Features of HackNotice

HackNotice is the easiest way to find out when hackers steal your data or leak your identity. Find hacks that you have been a part of, see what hackers know about your identity, and use our security recovery to stop attacks. Let HackNotice monitor your digital life and alert you to new events as soon as they happen.
Use HackNotice to:

  • Get a timeline of your historical hacks

  • Find where your digital identity has been leaked

  •  Learn about new hacks and leaks in real-time

  • Take steps to reduce your risk and increase your security

  • Stay up to date on what new hacks are happening around the world

  • Share hack notices with friends so they can secure themselves

HackNotice Dashboard

The Dashboard

The Dashboard gives you an overview of activities in HackNotice. You can see the sites that you’re monitoring, the hack notices that you’ve received, the identities you’re monitoring, and the identity leaks that you’ve received.

Hack Watchlist

Here you can see all the companies, services and sites that HackNotice monitors for you. You can add a new site here, or add selections from suggested sites. HackNotice checks these sites daily and alerts you of any new hacks.

The Hack Watchlist is where you can add any of the website domains, company names, and applications that you use to a watchlist.
This watchlist is used to find all of the hacks historically that you may have been a part of, along with continuously monitor for new hacks that you are a part of, as they happen.
The more items you add to your watchlist, the more hacks that can be found and put into your hack timeline.
The Search button searches through all of our hack notices in real time, bringing back hack notice relevant to you in seconds.
Hack Watchlist
Hack Timeline

Hack Timeline

The Hack Timeline is where you can see all of the hack notices that match items in your Hack Watchlist, going back to the earliest detected hack notices in our database.  The HackNotice database goes back roughly ten years, with the majority of the hack notices from the last four years.

Each hack notice represents a potential risk to you, depending on the details of the hack and if your information was stolen.
You can see the details of each hack notice by clicking on each item.
Hack Timeline items can either be marked as fixed or not fixed.  You can see all of the fixed hack timeline items by clicking on the “Show fixed items” button.

Hack Notices

When clicking on a notice, you can see the details about your most recent hack notices. You can see which site it was about, when it happened, and more details about the hack. By clicking “Read More” you can go to the news source.

  • Google Hack Notice
  • Marriott Hack Notice

A hack may have exposed your password, personal information, or something potentially even worse, such as a government-issued identity number (Social Security, Driver’s License). You can learn more about each hack notice by reading the description, hack updates, and linked articles.

You can use the Security Recovery checklist to reduce your cyber-security risk from the hack.

When you have completed all of the steps in the Security Recovery checklist, you can mark the hack as fixed, as a way to remind yourself that you have already worked through the checklist.

You can also delete a hack timeline item if after reading the details, you have determined that the hack doesn’t include you or represent a risk to you.

Security Recovery Checklist

Security Recovery

Under the “Read More” section on the hack, you will find security recovery. Every notice has a list of steps that you can follow to reduce your risk and recover from the hack. Once you have completed the steps in the list, you can mark the hack as “fixed.”

Identities Watchlist

Just like your hack watchlist, the Identities Watchlist shows you all the names, usernames, email addresses, and other identities that HackNotice monitors for you.

Examples include names such as John Doe, email addresses such as john@doe.com, usernames such as johndoe123, and any other identifiers that you care about.
This watchlist is used to find all of the identity leaks that have impacted you historically, searching billions of records from the past few years, along with continuously monitor for new identity leaks, as they happen.
The more items you add to your watchlist, the more leaks that can be found and put into your leak timeline.
The Search button searches through all of our records in real time, bringing back your leak notices in seconds.
Identities Watchlist
Leak Timeline

Leak Timeline

The Leak Timeline is where you can see all of the leak notices that match at least one item in your watchlist.
As you add items to your watchlist, you will receive more notices.
Each leak notice represents a potential risk to you.
You can learn more about each leak by reading the leak notice.
Leak Timeline items can either be marked as fixed or not fixed. You can see all of the fixed notices by clicking on the “Show fixed items” button.

Leak Notices

Leak Notices tell you about where your identity was found and what other details were found with your identity. Just like a hack notice, you have a series of recovery steps that you can follow to fix a leak.

A leak timeline item is a leak notice that has matched at least one item in your Leak Watchlist.

Leak Notice

A leak notice is created when the exact text of one of your identity watchlist items is found in a record leaked in the hacker community.

If the leak matches an email address, you will need to verify that email address before you can see the associated text of the leak.

If the leak matches a free text item (username, phone number, etc), the leak notice determines if there is an email address in the record.

Since digital identities, such as usernames, can be used by multiple people at the same time on different services, we use the email address in the record as the next best unique identifier for the record. If there is an email address in the record, then the leak notice will ask you if you use that email address. If so, you can add that email address to your watchlist, verify the address, and then view the associated text.

By reviewing the source of the record and the associated text, you may be able to narrow down the exact extent that your identity has been exposed. Given the nature of hacker shared information, the exact source may never be known.

You can use the Security Recovery checklist to reduce your cybersecurity risk from the identity leak. When you have completed all of the steps in the Security Recovery checklist, you can mark the identity leak as fixed, as a way to remind yourself that you have already worked through the checklist.

You can also delete the leak notice if after reading the notice, you have determined that the identity in the leak isn’t you, or doesn’t represent a risk to you.

All Hacks

All Hacks

HackNotice has tens of thousands of recorded hacks that you can read and search through. All Hacks is the view where you can see all of the hack notices that we have in our system. New Hack Notices are added to the system throughout the day and are used to create alerts and hack timeline items. It’s a great way to stay up to date on hacks that are happening around the world.

The Search button searches through all of our hack notices in real time, bringing back hack notice relevant to you in seconds.

Habits

Habits are the security habits of individuals, where they can let HackNotice know what they have already done (like freeze their credit) and we apply that to all of their alerts automatically.

Security Habits. Here you can set your service wide security habits. If you have completed a security recovery that only needs to happen once, or you always practice a security recover, you can check the box for the habit and that recovery action will be checked for all of your alers system wide. Two Factor Authentications. Monitor Account Activity. Stop using exposed password at all sites / services. Use a unique password per service. Use a firewall and a VPN to protect your device and traffice. Get free credit reports. Freeze your credit reports. Monitor financial account activity closely.
HackNotice Metrics

Metrics

Metrics show individuals their risk over time, how they have recovered from their alerts, and what is still remaining to do.