Avoiding Classic eBay Scams

• in categories: advice • by: Michelle Balestrat

eBay: it’s a world of great deals and often a tempting alternative to paying retail prices. For sellers, it’s also a convenient way to quickly pawn off unwanted items, or even start a small business.

(Image) A computer mouse sit on top of a pile of Euros.
Image Credit: Mike Knell, via Flickr (see footnote).

However, like any marketplace, eBay is also home to a dizzying array of swindles designed to get around the system’s regular safety controls.

Awareness is key, so be on the lookout for these 5 scams that could make your next eBay transaction a one-star experience.

Read More

All About Keyloggers

• in categories: advice • by: Michelle Balestrat

Think of all the things you enter using your keyboard on a daily basis: personal messages, emails, passwords and online shopping details. Unfortunately, a type of malware exists that can jeopardise the privacy of everything you type.

(Image) A close-up, black and white image of a keyboard.

This sort of malware is called a keylogger, and it specialises in recording typed information. A keylogger can be used by hackers, jealous spouses and employees alike – though are most commonly deployed from afar, integrated with and installed alongside other malware types, such as Trojans, rootkits or spyware.

Read on to find out how you can combat this insidious security threat.

Read More

DDoS: Behind the Headlines

• in categories: advice • by: Michelle Balestrat

DDoS. It’s a type of attack that often makes world news, but rarely do we hear it mentioned by name, much less hear about what exactly it is.

Green console text (IP Addresses) on a black screen.

This form of attack is a hacking staple, and perhaps one of the least technically advanced ways to achieve extremely destructive and disruptive results.

So, what is this common attack all about? Read on to find out.

Read More

How To Secure Your Webcam

• in categories: advice • by: Michelle Balestrat

Chances are, you’ve got at least one device with a webcam built-in, or you might have even splashed out on an external one. Either way, they’re great for online conferencing, chatting with family and friends, recording videos, and even logging in with facial recognition.

Close-up of the lens of a webcam.

However, with these extra features come with some added security concerns. It might seem like your paranoia has finally materialised: yes, webcams can be hacked and controlled remotely, allowing others to take a peek at your daily life. And it can happen far easier than you might think.

Even Facebook CEO Mark Zuckerberg has admitted to placing tape over his webcam as a security precaution. As for the rest of us, do we need to go quite so far? Let’s take a look at some less-brutish ways you can secure your webcam.

Read More

How 2FA Can Be Bypassed

• in categories: advice • by: Michelle Balestrat

Two-Factor Authentication: it’s an excellent way to secure your account. (In fact, if you don’t have it, you need it, STAT).

But, like all security measures, it’s only as effective as your own security savviness, and that of the companies you’re trusting with your accounts.

A blister pack of red pills on a white background.

A host of famous YouTube content creators learned this the hard way, beginning with gaming commentator Markiplier back in January 2016, and continuing with many more highly-subscribed channels throughout the year.

In this article, we’ll look at the ways in which the two-factor protection on your accounts can be bypassed – and the sneaky tricks to watch out for.

Read More

Boost your breach protection!

Email Watchdog

Guard your online accounts.
  • 10 and 50 email packs available.
  • Detailed breach notifications.
  • Watchdog Update email newsletter.
  • Priority email support.
Learn More

Business Watchdog

Protect your company’s accounts.
  • Protect all email addresses in your domain.
  • Detailed breach notifications.
  • Exclusive access to your domain’s breach status.
  • Watchdog Update email newsletter.
  • Priority Email Support.
Learn More
Page 6 of 22