How To Secure Your Webcam

• in categories: advice • by: Michelle Balestrat

Chances are, you’ve got at least one device with a webcam built-in, or you might have even splashed out on an external one. Either way, they’re great for online conferencing, chatting with family and friends, recording videos, and even logging in with facial recognition.

Close-up of the lens of a webcam.

However, with these extra features come with some added security concerns. It might seem like your paranoia has finally materialised: yes, webcams can be hacked and controlled remotely, allowing others to take a peek at your daily life. And it can happen far easier than you might think.

Even Facebook CEO Mark Zuckerberg has admitted to placing tape over his webcam as a security precaution. As for the rest of us, do we need to go quite so far? Let’s take a look at some less-brutish ways you can secure your webcam.

Read More

How 2FA Can Be Bypassed

• in categories: advice • by: Michelle Balestrat

Two-Factor Authentication: it’s an excellent way to secure your account. (In fact, if you don’t have it, you need it, STAT).

But, like all security measures, it’s only as effective as your own security savviness, and that of the companies you’re trusting with your accounts.

A blister pack of red pills on a white background.

A host of famous YouTube content creators learned this the hard way, beginning with gaming commentator Markiplier back in January 2016, and continuing with many more highly-subscribed channels throughout the year.

In this article, we’ll look at the ways in which the two-factor protection on your accounts can be bypassed – and the sneaky tricks to watch out for.

Read More

A Quick Guide to Laptop Security

• in categories: advice • by: Michelle Balestrat

While you might think your mobile device needs air-tight security, your laptop is likely to contain even more sensitive information than your phone.

A laptop sits unlocked on a desk, showing graphs and other personal data.

Yet, many users are a little too relaxed when it comes to protecting their laptops, perhaps setting a (weak) login password as a token security effort. Are you guilty? Read on.

Read More

Clickjacking: The (Literally) Hidden Threat

• in categories: advice • by: Michelle Balestrat

Are you clicking what you think you’re clicking? A little-known type of security exploit should make you think twice.

A mouse cursor hovers over a large red 'Download' button on a deep blue background.

Clickjacking, also called UI redressing or IFrame Overlay, is a type of attack in which a button or field is overlaid by invisible malicious scripts or links.

For example, a popup ad might leave you desperate to click the “X” without pause – but this innocuous “X” button could be overlaid with a script to download a Trojan.

Read More

Boost your breach protection!

Email Watchdog

Guard your online accounts.
  • 10 and 50 email packs available.
  • Detailed breach notifications.
  • Watchdog Update email newsletter.
  • Priority email support.
Learn More

Business Watchdog

Protect your company’s accounts.
  • Protect all email addresses in your domain.
  • Detailed breach notifications.
  • Exclusive access to your domain’s breach status.
  • Watchdog Update email newsletter.
  • Priority Email Support.
Learn More
Previous Page 1 of 16