Skip to main content

How to know if you’ve been hacked

Hackers and malware are constantly changing. There’s always a new data breach, and sadly, a sucker is born every minute. Sure, cybersecurity professionals combat these threats every day, but is that enough to keep our private information safe? Not all hacks are transparent, and anti-malware doesn’t help us sleep better at night. If a hacker is sniffing around, you need to know. Check out these websites to find out if you’re under attack.

Have I Been Pwned?

Have I Been Pwned website screenshot.
Image used with permission by copyright holder

Have I Been Pwned is one of the oldest, most popular, and best sites in the game. It works hard to track down breaches, verify them as legitimate, and present the data to keep you informed.

The site greets you with a basic search bar and a list of the latest and most significant breaches. Just type in your email address, and the site will search the breached data and showcase any red flags. You can also search for more sensitive breaches, but only after verifying your email address.

The site provides an option to deep link straight to a particular account, so you can instantly bring up results for one specific email address — great for repeated searches. If you sign up for email alerts, you’ll be notified as soon as your email address is found in a new breach, allowing you to change your password immediately.

Have I Been Pwned is a simple tool that still allows for some customization as needed. Moreover, it’s evident that site runner Troy Hunt genuinely cares about this sort of white hat work, as well as educating users on the dangers of data breaches.

You can read more about Troy Hunt and his thoughts on the business.

BreachAlarm

BreachAlarm website screenshot.
Image used with permission by copyright holder

BreachAlarm is an alternative to Have I Been Pwned, giving you another place to check for breaches. Along with its free email-checking service, it also has paid-for notification and protective services.

The $30-per-year subscription is probably more than you need, but if you are looking for a service more oriented toward small businesses or large families, you may prefer BreachAlarm and its highly organized approach to data breaches. There’s also no law against checking multiple hack verification sites just to make sure.

DeHashed

DeHashed website screenshot.
Image used with permission by copyright holder

DeHashed works similarly to other options on this list, but where they focus on email addresses, DeHashed does more. Want to see if your name appears in hacked lists? You can. The site presents a search bar with options to search for your username, IP address, name, address, phone number, and more.

This tool isn’t as easy to use as some of the others. Some search results will be censored unless you purchase one of three subscriptions. Pricing ranges from $5.49 for a single week to $180 for a 12-month subscription. These paid plans include real-time asset monitoring, multiple asset monitoring, unlimited asset searches, and 24/7 customer support.

Sucuri Security Scanner

Sucuri Security Scanner website screenshot.
Image used with permission by copyright holder

Sucuri Security Scanner takes a different approach: It allows you to check an entire site for any sign of bugs, blacklisting, security vulnerabilities, and the presence of hackers. It’s an ideal tool for bloggers and online businesses and should be used alongside other sites that check data for emails and usernames.

Sucuri offers a broader suite of security and malware removal services than most, with fees that reach hundreds per year for the professional options. There’s also an option for a WordPress plugin.

How do these websites work?

Data breaches - information is beautiful infographic showing World's Biggest Data Breaches.
Image used with permission by copyright holder

Hack search sites are a one-stop shop for collecting data from a variety of secondary sources that hackers typically utilize to find and share illicitly acquired content. These secondary sources — Pastebin, individual leakers, dark web forums — can be nefarious, which makes it very easy for enterprising hackers to access passwords and login info from data breaches and try them out.

In contrast to those secondary sources, hack search sites are a means for regular internet users to find out if any open breaches have actually compromised their personal data. If your information is there, you can then change your login data to protect yourself from future trouble.

Be aware of what site you’re using to keep track of your online security because some illegitimate sites use data mining to get your name, email address, and login information to use in future attempts to commit fraud. Others try tools and features that aren’t well-understood and end up creating even more serious data breaches before abruptly collapsing.

To better explain this situation, check out what happened to the once-popular Pwnedlist.

Editors' Recommendations

Topics
Tyler Lacoma
Former Digital Trends Contributor
If it can be streamed, voice-activated, made better with an app, or beaten by mashing buttons, Tyler's into it. When he's not…
WD’s new SSD is the Steam Deck upgrade you’ve been waiting for
The WD Black SN770M hard drive on a Steam Deck.

The SSD upgrade you've been waiting on for the Steam Deck and ROG Ally is here. Western Digital revealed its WD_Black SN770M, which is an M.2 2230 SSD that's built specifically for handheld gaming devices.

The new drive is available in three capacities: 500GB, 1TB, and the coveted 2TB size. It's tough to find M.2 2230 SSDs for the Steam Deck, and even tougher to find them at 2TB. Up to this point, popular options have included the Sabrent Rocket and Corsair MP600. Otherwise, you'd have to stalk retailers like Newegg and Amazon to find a good deal on a Micron drive repurposed from another device.

Read more
The best Ryzen CPU: Which Ryzen processor should you buy?
AMD Ryzen 7 7800X3D held between fingertips.

The best CPUs made by AMD represent excellent value for their money, offering high core counts and blistering clock speeds at reasonable prices. The most recent Ryzen 7000 range includes processors that can go toe to toe with the best from rival Intel. The question is: Which Ryzen CPU should you pick up?

The Ryzen family is broken down into four distinct branches, targeting the entry-level, mainstream, performance, and high-end enthusiast sectors of the market — otherwise known as Ryzen 3, Ryzen 5, Ryzen 7, and Ryzen 9. They're all great chips in their own ways, but some certainly offer more value than others, and for many, the most powerful chips will be complete overkill. Then, there are also the top CPUs for gaming that belong to AMD's 3D V-Cache lineup.

Read more
What is a CPU? Here’s everything you need to know
Heatpaste buildup on a Ryzen 7000 CPU.

If you’re just learning about the world of computers and electronics, the terminology used to refer to different parts can be confusing. One component term you may have encountered is “CPU,” which stands for "central processing unit."

CPUs reside in almost all devices you own, whether it's a smartwatch, a computer, or a thermostat. They are responsible for processing and executing instructions and act as the brains of your devices. Here, we explain how CPUs interact with other parts of your devices and what makes them so integral to the computing process.
What makes a CPU a CPU?

Read more