{"id":57454,"date":"2024-10-18T18:06:00","date_gmt":"2024-10-18T18:06:00","guid":{"rendered":"http:\/\/2d3cb217-4d41-459f-84eb-fd56579c2629"},"modified":"2024-10-18T18:06:00","modified_gmt":"2024-10-18T18:06:00","slug":"stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\/","title":{"rendered":"Stop exposing your Venmo activity &#8211; by changing this privacy setting. Here&#8217;s why"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/a99eda0eecb560d6d55e4dede5c3b8d6eee408a5\/2024\/10\/18\/c5f70557-9f5a-4bc6-925d-f90cca670a82\/gettyimages-2158346438.jpg?auto=webp&amp;width=768\" alt=\"venmo app icon\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/2083f68468fa784c7064b3482cc1e99138039f75\/2024\/10\/18\/c5f70557-9f5a-4bc6-925d-f90cca670a82\/gettyimages-2158346438.jpg?auto=webp&amp;width=1024\" alt=\"venmo app icon\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/73d8cbe83afdb13956fbc847db2b70436056bc10\/2024\/10\/18\/c5f70557-9f5a-4bc6-925d-f90cca670a82\/gettyimages-2158346438.jpg?auto=webp&amp;width=1280\" alt=\"venmo app icon\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/73d8cbe83afdb13956fbc847db2b70436056bc10\/2024\/10\/18\/c5f70557-9f5a-4bc6-925d-f90cca670a82\/gettyimages-2158346438.jpg?auto=webp&amp;width=1280\" alt=\"venmo app icon\" width=\"1280\" height=\"853.3333333333333\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">Photo Illustration by Justin Sullivan\/Getty Images<\/span><\/figcaption><\/figure>\n<p>If you&#8217;re a Venmo user, you should probably review your privacy settings. If you haven&#8217;t checked them before, your entire friends list and transaction history are public.<\/p>\n<p><strong>Also:&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/nasa-has-a-problem-and-its-offering-up-to-3-million-if-you-have-a-solution\/\" rel=\"follow\">NASA has a problem, and it&#8217;s offering up to $3 million if you have a solution<\/a><\/strong><\/p>\n<p>You might wonder why it matters if someone can see that you sent a friend $10 when you split a pizza last month, but your Venmo account settings might be revealing more than you know. &nbsp;<\/p>\n<h2>What people can find on Venmo&nbsp;<\/h2>\n<p>By default, Venmo makes every payment and description public. The amount is hidden, but just by pulling up a few random friends, I was able to see the location of their kids&#8217; sports leagues, the name of a wedding venue for an upcoming ceremony, the name of a child&#8217;s classmate at elementary school, and restaurants they frequent.<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/cash-app-users-have-less-than-a-month-to-claim-up-to-a-2500-settlement-payout\/\" rel=\"follow\">Cash App users have less than a month to claim up to a $2,500 settlement payout<\/a><\/strong><\/p>\n<p>Just as important of an issue, though, is that your friends list is public by default as well. Looking at my friends&#8217; contact lists, it wasn&#8217;t hard to find their family members, coworkers, child&#8217;s teachers, daycare workers, and more. Anyone could potentially exploit this &#8212; online trolls, stalkers, ex-spouses, law enforcement (in 2019, <a href=\"https:\/\/www.rollingstone.com\/music\/music-news\/mac-miller-man-in-death-880057\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">federal prosecutors charged a man<\/a> in the death of rapper Mac Miller partially through evidence shown in Venmo transactions), or criminals.<\/p>\n<p>Several years ago, Buzzfeed was able to <a href=\"https:\/\/www.buzzfeednews.com\/article\/ryanmac\/we-found-joe-bidens-secret-venmo\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">find the Venmo account for President Biden<\/a>. The issue wasn&#8217;t that the public could see that he sent his grandchildren money for their birthdays but that a whole web of contacts was visible, including family members and senior White House officials (and their contacts).&nbsp;<\/p>\n<p><!----><\/p>\n<p>While researching for this article, I found public profiles for local politicians, several athletes from pro sports teams in my area, heads of local law enforcement organizations, local TV reporters, and more. Looking at each one, I got a decent feel for the people they&#8217;re often with and the establishments they&#8217;re often in.&nbsp;<\/p>\n<p>Everything on Venmo is public by default because the social aspect was part of the early appeal of the app. From a <a href=\"https:\/\/www.zdnet.com\/article\/cybersecurity-101-everything-on-how-to-protect-your-privacy-and-stay-safe-online\/\" rel=\"follow\">privacy standpoint<\/a> though, this is clearly an issue.&nbsp;<\/p>\n<h2>How to make your Venmo private<\/h2>\n<p>Making your Venmo private is simple. From your home screen, tap &#8220;Me&#8221; in the lower right corner, then tap &#8220;Settings&#8221; in the top right corner. Head to the &#8220;Privacy&#8221; section and you&#8217;ll see three choices: &#8220;Public,&#8221; which is visible to anyone, &#8220;Friends,&#8221; which is only visible to the sender, the recipient, and their Venmo friends, and &#8220;Private,&#8221; which is visible to the sender and recipient only.