Features of HackNotice
HackNotice is the easiest way to find out when hackers steal your data or leak your identity. Find hacks that you have been a part of, see what hackers know about your identity, and use our security recovery to stop attacks. Let HackNotice monitor your digital life and alert you to new events as soon as they happen.
Use HackNotice to:
Get a timeline of your historical hacks
Find where your digital identity has been leaked
Learn about new hacks and leaks in real-time
Take steps to reduce your risk and increase your security
Stay up to date on what new hacks are happening around the world
Share hack notices with friends so they can secure themselves

The Dashboard
The Dashboard gives you an overview of activities in HackNotice. You can see the sites that you’re monitoring, the hack notices that you’ve received, the identities you’re monitoring, and the identity leaks that you’ve received.
Hack Watchlist
Here you can see all the companies, services and sites that HackNotice monitors for you. You can add a new site here, or add selections from suggested sites. HackNotice checks these sites daily and alerts you of any new hacks.
Hack Timeline
The Hack Timeline is where you can see all of the hack notices that match items in your Hack Watchlist, going back to the earliest detected hack notices in our database. The HackNotice database goes back roughly ten years, with the majority of the hack notices from the last four years.
Hack Notices
When clicking on a notice, you can see the details about your most recent hack notices. You can see which site it was about, when it happened, and more details about the hack. By clicking “Read More” you can go to the news source.
A hack may have exposed your password, personal information, or something potentially even worse, such as a government-issued identity number (Social Security, Driver’s License). You can learn more about each hack notice by reading the description, hack updates, and linked articles.
You can use the Security Recovery checklist to reduce your cyber-security risk from the hack.
When you have completed all of the steps in the Security Recovery checklist, you can mark the hack as fixed, as a way to remind yourself that you have already worked through the checklist.
You can also delete a hack timeline item if after reading the details, you have determined that the hack doesn’t include you or represent a risk to you.
Identities Watchlist
Just like your hack watchlist, the Identities Watchlist shows you all the names, usernames, email addresses, and other identities that HackNotice monitors for you.

Leak Timeline
Leak Notices
Leak Notices tell you about where your identity was found and what other details were found with your identity. Just like a hack notice, you have a series of recovery steps that you can follow to fix a leak.
A leak timeline item is a leak notice that has matched at least one item in your Leak Watchlist.
A leak notice is created when the exact text of one of your identity watchlist items is found in a record leaked in the hacker community.
If the leak matches an email address, you will need to verify that email address before you can see the associated text of the leak.
If the leak matches a free text item (username, phone number, etc), the leak notice determines if there is an email address in the record.
Since digital identities, such as usernames, can be used by multiple people at the same time on different services, we use the email address in the record as the next best unique identifier for the record. If there is an email address in the record, then the leak notice will ask you if you use that email address. If so, you can add that email address to your watchlist, verify the address, and then view the associated text.
By reviewing the source of the record and the associated text, you may be able to narrow down the exact extent that your identity has been exposed. Given the nature of hacker shared information, the exact source may never be known.
You can use the Security Recovery checklist to reduce your cybersecurity risk from the identity leak. When you have completed all of the steps in the Security Recovery checklist, you can mark the identity leak as fixed, as a way to remind yourself that you have already worked through the checklist.
You can also delete the leak notice if after reading the notice, you have determined that the identity in the leak isn’t you, or doesn’t represent a risk to you.

All Hacks
HackNotice has tens of thousands of recorded hacks that you can read and search through. All Hacks is the view where you can see all of the hack notices that we have in our system. New Hack Notices are added to the system throughout the day and are used to create alerts and hack timeline items. It’s a great way to stay up to date on hacks that are happening around the world.
The Search button searches through all of our hack notices in real time, bringing back hack notice relevant to you in seconds.