Hackers and malware are always changing. There is always a new data breach and unfortunately a sucker is born every minute. Sure, cybersecurity experts fight these threats every day, but is that enough to keep our private information safe?
Not all hacks are transparent, and antimalware doesn't help us sleep better at night. If a hacker is snooping around, you need to know. Check these websites to see if you are under attack.
Have I Been Pwned is one of the oldest, most popular, and best in the game. It is difficult to track down violations, verify them as legitimate, and present the data to keep you informed.
The site greets you with a simple search bar and a list of the latest and greatest violations. Just enter your email address and the website will search the breached data and display all the red flags. You can also check for more sensitive violations, but only after checking your email address.
The website offers the ability to deep link directly to a specific account so you can instantly see results for a specific email address – ideal for repetitive searches. When you sign up for email notifications, you will be notified whenever your email address is found in a new violation so you can change your password immediately.
Have I Been Pwned is a simple tool that allows you to make some adjustments if necessary. Additionally, it is evident that the site runner Troy Hunt really cares about this type of white hat work and educates users about the dangers of a data breach.
You can read more about Troy Hunt and his thoughts on business.
BreachAlarm is an alternative to Have I Been Pwned, and it gives you another place to look for violations. In addition to the free email verification service, the company also offers paid notification and protection services.
The $ 30 per year subscription is probably more than you need. However, if you're looking for a service that's more geared towards small businesses or large families, you might prefer BreachAlarm and its highly organized approach to data breaches. Also, there is no law against checking multiple websites for hack checking just to make sure.
DeHashed works similarly to other options on this list, but when they focus on email addresses, DeHashed offers more. Would you like to see if your name appears in Chopped Lists? You can. The site offers a search bar with options for searching by username, IP address, name, address, phone number, and more.
This tool is not as easy to use as some others. Some search results will be censored unless you purchase one of three subscriptions. Prices range from $ 5.49 for a single week to $ 180 for a 12 month subscription. These paid plans include real-time asset monitoring, multiple asset monitoring, unlimited asset search, and 24/7 customer support.
Security Scanner takes a different approach: you can scan an entire site for signs of bugs, blacklisting, security vulnerabilities, and the presence of hackers. It is an ideal tool for bloggers and online businesses and should be used in conjunction with other websites that check data for emails and usernames.
Sucuri offers a wider range of security and malware removal services than most. The fees for the professional options are hundreds per year. There's also an option for a WordPress plugin and a Chrome extension for more consistent monitoring.
How do these websites work?
Hack search pages usually work by aggregating data from other sources that are commonly used to find hacked data and share with others. These secondary sources – pastebin, single leaks, dark web forums – can be nefarious, making it very easy for enterprising hackers to access and try out data breach passwords and credentials.
However, hack search sites use such data tricks as a driving force so you can take a look at the same data breach information and see if your information is there. If so, you can change your credentials to protect yourself from future problems.
Unfortunately, there are "security pages" that ironically only want to collect your email and login information for future fraud attempts. Others try tools and features that are not well understood and end up causing even more serious data breaches before collapsing abruptly.
You can read what happened to the once popular Pwnedlist if you need an example.