A Quick Guide to Laptop Security

• in categories: advice • by: Michelle Balestrat

While you might think your mobile device needs air-tight security, your laptop is likely to contain even more sensitive information than your phone.

A laptop sits unlocked on a desk, showing graphs and other personal data.

Yet, many users are a little too relaxed when it comes to protecting their laptops, perhaps setting a (weak) login password as a token security effort. Are you guilty? Read on.

Read More

Clickjacking: The (Literally) Hidden Threat

• in categories: advice • by: Michelle Balestrat

Are you clicking what you think you’re clicking? A little-known type of security exploit should make you think twice.

A mouse cursor hovers over a large red 'Download' button on a deep blue background.

Clickjacking, also called UI redressing or IFrame Overlay, is a type of attack in which a button or field is overlaid by invisible malicious scripts or links.

For example, a popup ad might leave you desperate to click the “X” without pause – but this innocuous “X” button could be overlaid with a script to download a Trojan.

Read More

Ride Sharing Apps and Your Privacy

• in categories: advice • by: Michelle Balestrat

Love them or loathe them, ridesharing apps like Lyft and Uber have rapidly transformed the way we get around.

The side of a car as it drives down a highway. The side mirror is in the foreground.

In busy cities and towns, getting a lift anytime, anywhere has proven an irresistible premise to the devotees of these services, despite many controversies over privacy and real-time location data collection.

This week, we’ll look at what kind of privacy concerns affect ridesharing apps, and what ridesharing converts can do to reduce their risk.

Read More

Point of Sale Breaches: What To Do If You're Affected

• in categories: advice • by: Michelle Balestrat

If you’ve gone shopping with a credit card, you’ve used a Point of Sale (POS) System. While we might only associate online shopping with potential risks to our bank account, in-person shopping with a credit card can also put you at risk.

A pair of scissors cut through two credit cards, in front of a white background.

This is because POS systems are common targets for data breaches, resulting many millions of credit card details becoming compromised each year. Even the largest and most trusted retailers, for example Target, Home Depot, McDonalds and countless others, have fallen prey to these attacks. So, how does a POS breach take place? Read on to find out.

Read More

Boost your breach protection!

Email Watchdog

Guard your online accounts.
  • 10 and 50 email packs available.
  • Detailed breach notifications.
  • Watchdog Update email newsletter.
  • Priority email support.
Learn More

Business Watchdog

Protect your company’s accounts.
  • Protect all email addresses in your domain.
  • Detailed breach notifications.
  • Exclusive access to your domain’s breach status.
  • Watchdog Update email newsletter.
  • Priority Email Support.
Learn More
Page 7 of 22