3 Ways to Fight Nuisance Calls

• in categories: advice • by: Michelle Balestrat

Nuisance calls: most of us have had to deal with them. They might be asking us to complete surveys, serving us cold-calling advertising for products we don’t want, or even pretending to be something they’re not.

(Image) A compass on a white background.

Besides being a pure annoyance, they can also pose a tangible risk to your security, with the possibility of voice-recording scams confirmed by security experts.

Want to learn how to preserve your sanity and reduce your risk of being tele-scammed on your mobile? Check out our top 3 recommendations.

Read More

Spotting Tracking Apps

• in categories: advice • by: Michelle Balestrat

Spyware is concerning enough on your laptop or desktop computer, but with GPS capabilities, a wealth of personal information and private messages, it’s an even more terrifying prospect on your mobile device.

(Image) A compass on a white background.

Tracking apps have consistently made headlines in recent years, used by everyone from disgruntled spouses and concerned parents to law enforcement.

However, they can also come packaged with otherwise-desirable apps found on the Google Play and other app stores.

Would you know if you were being tracked? Read on to find out.

Read More

Artificial Intelligence: The Future of Security?

• in categories: advice • by: Michelle Balestrat

No matter how great our defences become, it seems that hackers are always a step ahead. However, with new developments in Artificial Intelligence, could security breaches become a thing of the past?

(Image) A toy robot greets a toy chimp in front of a white background.

Far beyond the simple-to-detect DDOS, new attack technologies now used against websites can be very difficult to differentiate from normal user activity.

Suspicious usage patterns are becoming ever more stealthy, leaving cybersecurity experts worried that we may be nearing the limits of human ability to predict and uncover attacks before they strike.

Read More

How to Secure Your Gaming PC

• in categories: advice • by: Michelle Balestrat

You’ve splashed out on a gaming powerhouse, capable of rendering the latest titles in Ultra. You’ve also got hundreds – even thousands – of dollars and hours invested in your Steam or Origin account.

(Image) A gaming motherboard lit up in blue light.

Sound like you? Congratulations, you’re one of the most sought-after targets for hackers. Online gaming accounts now hold a wealth of personal information, including credit card details and other identifying information.

Read More

Data Breach Notification Laws: Helping Those Most At Risk?

• in categories: advice, news • by: Michael McKinnon (Guest Blogger, CISSP, Sense of Security)

Having private data leaked publicly is annoying when all you need do is change a password, but for some it can be far more serious.

(Image) The pillars of a courthouse.

With Australia, the latest country to add Data Breach Notification laws, we look at the effectiveness of such measures for people at risk of serious harm.

Read More

Boost your breach protection!

Email Watchdog

Guard your online accounts.
  • 10 and 50 email packs available.
  • Detailed breach notifications.
  • Watchdog Update email newsletter.
  • Priority email support.
Learn More

Business Watchdog

Protect your company’s accounts.
  • Protect all email addresses in your domain.
  • Detailed breach notifications.
  • Exclusive access to your domain’s breach status.
  • Watchdog Update email newsletter.
  • Priority Email Support.
Learn More
Page 4 of 22