Back t o home

Frequently Asked Questions

How does LoginAlarm work?

When you use LoginAlarm’s free scan service, your email address will be checked against our database of known hacks, breaches and password leaks. When a new breach has been found and confirmed, we will notify you through permission-based web push notifications on your browser. At that point, you should scan again to see if your account has been compromised. In addition to notices of data breaches and security incidents, we will occasionally provide you with recommendations on securing and protecting your accounts through our partners. In the event that a breach is found containing your data, you should take extra precaution and change the password on any other sites that you use the same login email and password on.

Why should I use LoginAlarm?

Want to know when hackers have stolen your login information? If so, you need LoginAlarm. Hacks and data breaches happen more often than most people are aware of. LoginAlarm checks your email address to see if it is part of any data breach we have in our database. If your information is exposed, your login information and other important personal identifying information is available to hackers and others with potentially malicious intent. Also, because it’s so important for you to know as quickly as possible, we recommend you to enable our push notification service so you are aware whether it is a high priority problem that needs your attention NOW.

How does LoginAlarm know when my account is compromised?

LoginAlarm crawls the dark corners of the web to find when a hacker has dumped information from a breach or is attempting to sell your login information. When a breach is verified as real, we immediately notify you through our push notification service. However, you need to opt in the push notification first.

How will LoginAlarm notify me?

We will notify you by sending a push notification to your web browser or mobile browser or by sending you an email. We have found this to be the most effective way of getting people's attention in an urgent situation, such as when hackers have stolen sensitive personal information from people.

Do you do anything with the emails I enter for scanning?

Aside from saving your emails in our monitoring database and pushing notifications for new breaches, we keep your emails private and don't ever sell or use your data for other purposes.

What is a breach and where does the data come from?

A breach occurs when a hacker exploits a weaknesses in a website or application illegally and obtains user data. All the data comes from the websites that are compromised when the data has been made publicly available. Why does it become public? Simple. Hackers usually want to advertise proof that they have the data so that they can sell it or otherwise attract attention.

Do you store my information, especially passwords, from the breached site where my account is included?

No. We don't store any of your specific information (e.g. passwords, username, secret questions, etc.) from the breached site. We only store the possible fields that may be extracted by hackers. The sole purpose of LoginAlarm is to map your email address to data breaches and notify you via your computer or mobile browser when a breach has occurred.

How is a breach verified as legitimate?

There are some breaches that are announced by hackers which are just hoaxes. Because of this, there are several things that must be considered to validate a breach as legitimate:

  1. Is the data in the breach searchable in a Google search?
  2. Is the structure consist with the actual and expected data?
  3. Does the hacker show sufficient evidence to demonstrate the attack vector?
  4. Does the hacker have a track record of either reliably releasing breaches or falsifying them?

Do you post or share my personal information to others?

Absolutely not. Your personal information is secure with us and will only be used in daily searches against our database for new breaches.

I have received a lot of notifications after subscribing to LoginAlarm. What should I do?

If you haven’t already, you need to log-in to the sites where your login information was compromised and change your password immediately. If it is available, also enable dual-factor authentication.

We highly recommend using strong, long, and different passwords which includes capital letters, numbers and special characters for each site you use. Worried that you won’t be able to remember the new passwords? Use a password manager like PassPack.

Can I scan multiple email accounts?

Absolutely, yes! You can scan your different email accounts with LoginAlarm either through your mobile device or your PC.