Disclaimers

  • The purpose of this site is to provide informal cybersecurity reviews. These are not thorough audits and should not substitute for professional consulting.
  • If a website/app has a high score, that doesn't mean that it's "un-hackable"; any computer system can be broken into with enough time and effort.
    • In particular, this grading methodology only covers a few techniques on the user-facing side that an attacker might use to gain access to an account. There are many more hacking techniques that are beyond the scope of this site.
  • These reviews are not endorsements. None of the companies mentioned here have asked or paid money to be featured or to receive a certain score.
  • The opinions expressed on this site are the author's, and do not necessarily reflect the views of any organizations they are now or were previously associated with.
  • Sometimes the site references external articles written by other authors. The views and opinions of those authors are not necessarily the same as those of the Login Score author.
  • Some images on this site have been edited to remove personally identifiable information (PII).
  • Artificial intelligence (AI) has not been used to generate any content on this site.
  • The contents of this site will be periodically updated, but it is possible that there will be some inaccuracies, outdated information, or grading mistakes. Please reach out if you find anything wrong!