Popular websites such as LinkedIn and DropBox are often the target for black hat hackers for the purposes of capturing important user data such as emails, usernames, passwords, birthdays, SSNs and such. This user data is then sold on the dark web to others to be used for more sophisticated targeted breaches against those users or companies they work for. Find out if any emails associated with you personally or your company have been compromised. A report will be generated from the submitted email address showing associated past breaches.
BlackHat Hacker: is a hacker who “violates computer security for little reason beyond maliciousness or for personal gain”… Black hat hackers are the stereotypically illegal hacking groups often portrayed in popular culture, and are “the epitome of all that the public fears in a computer criminal”. Black hat hackers break into secure networks to destroy, modify, or steal data, or to make the networks unusable for authorized network users. Learn More
Dark Web: is the World Wide Web content that exists on darknets, overlay networks that use the Internet but require specific software, configurations or authorization to access. The dark web forms a small part of the deep web, the part of the Web not indexed by web search engines, although sometimes the term deep web is mistakenly used to refer specifically to the dark web. Learn More
Data Breach: A data breach is a security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so. Learn More