why This Password Leak Is So Dangerous</h2><br/>1. <b>Credential Stuffing Attacks</b><br/>Using automated tools, hackers test these passwords on thousands of sites. If you reuse passwords, they’ll likely gain access to your email, bank account, social profiles, or worse.<br/><br/>2. <b>Phishing and Scams</b><br/>Once attackers have partial information, they can launch targeted phishing campaigns—often using fake emails, phone calls, or messages to extract more sensitive data.<br/><br/>3. <b>Business Security Risks</b><br/>Employees using compromised credentials for workplace accounts can expose entire organisations to ransomware, data loss, or financial fraud.<br/><br/>4. <b>Brute Force Optimisation</b><br/>This leak acts as fuel for brute force tools. Because the passwords are real and common, these tools become more efficient and successful.<br/><br/><br/><h2 class="text-heading">How to Protect Yourself Right Now</h2><br/>With 19 billion passwords out in the wild, now is the time to act. Here’s how you can protect yourself and your information:<br/><br/>1. <b>Scan the Web for Your Exposed Data</b><br/><br/><a href= "https://sentrya.net" class="content-link">Sentrya</a> scans data broker networks and breach databases to identify where your personal data is exposed—and helps you <b>remove it</b>. This drastically reduces your risk of identity theft, targeted scams, and phishing attacks.<br/>• <em>Remove personal data from the web</em><br/>• <em>Block scam and phishing emails</em><br/>• <em>Monitor the dark web for emerging threats tied to your identity</em><br/><br/>You can protect yourself or your entire family with a few clicks at <a href= "https://sentrya.net" class="content-link">sentrya.net</a>.<br/><br/>2. <b>Stop Reusing Passwords</b><br/><br/>Still using the same password for multiple accounts? That’s how 94% of the passwords in this leak were exposed.<br/>Instead, use Sentrya’s <a href= "https://sentrya.net/generate-random-password" class="content-link">secure password generator</a> to instantly create:<br/>• Strong, randomised, unique passwords<br/>• Passwords up to 50 characters in length<br/>• Passphrases using complex symbols, upper/lowercase, and numbers<br/><br/>It’s completely free and requires no signup: <a href= "https://sentrya.net/generate-random-password" class="content-link">Generate a password now</a><br/><br/>3. <b>Enable Multi-Factor Authentication (MFA)</b><br/><br/>Even if a password is leaked, MFA provides an extra layer of protection. Use authenticator apps (like Google Authenticator or Authy) instead of SMS whenever possible.<br/><br/>4. <b>Check If Your Accounts Are Affected</b><br/><br/>Use breach alert services like:<br/>• <a href= "https://haveibeenpwned.com" class="content-link">Have I Been Pwned</a><br/>• <a href= "https://cybernews.com/password-leak-check" class="content-link">Cybernews Password Checker</a><br/><br/>If any of your emails or passwords appear in those tools, update them immediately using Sentrya’s <a href= "https://sentrya.net/generate-random-password" class="content-link">password generator</a>.<br/><br/>5. <b>Watch for Phishing and Scams</b><br/><br/>After major leaks, phishing campaigns spike. Stay alert for:<br/>• Fake account recovery emails<br/>• Messages pretending to be from banks or tech companies<br/>• Unusual login alerts<br/><br/>If in doubt, don’t click. Visit the service’s official website instead.<br/><br/><br/>The RockYou2024 password leak proves that <em>password reuse is no longer just risky—it’s reckless</em>. With more than 19 billion credentials circulating in the cybercriminal underground, every reused or weak password becomes a liability.<br/><br/>Fortunately, with proactive tools like <a href= "https://sentrya.net" class="content-link">Sentrya</a>, you can reclaim control of your digital footprint:<br/>• Remove your personal info from data brokers<br/>• Block phishing scams<br/>• Generate ironclad passwords for every account<br/><br/>The internet is more dangerous than ever—but with the right tools, <u>you don’t have to be the next victim</u>. Read more

LG Smart TVs Now Use Emotionally Intelligent Ads with Zenapse AI Technology

In a bold move shaping the future of connected TV advertising, LG Electronics has partnered with artificial intelligence company Zenapse to introduce emotionally intelligent advertising to its smart TVs. This AI-driven innovation uses advanced emotional analytics to deliver personalised ads based on viewers’ psychological and emotional profiles.<br/><br/><br/><h2 class= "text-heading">What Is Emotionally Intelligent Advertising?</h2><br/>Emotionally intelligent advertising is the next evolution in personalised marketing. Rather than just targeting users based on demographics, browsing behaviour, or viewing history, this method leverages emotion-based data to tailor content more precisely.<br/><br/>At the center of this technology is Zenapse’s <em>Large Emotion Model (LEM)</em>, a proprietary AI system that maps out psychological patterns and emotional states across various audiences. When integrated into <em>LG’s Smart TV platform</em>, this model works in tandem with the TVs’ first-party viewership data to identify how users feel while watching content—and delivers ads that resonate on a deeper level.<br/><br/><br/><h2 class= "text-heading">How LG’s Smart TV AI Works with Zenapse</h2><br/>LG’s smart TVs already employ <em>Automatic Content Recognition (ACR)</em>, a tool that gathers data about the content viewers consume, including shows and apps accessed through external devices. This gives LG valuable insight into a household’s viewing preferences.<br/><br/>By combining ACR data with Zenapse’s emotion-detection AI, advertisers can now deliver highly relevant, emotionally-tuned ad experiences that reflect the viewer’s mindset. For example:<br/>• A user showing patterns of stress may see wellness or mindfulness ads.<br/>• A family engaging in uplifting content might receive vacation or family-focused brand messages.<br/><br/>This is far beyond traditional <u>contextual advertising</u>—it’s what experts are calling emotionally-aware targeting.<br/><br/><br/><h2 class= "text-heading">Data Privacy and Ethical Considerations</h2><br/>As with all AI-powered personalisation, <b>privacy</b> is a major concern. LG’s smart TVs collect data through ACR, and while users can opt out, this type of emotionally aware targeting requires even more <em>granular behavioural data</em>.<br/><br/>Consumer advocacy groups warn that technologies which infer mental or emotional states could cross ethical boundaries if not regulated properly. Transparency, consent, and data control will be key for LG and Zenapse to maintain user trust.<br/><br/><u>LG has stated</u> that all data used is anonymised and consent-based, but the introduction of emotion-based ads will likely renew calls for updated <em>privacy legislation</em> in the smart home and streaming ecosystem.<br/><br/><br/><h2 class= "text-heading">What’s Next for Smart TV Advertising?</h2><br/>This partnership signals a major shift in how ads are delivered on smart TVs. With emotionally intelligent AI models now in play, we can expect:<br/>• More platforms to adopt emotion-based personalisation<br/>• Expanded use of machine learning for real-time emotional detection<br/>• Regulatory scrutiny over AI and mental-state inference<br/><br/>For now, LG and Zenapse are pioneering a new frontier in <em>AI-driven, emotion-aware media experiences</em>—one that could redefine the relationship between brands and consumers in the living room. Read more
Sentrya logo Sentrya
Affiliates Register Terms Privacy
Made with ❤️ by Claudiu All rights reserved | Sentrya 2025
I'd like to set analytics cookies that help me make improvements by measuring how you use the site.