FEATURED BLOG

AI can crack your passwords. Here’s how Keeper can help.

As AI becomes more advanced, it’s important to consider all the ways AI can be used maliciously by cybercriminals, especially when it comes to cracking passwords. While AI password-cracking techniques...

Continue Reading

Search

Latest Keeper Blogs

Yes, your WiFi provider – also called an Internet Service Provider (ISP) – can see what you search and what sites you visit, even when you’re in incognito mode. The owner of the router will also be able to see what you search in the router logs. Incognito mode only prevents your site visits from

Can WiFi See What You Search on Incognito?

Cybercriminals are using AI to carry out various cyber attacks including password cracking, phishing emails, impersonation and deepfakes. It’s important you understand how cybercriminals are using AI to their advantage so you can better protect yourself and family, as well as your accounts and data. Continue reading to learn about AI-enabled cyber attacks and what

How Cybercriminals Are Using AI for Cyber Attacks

Updated on February 19, 2024. Cybersecurity never sleeps. The threat environment and technologies used to defend against it are constantly evolving, making it imperative for cyber professionals to stay on top of the latest news, information and alerts. In no particular order, here are the top cybersecurity blogs and sites you should be following in

The Best Cybersecurity Blogs and Sites to Follow

Cybercriminals often use phishing emails to get you to click on malicious links or attachments. Clicking on these scams can trigger a malware infection that places all your sensitive data at risk of becoming compromised. Before deciding to click on an attachment, you should make sure it’s safe to open.  You can check if an

How To Check If an Email Attachment Is Safe

Personally Identifiable Information (PII) is any data that can identify a specific individual. Data like your Social Security number allows you to open credit cards, get a loan and more. It’s also data that is vital to keep secure in order to protect your identity and assets.  Read on to learn more about what types

What Is Personally Identifiable Information (PII)?

Hackers steal your passwords through a variety of methods including data breaches, password cracking, guessing, physical theft and malware. This can have serious consequences, especially if the hackers gain access to your accounts, but there are ways to protect yourself.  Read on to learn more about how hackers steal passwords and how to prevent them

How Do Hackers Steal Passwords?

Keeper Security’s Enterprise Password Management (EPM) solution has been recognized as the Overall Leader in password management by the analyst firm GigaOm in their 2023 Radar Report for Password Management.  GigaOm has named Keeper as the overall leader for two years in a row. This designation comes on the heels of similar recognition by G2,

GigaOm Names Keeper Enterprise Password Manager The Overall Leader

There are risks associated with providing your confidential information online, but it’s necessary in a modern world that requires Personally Identifiable Information (PII) to create accounts, purchase goods online, complete your taxes or receive a paycheck. Your data could become vulnerable through no fault of your own. Data breaches are common, and your account information

How to Keep Your Data Safe Online

The main difference between smishing and vishing is that smishing is a phishing attack that uses SMS text message as the contact method and vishing uses voice calls as the contact method.  Research conducted by the FBI’s Internet Crime Complaint Center (IC3) found that phishing, including vishing and smishing, is the most prevalent cyber threat

Smishing vs. Vishing: What’s the Difference?

To stay safe while playing online video games, you should follow cyber hygiene best practices to protect your anonymity. Best practices include using strong passwords, using a VPN and keeping your software updated.  Read our eleven recommendations for keeping sensitive information secure and protecting yourself while playing online games. The Risks of Online Video Games

How to Stay Safe While Online Gaming

Elliptic Curve Cryptography (ECC) is a form of public-key cryptography that is based on the mathematics of elliptic curves. It provides a secure way to perform cryptographic operations such as key exchange, digital signatures and encryption. ECC is an alternative to Rivest-Shamir-Adleman (RSA) encryption, which was first released in 1977. Continue reading to learn more

What is Elliptic Curve Cryptography?

A digital footprint refers to the collection of traceable data left behind by a person’s unique online activities. Everything from your social media posts to your browsing history to your voter registration leave a trail of data that can be used by businesses and people for a variety of purposes – good or bad. The

What Is a Digital Footprint?

There are many cybersecurity threats privileged accounts face including phishing, insider threats, malware and brute force attacks. When privileged accounts aren’t managed or secured properly, all of an organization’s sensitive data is vulnerable to being successfully targeted by threat actors. Continue reading to learn how and why cybercriminals target privileged accounts and how organizations can

Types of Threats Privileged Accounts Face

Keeper Security has been named “Test Winner” in a group test of leading password managers conducted by CHIP Magazine, a leading consumer technology publication in Germany. In the current edition CHIP 06/2023, the CHIP test center reviewed Keeper’s Personal Password Manager in a comparative test of 10 password management solutions. Keeper was awarded first place

Keeper Wins Prestigious CHIP Test of Password Managers

If a scammer knows your email address, you should be extra-vigilant about phishing, and secure all your accounts with strong passwords and Multi-Factor Authentication (MFA). If you suspect a scammer has gained access to your email account, you should take steps with your email provider to secure your account and let all your contacts know

What To Do if a Scammer Has Your Email Address

A pretexting attack is a type of social engineering attack where the threat actor persuades their target into revealing sensitive information or sending them money by making up a story, hence the word “pretext.” Pretexting attacks can come in many different forms including a phone call, text message, email or even in person. Before carrying

What Is a Pretexting Attack?

This month, we are bringing you a number of new features and product updates, including a reboot of Keeper’s Browser Extension for Safari, as well as a Keeper Secrets Manager (KSM) and AWS Key Management Service (KMS) integration and enhancements to the Keeper Connection Manager (KCM) user interface.  Keeper for Safari: Now Available in the

What’s New with Keeper | May 2023

How you use a password manager varies slightly depending on which password manager you have. However, they all have similar functionality. To use a password manager, you first have to set your master password, set up your multi-factor authentication methods, export and import your current passwords, download the necessary apps and create new strong passwords

How To Use a Password Manager

We at Keeper Security are proud to announce that we’ve been recognized by the 2023 Fortress Cybersecurity Awards as the overall winner for Encryption. The Business Intelligence Group conducts the annual Fortress Cybersecurity Awards to recognize experts, engineers, people and products in the field of cybersecurity. The awards “identify and reward the world’s leading companies

Keeper Security Named Winner for Encryption in 2023 Fortress Cybersecurity Awards

Sending sensitive information over the internet is often necessary, despite the risks. You may need to send copies of your passport to validate your employment status at a new job, or you might need to send tax forms with your social security number to your accountant. How can you send this information without making it

What Is the Safest Way To Send Sensitive Documents?

What’s Trending