blog.breachalarm.com
10 Million Usernames & Passwords Spilled by Researcher [Updated]
https://blog.breachalarm.com/10-million-usernames-passwords-spilled-by-researcher
10 Million Usernames and Passwords Spilled by Researcher [Updated]. Feb 11, 2015. If you were sitting on 10 million hacked usernames and passwords, would you show the world? Mark Burnett, an information security researcher hailing from Salt Lake City, Utah, has done just that. To get good, clean and consistent data out in the world so others can find new ways to explore and gain knowledge from it. Detailing the share, Mr. Burnett addressed legal and ethical concerns about his actions. Updated 13 Feb 2015:.
breachalarm.com
Scan Your Business Domain for Email Security Breaches | BreachAlarm
https://breachalarm.com/business
Users had their passwords hacked this past year. How many of your employees were among them? We scan the Internet for stolen password data posted by hackers, and let you know if we spot any of your company’s email addresses in a security breach. Or learn more below! Notify me of password hacks affecting my staff: Business Watchdog Plans and Pricing. Ashley Madison breach contains over 30 Million passwords. Stolen Passwords per Day. Protect Your Company with Business Watchdog. To be notified immediately i...
blog.breachalarm.com
Riskware: What's the Risk?
https://blog.breachalarm.com/riskware-whats-the-risk
Riskware: What's the Risk? Aug 10, 2015. Comes in many different flavours none of which you’re going to want on your machine. However, there’s another type of potential threat. Riskware describes software that’s, well, risky. Much of it is also highly useful, and depending on your needs, uninstalling it might not be an option. While all completely legitimate, the riskware category includes programs that can present a potential threat: their functions can be used for good as well as malicious purposes.
breachalarm.com
Frequently Asked Questions | BreachAlarm
https://breachalarm.com/faq
What will you do with my email address? When you perform a check on our homepage, your email address is used in a single check against our database. We’ll use it to send you a copy of the results of that check, and to follow up with advice on how to protect yourself. You can opt out of receiving these follow-up emails at any time. What is the Email Watchdog? Is this a phishing site and why should I trust it? This website is part of the Avalanche Technology Group. Do you sell or share my email addresses?
breachalarm.com
Recent Data Breach Sources | BreachAlarm
https://breachalarm.com/sources
Know of another hacked database? Let us know on Twitter @breachalarm. Chinese Software Developer Network.
sitthetest.com
Sit the Test
https://sitthetest.com/build
Create Tests or Quizzes, Fast. Create multiple choice quizzes. Test how knowledgable your audience is. Engage people via social media. Build industry reports from your results. Build free tests and quizzes to get feedback on your audience’s proficiency in a particular topic. They can easily share their results via social media. Build tests for recruitment, to test your students or to generate social media awareness. Market Tester Coming Soon. Sign up to our beta program. ABN: 35 227 734 760.
blog.breachalarm.com
How Can You Tell if a Website is Secure?
https://blog.breachalarm.com/how-can-you-tell-if-a-website-is-secure
How Can You Tell if a Website is Secure? Jul 27, 2015. With the ever-increasing amount of fraud online, the pages you visit might not always be as they seem. More than ever, identifying whether or not you’re connected securely to a website has become an essential skill. Thankfully, there’s really not much to it. Once you know what to look for, your trained eye can save you (and your wallet) from a world of hurt. Here’s our guide to sussing out website security like a pro. What’s secure , anyway? What you...
blog.breachalarm.com
BreachAlarm Data Security Blog
https://blog.breachalarm.com/page/2
A Quick Guide to Laptop Security. Jul 7, 2016. While you might think your mobile device needs air-tight security, your laptop is likely to contain even more sensitive information than your phone. Yet, many users are a little too relaxed when it comes to protecting their laptops, perhaps setting a (weak) login password as a token security effort. Are you guilty? Clickjacking: The (Literally) Hidden Threat. Jun 9, 2016. Are you clicking what you think you’re clicking? Clickjacking, also called. May 26, 2016.
blog.breachalarm.com
Security and the Internet of Things
https://blog.breachalarm.com/security-and-the-internet-of-things
Security and the Internet of Things. Jul 23, 2015. Every time you get in a car, you’re putting your life in your own hands. A 2014 Jeep Cherokee, the model used in WIRED Magazine's security experiment. But how about putting it in the hands of the Internet? The latest Jeep hack. Shows that the popularity of Internet-enabled devices now extends to our roads, and it’s not all modern convenience. An Industry in the Slow Lane. Recently, Chinese hackers found themselves able to take command. According to an HP...