&nbsp;<\/p>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/the-nsa-advises-you-to-turn-off-your-phone-once-a-week-heres-why\/\" rel=\"follow\">The NSA advises you to turn off your phone once a week &#8211; here&#8217;s why<\/a><\/strong><\/p>\n<p>You can either make these changes for individual payments or for your whole account. You should do the latter. When you make this change, it only affects payments going forward. If you want to change the privacy of past payments, head to the same privacy section and select &#8220;Past Transactions.&#8221;&nbsp;<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>You&#8217;re probably revealing more information than you realize when you use Venmo.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-57454","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Stop exposing your Venmo activity - by changing this privacy setting. Here&#039;s why 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Stop exposing your Venmo activity - by changing this privacy setting. Here&#039;s why 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-18T18:06:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/73d8cbe83afdb13956fbc847db2b70436056bc10\/2024\/10\/18\/c5f70557-9f5a-4bc6-925d-f90cca670a82\/gettyimages-2158346438.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Stop exposing your Venmo activity &#8211; by changing this privacy setting. Here&#8217;s why\",\"datePublished\":\"2024-10-18T18:06:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\\\/\"},\"wordCount\":544,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/73d8cbe83afdb13956fbc847db2b70436056bc10\\\/2024\\\/10\\\/18\\\/c5f70557-9f5a-4bc6-925d-f90cca670a82\\\/gettyimages-2158346438.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\\\/\",\"name\":\"Stop exposing your Venmo activity - by changing this privacy setting. Here's why 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/73d8cbe83afdb13956fbc847db2b70436056bc10\\\/2024\\\/10\\\/18\\\/c5f70557-9f5a-4bc6-925d-f90cca670a82\\\/gettyimages-2158346438.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2024-10-18T18:06:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/73d8cbe83afdb13956fbc847db2b70436056bc10\\\/2024\\\/10\\\/18\\\/c5f70557-9f5a-4bc6-925d-f90cca670a82\\\/gettyimages-2158346438.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/73d8cbe83afdb13956fbc847db2b70436056bc10\\\/2024\\\/10\\\/18\\\/c5f70557-9f5a-4bc6-925d-f90cca670a82\\\/gettyimages-2158346438.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Stop exposing your Venmo activity &#8211; by changing this privacy setting. Here&#8217;s why\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Stop exposing your Venmo activity - by changing this privacy setting. Here's why 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\/","og_locale":"en_US","og_type":"article","og_title":"Stop exposing your Venmo activity - by changing this privacy setting. Here's why 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-10-18T18:06:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/73d8cbe83afdb13956fbc847db2b70436056bc10\/2024\/10\/18\/c5f70557-9f5a-4bc6-925d-f90cca670a82\/gettyimages-2158346438.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Stop exposing your Venmo activity &#8211; by changing this privacy setting. Here&#8217;s why","datePublished":"2024-10-18T18:06:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\/"},"wordCount":544,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/73d8cbe83afdb13956fbc847db2b70436056bc10\/2024\/10\/18\/c5f70557-9f5a-4bc6-925d-f90cca670a82\/gettyimages-2158346438.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\/","url":"https:\/\/www.threatshub.org\/blog\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\/","name":"Stop exposing your Venmo activity - by changing this privacy setting. Here's why 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/73d8cbe83afdb13956fbc847db2b70436056bc10\/2024\/10\/18\/c5f70557-9f5a-4bc6-925d-f90cca670a82\/gettyimages-2158346438.jpg?auto=webp&amp;width=1280","datePublished":"2024-10-18T18:06:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/73d8cbe83afdb13956fbc847db2b70436056bc10\/2024\/10\/18\/c5f70557-9f5a-4bc6-925d-f90cca670a82\/gettyimages-2158346438.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/73d8cbe83afdb13956fbc847db2b70436056bc10\/2024\/10\/18\/c5f70557-9f5a-4bc6-925d-f90cca670a82\/gettyimages-2158346438.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/stop-exposing-your-venmo-activity-by-changing-this-privacy-setting-heres-why\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Stop exposing your Venmo activity &#8211; by changing this privacy setting. Here&#8217;s why"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57454","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=57454"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/57454\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=57454"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=57454"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=57454"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}