August 3, 2021
Do you work out? Before COVID-19 struck, over 1 in 5 Americans belonged to at least one health club or studio in the US in 2019. As gyms and fitness centers were forced to shut down due to the pandemic, more people have started to do exercise at home. You may want to buy exercise equipment or sign up for online physical training memberships, but please also beware of your cybersecurity fitness. Continue reading to learn cybersecurity risks associated with fitness and how to protect yourself when you work out at home:
For example, it is reported that Peloton, a famous exercise equipment company in the USA, had cybersecurity issues with their fitness products in June 2021.
Vulnerabilities were found in some Peloton bikes, enabling hackers to gain access to the devices (Peloton Bike+ or a Peloton Tread) and take control over them. Hackers could then install and run malicious apps in your Peloton bike (disguised as normal ones like Netflix or Spotify), opening backdoor access and spying on you remotely without your knowledge.
Hackers could steal all your sensitive credentials and use them for identity theft. Or, your
camera and microphone could be compromised; your workout could be watched or even recorded unknowingly.
Besides malicious attacks, data breaches also happen every now and then in health and fitness industry. Here are some examples:
Total Fitness, a UK health club, has confirmed a data breach in February 2021, exposing members’ banking information including account numbers. Total Fitness stressed that credit card information was not accessed, but there could still be cybersecurity risks – with the personal information stolen, hackers can commit identity theft.
Back in September 2020, Town Sports International, a US fitness chain, suffered a data breach, with over 600,000 people’s personal information leaked.
As BleepingComputer reported, breached information included users’ names, addresses, phone numbers, email addresses, last four digits of credit cards, credit card expiration dates, and their billing history.
Cybercriminal could send users text messages or emails with phishing links and make them seem more convincing with these sensitive credentials, prompting users to click on the link and stealing further personal information.
1. After you pin the Trend Micro Check browser extension, it will block dangerous sites for you automatically:
2. Trend Micro Check on WhatsApp:
Send a link or a screenshot of suspicious text messages to Trend Micro Check on WhatsApp for immediate scam detection:
Use Trend Micro ID Security to find out if your information was leaked in a data breach. Trend Micro ID Securitycan monitor your identifying data and alert you if any of them has been compromised.
Trend Micro ID Security includes:
Click the button below to give it a try:
Have you fallen for a hoax, bought a fake product? Report the site and warn others!
As the influence of the internet rises, so does the prevalence of online scams. There are fraudsters making all kinds of claims to trap victims online - from fake investment opportunities to online stores - and the internet allows them to operate from any part of the world with anonymity. The ability to spot online scams is an important skill to have as the virtual world is increasingly becoming a part of every facet of our lives. The below tips will help you identify the signs which can indicate that a website could be a scam. Common Sense: Too Good To Be True When looking for goods online, a great deal can be very enticing. A Gucci bag or a new iPhone for half the price? Who wouldn’t want to grab such a deal? Scammers know this too and try to take advantage of the fact. If an online deal looks too good to be true, think twice and double-check things. The easiest way to do this is to simply check out the same product at competing websites (that you trust). If the difference in prices is huge, it might be better to double-check the rest of the website. Check Out the Social Media Links Social media is a core part of ecommerce businesses these days and consumers often expect online shops to have a social media presence. Scammers know this and often insert logos of social media sites on their websites. Scratching beneath the surface often reveals this fu
How do I recover my crypto after it’s stolen? What happens if your crypto wallet is compromised? Can stolen crypto be traced, and can police actually recover crypto in 2026? These are the questions most people ask within minutes of realizing their wallet has been drained. Crypto theft is fast, quiet, and unforgiving. By the time most victims notice something is wrong, the funds are already moving across the blockchain. Once seen as a problem for exchanges and whales, crypto theft now heavily affects everyday investors. Phishing links, fake support chats, wallet approval scams, SIM swaps, and malware attacks have become common. Knowing what recovery realistically looks like—and what it doesn’t—can prevent panic, bad decisions, and costly follow-up scams. In a Nutshell Crypto recovery is possible, but only in limited situations Blockchain transactions are irreversible, but stolen crypto can still be traced Speed and documentation matter more than optimism Police and exchanges play a bigger role than private recovery services Guaranteed recovery offers are almost always scams Is it Actually Possible to Recover Stolen Crypto? Yes, crypto recovery is possible, but only under specific conditions and rarely through direct action by the victim. Blockchain transactions are final by design. Once crypto is sent and confirmed, it cannot be reversed. There is no central authority, no chargeback process, and no technical “undo” button, even if the transaction was clearly fraudulent. This is where many people ask whether stolen crypto can be traced. In most cases, it can. Every transaction