Blog
The Ledger Database Leak Exposes 272,854 User’s Personal Information
Ledger's database that stores the personal information of thousands of customers has just been published for the whole world to see. Ledger is the largest cryptocurrency hardware wallet company that allows users to manage, store, and sell cryptocurrency. This recent...
Top Online Scams To Watch Out For
We all may know the classic scams like the Nigerian prince asking for money or the window that pops up saying you won $100 dollars. While those scams are certainly still around, cybercriminals are coming up with even more sophisticated scams. As the internet evolves,...
Cyber Threats Increase due to COVID-19
As the coronavirus pandemic rages, another pandemic is taking advantage of the public: cybercrime. Picture this: thousands, if not millions of workers set up on secure wireless connections at work are now sent home. They went home to a network that may or may not be...
Best Practices for Password Security
Passwords are your first line of defense in protecting your private data as compromised credentials are responsible for 81% of hacking-related breaches. The importance of having a secure password is the difference between being hacked in seconds or not at all. Hackers...
Cyberterrorism Is Becoming Everyone’s Nightmare
Hackers are terrorists! Don’t believe me? The definition of a terrorist, according to the Oxford Dictionary, is a person who uses unlawful violence and intimidation, especially against civilians, in the pursuit of political aims. Merriam-Webster defines terrorism as...
Humans Suck At Cybersecurity
As businesses continue to spend upwards of $120 billion on advanced cybersecurity solutions each year ($170 billion projected to be spent by the year 2020) to protect information and sensitive data, it becomes increasingly more disappointing to see how many breaches...
Credential Stuffing: The Threat Your Company Should Be Watching
Credential stuffing is a popular method of cyber attack that may be affecting your company without you ever being aware of it. As the culprit of large data hacks, like Yahoo, who won the title of both being victim of the first and second largest credential spills ever...
Safe Internet Use Tips for Safer Internet Day
There’s a real reason behind the formation of Safer Internet Day. To be blunt, it’s because too many people think they’re immune to cyber threats. Turns out, all of us are targets and any bit of our personal information is useful for a hacker or scammer to figure out how to steal from us. Read these important tips to increase your online safety.
Our Message on Cybersecurity and LeakedSource
As events continue to unfold in the world of cybersecurity, we felt it necessary to share our thoughts and views on the ever-changing landscape of data breach monitoring. It’s a relatively new concept that is seen as controversial, dangerous and in some instances,...
How to Protect Yourself From Cyber Threats This Holiday Season
Only a few weeks away, the holiday spending frenzy is quickly approaching. According to the National Retail Federation, over 56% of American consumers will shop online for the holidays. Adobe predicts Americans will spend over $91 billion this year – an increase of 11% from 2015.
Has Your Email Account Been Hacked?
See if your email has been compromised with the most powerful scan engine.


1881 W Traverse Pkwy Ste E
Lehi, UT 84043
1-800-613-8582
contact@heroic.com