Data breaches, malware, ransomware, keyboard registry, and social engineering cause chills among cybersecurity professionals worldwide. Even with countless years of experience, these people still worry about hackers. What can I do to protect myself as an individual? Am I so vulnerable on the net? We will tell you in the next article how to know if you have been hacked, and what you should do next.
The first step in protecting yourself is knowing if there is a problem. Fortunately, there are some useful websites that will give you an idea of whether or not you are under attack.
Have I Been Pwned It is one of the oldest, most popular and best sites of the moment. The site works hard to track hacks, verify them as legitimate, and get data so you can check it. You can read more about the history of the site and Troy Hunt here.
Once you visit the site, you will be greeted with a basic search bar and a list of the latest and greatest attacks. Simply enter your email or username, and the site will search for the attacked data and display the warning signs. You can also search for the most sensitive violations. There is also an option to parse the direct link to a particular account, so you can instantly display the results of a particular email address if you plan to do a lot of repeated searches. And if you sign up to receive email alerts, you will be notified as soon as your email address is found on a new violation, allowing you to quickly change your password before you can be affected.
It is a simple tool that still allows some customization as needed. Also, it goes without saying that Hunt really cares about this kind of job of educating users about the dangers of data breaches.
BreachAlarm is an alternative to Have I Been Pwned, which gives you another place to check for violations. Along with its free email verification service, it also has payment notifications and protection services that you can take advantage of.
There's a $ 30-a-year option but it's probably more than you really need, but if you're looking for a service geared toward small businesses or big families, you might be interested in BreachAlarm and its highly organized approach to data breaches. .
DeHashed works similarly to other options on this list, but they focus on email addresses. Do you want to see if your name appears in a hacked list? You can do it. You could even check if your password is listed, although we do not recommend that you enter your password anywhere other than the login form or a password manager.
This tool is not as easy to use as some of the others unless you pay, and some search results will be limited, but it is comprehensive in ways that the others are not, making it a great alternative tool to see if you account is vulnerable.
Sucuri takes a different approach: it allows you to check an entire site for bugs, blacklists, security vulnerabilities, and the presence of hackers. It is an ideal tool for bloggers and online businesses, but should be used in addition to other sites that check emails and usernames, just to be safe.
Sucuri also offers a broader set of security and malware removal services than most of its rivals, with rates reaching hundreds of dollars a year for career options. There is also an option for a WordPress plugin and a Chrome extension for more consistent monitoring.
How do these websites work?
These hack finders often work by adding data from other commonly used sources to find hacked data and share it with others. These secondary sources (Pastebin, individual filtering, dark web forums) can be nefarious, making it very easy for enterprising hackers to access passwords and log in to information on data breaches and test them. However, hacked search sites use such data cheats as a force forever, allowing you to take a look at the same data breach information and see if their own information is there. If so, you can change your login details to protect yourself from future problems.
Unfortunately, there are so-called "security sites" that ironically just want to collect your email and login information for future fraud attempts. Others test tools and features that are not well understood and end up creating even more serious data breaches before abruptly collapsing. You can read what happened to the once popular Pwnedlist if you need a good example.