Security Tips for USB Sticks

• in categories: advice • by: Michelle Balestrat

When we think of avoiding malware, we’re often focussed on our online activities. However, this isn’t the only risk to consider.

Close up image of a USB memory stick on a white background.

USB sticks are a convenient way to store vast amounts of data, and allow for quick data transfer between computers without relying on the cloud. They’re cheap and ubiquitous, and many of us have dozens of them. We don’t often don’t even think twice about plugging in a friend’s stick to transfer some files.

A new joint study by Google, the University of Michigan and the University of Illinois performed an interesting social experiment, scattering USB sticks on the ground around campus at Urbana-Champaign. Surprisingly, 48% of the drives were snatched up.

Read More

6 Essential Steps for Safe Mobile Banking

• in categories: advice • by: Michelle Balestrat

Phones have come a long way from the pocket-breaking bricks (and not-so-pocket-sized suitcases!) of yesteryear. Today, we’re using them for just about everything, and our banking habits are seeing a seismic shift towards the convenience of mobile banking.

Close up image of a mobile phone, showing a payment screen.

But is it a security nightmare waiting to happen, or a convenient way to manage and share funds? The answer depends on your security habits. Read on to see if you’re following these 6 essential security tips.

Read More

Typosquatting: The Hidden Security Threat

• in categories: advice • by: Michelle Balestrat

Gooogle, Yahaoo, Facbook…

See what we did there?

A cluster of safety pins spells out 'WWW' on a green background.

Typing errors happen to the best of us. When it comes to typing a website’s address incorrectly, most of the time you’ll know immediately: ending up with an error page, or a parked domain page full of irrelevant advertising.

However, you might also be led to a site that looks exactly like the one you wanted to visit. It’s this last possibility, known as ‘typosquatting’, that poses the biggest threat to your privacy and Internet security.

Read More

Drive-By Downloads: What You Need to Know

• in categories: advice • by: Michelle Balestrat

Image: a neon sign reads "Drive In"

“I never download anything – how could I be at risk?”

Accepting and running a downloaded file is now no longer a necessity: so-called ‘drive by downloads’ have completely changed the way we come into contact with malware.

An era of active content allows us to do incredible things inside our browsers, but the inherent risk now means that even loading a web page or opening an email could be enough to breach your computer’s security.

Read More

Password Alert: Google's Answer to Phishing?

• in categories: advice • by: Michelle Balestrat

Google services (Drive, Docs, YouTube, Calendar and Gmail) are now being used for projects across the board: from work to school, to clubs, hobbies and online courses. For Android users, your Google account can even help you find your phone, back up your photos, and migrate your apps to a new phone.

Image: The Google Chrome store, showing the Password Alert download page.

With this in mind, it’s become very important to make sure we’re not handing our Google account login to one of the many thousands of illegitimate sites around the net.

Read More

Boost your breach protection!

Email Watchdog

Guard your online accounts.
  • 10 and 50 email packs available.
  • Detailed breach notifications.
  • Watchdog Update email newsletter.
  • Priority email support.
Learn More

Business Watchdog

Protect your company’s accounts.
  • Protect all email addresses in your domain.
  • Detailed breach notifications.
  • Exclusive access to your domain’s breach status.
  • Watchdog Update email newsletter.
  • Priority Email Support.
Learn More
Page 8 of 22