The Many Faces of Modern Malware

• in categories: advice • by: Michelle Balestrat

Ever since the dawn of computer programming, there have been those of us who have decided to put their skills to more nefarious uses. In the past century, computer code with an annoying and sometimes destructive payload became known as a ‘computer virus’, sparking public fear and sometimes even mass hysteria – notable examples included Code Red and BugBear, to name a few.

A scary-looking ancient mask bares its teeth at the camera.
Image credit: Wellcome Library, London. Wellcome Images.

While viruses are still truly alive and kicking today, irritating programs have since branched out into countless different forms and specialties and are known collectively as malware. Unlike malicious programs of the past few decades – destructive for their own sake – modern malware is often a key moneymaking tool for scammers and other computer criminals. Its effects can range in severity from the occasional unwanted popup window to outright identity theft.

In this article, we’ll cover the main types of malware that you’ll come across in your use of the Internet. This list is in no way exhaustive, but it should give you a good idea of the security landscape.

Read More

Sticky Password Manager Review

• in categories: review • by: Michelle Balestrat

It’s not often we see social consciousness paired with internet security. However, the gang at Lamantine Software have paired these two unlikely partners in their latest version of Sticky Password.

How? Every Pro license purchase goes toward the conservation of manatees – a truly unique marine species currently under threat of extinction. (We’ll have to add “warm fuzzy feelings” to our list of Pros!)

Sticky Password's Logo'

It’s not just good karma, either: Sticky Password is a rock-solid password manager. Like Dashlane, it aims for a nice middle ground between cloud syncing and keeping control of your own data. Syncing is optional, and you can delete your records from the cloud at any time.

Unlike Dashlane, however, Sticky Password uses a product license model rather than a yearly subscription. So, if flexibility without the yearly pricetag is your thing – keep reading. Sticky Password might be just the ticket.

Read More

Secure Password Hashing... What Is It?

• in categories: advice • by: Michelle Balestrat

Once upon a time in the Internet’s infancy, there lived a simple text document on web servers across the land. It stored all the website’s usernames and passwords in plain text, granting you access to things like guestbooks, bulletin boards, and all those other Y2K goodies.

A crispy potato hash brown
We're not talking about Sunday breakfast.

Fast-forward to today’s information age, and this humble little document has undergone quite an evolution. In the process, it has become a highly sought-after commodity. Each day, hundreds of dollars are exchanged for giant lists of email and password combinations from sites worldwide.

Read More

The All-New BreachAlarm API: It’s Here

• in categories: news • by: Michelle Balestrat

We’re excited to announce the release of an Application Programming Interface (API) for the BreachAlarm service, accessible via Secure HTTP. Our API enables third parties to check the breach status of their email addresses and/or domain names.

Since launching our business product, Business Watchdog last year, customers have been begging us for an API in order to query our database of over 231 million breached records from their own applications. Now, they can.

Read More

Boost your breach protection!

Email Watchdog

Guard your online accounts.
  • 10 and 50 email packs available.
  • Detailed breach notifications.
  • Watchdog Update email newsletter.
  • Priority email support.
Learn More

Business Watchdog

Protect your company’s accounts.
  • Protect all email addresses in your domain.
  • Detailed breach notifications.
  • Exclusive access to your domain’s breach status.
  • Watchdog Update email newsletter.
  • Priority Email Support.
Learn More
Page 14 of 22