data breach Tag Archive

BlurPrivacyPrivacy News

Apple Credit Card vs Blur Masked Card

At their March Event, Apple announced the release of their new, privacy-focused credit card. Will this card actually protect your privacy, and are Masked Cards by Blur better? (A little bit, and Yes). Get the ultimate payment privacy with with Blur Unlimited today. Comparing Apple Credit Card and Blur Masked Card Apple Credit Card vs […]

Read More

BlurHacks and Data BreachesPrivacyPrivacy News

Biggest Data Breach in History: Collection #1

In mid-December, over 770 million email addresses and passwords were posted to a popular hacking forum. At 87 GB of data, it is the largest collection of breached data in history. You can stay safe from this and other breaches by using unique, randomly-generated passwords from Blur. What is Collection #1? The breach (now known […]

Read More

BlurDeleteMeHacks and Data BreachesPrivacy

So, what happens if Abine’s servers get hacked?

These days, the next big data breach announcement is seemingly a weekly occurrence. Often, the companies getting hacked and their associated data breaches are a result of lax security protocols, but it increasingly appears that no one is immune to the growing number of threats, sneaky hacks, and unknown vulnerabilities latent everywhere in software running […]

Read More

DeleteMePrivacy

Equifax and why Identity Protection needs to be destroyed and recreated

It’s not just Equifax. The entire industry is full of itself, corrupt, and hawking services with close to zero value. It’s hard to find the perfect words but the best descriptor for current identity protection is probably simple: “insurance fraud”. The problem of managing our identity online is real – we live increasingly digital lives […]

Read More

BlurHacks and Data BreachesPrivacy

How Blur is different from OneLogin (and why your data is safe)

You may have heard about the crack of OneLogin, and that user’s accounts and logins were stolen. Apparently, attackers were able to access OneLogin’s systems and copy encrypted user data as well as the keys required to decrypt that data, giving them access to user’s passwords. (You can read OneLogin’s blog post on this topic.)

Read More