Big Data: Big Issues?

• in categories: advice • by: Michelle Balestrat

A security breach involving a big data company can affect millions (or even billions) of people in a single incident.

(Image).

But did you know that consumer power can force companies to take these measures seriously?

Read More

Security Fatigue... Are You Affected?

• in categories: advice • by: Michelle Balestrat

Are you growing increasingly ambivalent to the latest security threats? It’s probably not just you: security fatigue is a growing phenomenon that’s sweeping everyone from casual home users to international corporations.

(Image).

Read on to find out if your lack of good security practices might be down to old-fashioned burnout.

Read More

Avoiding Classic eBay Scams

• in categories: advice • by: Michelle Balestrat

eBay: it’s a world of great deals and often a tempting alternative to paying retail prices. For sellers, it’s also a convenient way to quickly pawn off unwanted items, or even start a small business.

(Image) A computer mouse sit on top of a pile of Euros.
Image Credit: Mike Knell, via Flickr (see footnote).

However, like any marketplace, eBay is also home to a dizzying array of swindles designed to get around the system’s regular safety controls.

Awareness is key, so be on the lookout for these 5 scams that could make your next eBay transaction a one-star experience.

Read More

All About Keyloggers

• in categories: advice • by: Michelle Balestrat

Think of all the things you enter using your keyboard on a daily basis: personal messages, emails, passwords and online shopping details. Unfortunately, a type of malware exists that can jeopardise the privacy of everything you type.

(Image) A close-up, black and white image of a keyboard.

This sort of malware is called a keylogger, and it specialises in recording typed information. A keylogger can be used by hackers, jealous spouses and employees alike – though are most commonly deployed from afar, integrated with and installed alongside other malware types, such as Trojans, rootkits or spyware.

Read on to find out how you can combat this insidious security threat.

Read More

DDoS: Behind the Headlines

• in categories: advice • by: Michelle Balestrat

DDoS. It’s a type of attack that often makes world news, but rarely do we hear it mentioned by name, much less hear about what exactly it is.

Green console text (IP Addresses) on a black screen.

This form of attack is a hacking staple, and perhaps one of the least technically advanced ways to achieve extremely destructive and disruptive results.

So, what is this common attack all about? Read on to find out.

Read More

Boost your breach protection!

Email Watchdog

Guard your online accounts.
  • 10 and 50 email packs available.
  • Detailed breach notifications.
  • Watchdog Update email newsletter.
  • Priority email support.
Learn More

Business Watchdog

Protect your company’s accounts.
  • Protect all email addresses in your domain.
  • Detailed breach notifications.
  • Exclusive access to your domain’s breach status.
  • Watchdog Update email newsletter.
  • Priority Email Support.
Learn More
Previous Page 1 of 17