BLOGDOG

Your personal cyber security and anti-hacking news

Internet Security threats that you should worry about

by: Omri Toppol
Why you need the best identity theft protection from LogDog protection app

Welcome to our November “Security Survey” report. Each month, we’ll update you on the latest trends and threats regarding your online security, with findings from over 10,000 user accounts we’ve analyzed. The report also includes a monthly insight and a tip to help you keep your accounts protected from hackers. Read on to find out which account types get hacked the most, what days of the week your accounts are most vulnerable and more.

Facebook undergoes the most hacking attempts

LogDog users have a number of their online accounts monitored, including Facebook, Gmail, Yahoo, Evernote, Dropbox and more. Among these account types, the most common accounts users choose to monitor are Facebook and Gmail. In November, we found that Facebook accounts received almost twice (61%) the number of hacking attempts as Gmail accounts (38%).

Most severe internet security threats come out of the United States

One of the ways LogDog protects your accounts is by tracking “anomaly indicators” – that is, abnormal activity relating to account access. For example, if you’re located in one geography and your account undergoes an entry attempt from a different geography, this could generate a security alert. Our November findings indicate that 63% of the most severe alerts occurred within the United States, a much greater amount than the second highest severe alerts geography, which was India with 21% of the most severe alerts.

Most hacking attempts happen on Tuesday

Our findings show that the average number of hacking attempts varies widely among different days of the week. This month, the majority of hacking alerts occurred on Tuesdays, summing up to 17% of the total weekly alerts. Meanwhile, Fridays enjoyed the fewest alerts, totaling only 12% of the total weekly alerts.

Insight of the month: Third-party apps can access your accounts!


Many LogDog users are surprised to find that third-party applications often have access to their Gmail and other accounts. A large number of access alerts come in from Ashburn, Virginia, which is home to one of Amazon’s larger server farms. This is also where many of the most popular apps are hosted.

LogDog Internet Security Survey - November 2014

LogDog Internet Security Survey – November 2014

Tip: Make sure you review app permissions carefully to understand what information and accounts your apps have access to. Use this link to manage your Google permissions.

Did you enjoy this post? If so, subscribe to get a weekly roundup from BlogDOG.

About LogDog
LogDog acts as your mobile security “watch dog” , providing around-the-clock detection for suspicious activity and unauthorized access to your online accounts. The app requires none of your personal information in order to maintain your privacy and security. When a hacking attack is detected, you immediately receive an intrusion alert, allowing you to take control of your account before it gets hacked.

Written by  Omri Toppol

Omri is LogDog's marketing guy. He is passionate about technology, digital marketing and helping online users to stay safe and secure

« | »

3 thoughts on “Internet Security threats that you should worry about

  1. I have Logdog app installed. I have just had an alert that my Google account has a suspicious IP address. I live in UK but it is showing a suspicious location in Ashburn VA USA. I see that the large data companies are sited here. I assume the Google servers are at these address. Is the Logdog giving me the alert as a false positive? I do have two step authentication on my Google account and I note that on my Google account it does not show my Google account having been accessed from devices I do not know about. Please advise.

    Reply
      1. Hi Chris,

        Indeed many LogDog users are surprised to learn that third party apps ( some running on AWS) were accessing their email accounts and instigating the alerts. You can visit this page to review the apps that are using your credentials, and decide whether or not to revoke access for specific applications.

        Reply

Leave a Reply

Your email address will not be published. Required fields are marked *

Other Posts

Get Protected

Enter your email and receive security updates * 100% privacy guaranteed, we will never spam you.
Mobile Analytics