Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

8/1/2018
04:00 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

New Chrome Extension Alerts Users to Hacked Sites

HackNotice leverages a database of 20,000 hacks to alert users when a site they visit has been compromised.

A new HackNotice extension for Google Chrome notifies users when websites they access have been recently compromised.

Nobody wants to enter their data on a hacked site but unless they stay current on security news, most people don't know which portals are safe and which are potentially harmful. If they know an organization has been breached, most people choose to take their business elsewhere: a new survey shows half avoid services after a security incident is reported.

HackNotice aims to arm people with more data to make choices about the businesses they use. It was founded by Steve Thomas, former cofounder of credential monitoring service PwnedList and most recently, leader of a third-party risk monitoring team at Security Scorecard. The startup launched in July 2018 to make threat intelligence more accessible to the average user.

Many of the organizations providing breach intelligence cater to businesses, Thomas explains. PwnedList, SecurityScorecard, Shodan, and Metasploit are all examples of innovation intended to protect the enterprise from cyberattacks. Most people don't have access to the same insight.

"A lot of consumers were left in the duct or didn't have any services geared toward them," he says. "I wanted to focus on helping consumers make use of threat intelligence businesses have had access to for a long time. It's really about awareness."

HackNotice users can learn whether their data has been compromised in a breach and access practical advice: how and whether they should reset their password, check their credit card statement, and/or report a stolen card.

Now they can learn whether a website has been recently compromised before they submit any personal information: starting today, HackNotice is rolling out a free Chrome extension designed to alert users when they access a recently hacked site. It's available for public use.

To keep its users updated on recent cyberattacks, HackNotice leverages a database containing 20,000 hack notices and hack reports, Thomas explains. This database powers the Chrome extension, which sits in the background while you browse. If you visit a site that has been hacked within the previous 90 days, the tool will send a notification to let you know.

"If I'm about to buy something from a site and put credit card information in there, I want to know about a recent hack," Thomas says.

HackNotice's breach database is updated daily with newly discovered incidents. Data is pulled from several sources: state government disclosure sites, privacy rights website, news media. Hacks are reviewed and verified manually before they're added to the database, which contains both new cyberattacks and new information on earlier attacks, he adds.

It's worth noting that 90 days is the extension's default timeframe for alerting users to recent hacks. You can adjust the tool to display notifications on a site regardless of when it was hacked, an option Thomas points out was not the default as he didn't want to overwhelm users.

"Unfortunately, a lot of sites have had at least one hack in the last 10 years," he says. If they prefer, users may also create a "watchlist" to keep them updated on frequently visited sites.

"We are starting with Chrome, but we are absolutely open to other browsers," says Thomas of plans for the future. "We've already planned out how to release the extension for Firefox, so assuming there is a demand that would be our next browser."

He's also brainstorming ways to bring HackNotice's info into users' daily lives. The focus is less on getting people to visit the site, and more about integrating hack data into their activity. For example, one idea is to create a stock ticker that shows recent breaches along with stock data.

Related Content:

 

 

 

Black Hat USA returns to Las Vegas with hands-on technical Trainings, cutting-edge Briefings, Arsenal open-source tool demonstrations, top-tier security solutions and service providers in the Business Hall. Click for information on the conference and to register.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
fredheen
50%
50%
fredheen,
User Rank: Apprentice
8/8/2018 | 5:59:05 AM
experience
I know a lot about hacking so it means a lot for me. 
The Security of Cloud Applications
Hillel Solow, CTO and Co-founder, Protego,  7/11/2019
US Mayors Commit to Just Saying No to Ransomware
Robert Lemos, Contributing Writer,  7/16/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "SpearPhish! Everyone out of the office!"
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-1919
PUBLISHED: 2019-07-17
A vulnerability in the Cisco FindIT Network Management Software virtual machine (VM) images could allow an unauthenticated, local attacker who has access to the VM console to log in to the device with a static account that has root privileges. The vulnerability is due to the presence of an account w...
CVE-2019-1920
PUBLISHED: 2019-07-17
A vulnerability in the 802.11r Fast Transition (FT) implementation for Cisco IOS Access Points (APs) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected interface. The vulnerability is due to a lack of complete error handling conditi...
CVE-2019-1923
PUBLISHED: 2019-07-17
A vulnerability in Cisco Small Business SPA500 Series IP Phones could allow a physically proximate attacker to execute arbitrary commands on the device. The vulnerability is due to improper input validation in the device configuration interface. An attacker could exploit this vulnerability by access...
CVE-2019-1940
PUBLISHED: 2019-07-17
A vulnerability in the Web Services Management Agent (WSMA) feature of Cisco Industrial Network Director (IND) could allow an unauthenticated, remote attacker to gain unauthorized read access to sensitive data using an invalid X.509 certificate. The vulnerability is due to insufficient X.509 certifi...
CVE-2019-1941
PUBLISHED: 2019-07-17
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability exists because th...