Clickjacking: The (Literally) Hidden Threat

• in categories: advice • by: Michelle Balestrat

Are you clicking what you think you’re clicking? A little-known type of security exploit should make you think twice.

A mouse cursor hovers over a large red 'Download' button on a deep blue background.

Clickjacking, also called UI redressing or IFrame Overlay, is a type of attack in which a button or field is overlaid by invisible malicious scripts or links.

For example, a popup ad might leave you desperate to click the “X” without pause – but this innocuous “X” button could be overlaid with a script to download a Trojan.

Read More

Ride Sharing Apps and Your Privacy

• in categories: advice • by: Michelle Balestrat

Love them or loathe them, ridesharing apps like Lyft and Uber have rapidly transformed the way we get around.

The side of a car as it drives down a highway. The side mirror is in the foreground.

In busy cities and towns, getting a lift anytime, anywhere has proven an irresistible premise to the devotees of these services, despite many controversies over privacy and real-time location data collection.

This week, we’ll look at what kind of privacy concerns affect ridesharing apps, and what ridesharing converts can do to reduce their risk.

Read More

Point of Sale Breaches: What To Do If You're Affected

• in categories: advice • by: Michelle Balestrat

If you’ve gone shopping with a credit card, you’ve used a Point of Sale (POS) System. While we might only associate online shopping with potential risks to our bank account, in-person shopping with a credit card can also put you at risk.

A pair of scissors cut through two credit cards, in front of a white background.

This is because POS systems are common targets for data breaches, resulting many millions of credit card details becoming compromised each year. Even the largest and most trusted retailers, for example Target, Home Depot, McDonalds and countless others, have fallen prey to these attacks. So, how does a POS breach take place? Read on to find out.

Read More

Security Tips for USB Sticks

• in categories: advice • by: Michelle Balestrat

When we think of avoiding malware, we’re often focussed on our online activities. However, this isn’t the only risk to consider.

Close up image of a USB memory stick on a white background.

USB sticks are a convenient way to store vast amounts of data, and allow for quick data transfer between computers without relying on the cloud. They’re cheap and ubiquitous, and many of us have dozens of them. We don’t often don’t even think twice about plugging in a friend’s stick to transfer some files.

A new joint study by Google, the University of Michigan and the University of Illinois performed an interesting social experiment, scattering USB sticks on the ground around campus at Urbana-Champaign. Surprisingly, 48% of the drives were snatched up.

Read More

6 Essential Steps for Safe Mobile Banking

• in categories: advice • by: Michelle Balestrat

Phones have come a long way from the pocket-breaking bricks (and not-so-pocket-sized suitcases!) of yesteryear. Today, we’re using them for just about everything, and our banking habits are seeing a seismic shift towards the convenience of mobile banking.

Close up image of a mobile phone, showing a payment screen.

But is it a security nightmare waiting to happen, or a convenient way to manage and share funds? The answer depends on your security habits. Read on to see if you’re following these 6 essential security tips.

Read More

Boost your breach protection!

Email Watchdog

Guard your online accounts.
  • 10 and 50 email packs available.
  • Detailed breach notifications.
  • Watchdog Update email newsletter.
  • Priority email support.
Learn More

Business Watchdog

Protect your company’s accounts.
  • Protect all email addresses in your domain.
  • Detailed breach notifications.
  • Exclusive access to your domain’s breach status.
  • Watchdog Update email newsletter.
  • Priority Email Support.
Learn More
Previous Page 1 of 15