Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2020-01-28 17:19:00 UTC
HackRead
HackRead
New report suggests anti-virus firm Avast is selling user data to 3rd parties

By Sudais Asif

It turns out Avast is using your browsing data to make big bucks. Here is what the new documents have revealed...

This is a post from HackRead.com Read the original post: New report suggests anti-virus firm Avast is selling user data to 3rd parties

Privacy Scams And Fraud Surveillance Anti Virus Avast Data Marketing Scam Security
2020-01-28 16:48:00 UTC
Naked Security | Sophos
Naked Security | Sophos
5 ways to be a bit safer this Data Privacy Day

Here are 5 things you can start doing today for your own and for everyone else's online good!

Privacy #DataPrivacyDay Data Privacy Day
2020-01-28 16:06:00 UTC
The Daily Swig
The Daily Swig
Data Privacy Day 2020 – Study highlights long-term benefits of privacy investment

Financial and reputational rewards far outweigh initial outlay, Cisco says

2020-01-28 14:00:00 UTC
ThreatPost
ThreatPost
MTTD and MTTR: Two Metrics to Improve Your Cybersecurity

While there are dozens of metrics available to determine success, there are two key cybersecurity performance indicators every organization should monitor.

Vulnerabilities Web Security Cybersecurity MTTD MTTR
2020-01-28 12:41:00 UTC
The Daily Swig
The Daily Swig
BSides Leeds: Security industry must improve ties with academia

Education, the skills gap, and learning on the job

2020-01-28 12:02:00 UTC
ThreatPost
ThreatPost
LoRaWAN Encryption Keys Easy to Crack, Jeopardizing Security of IoT Networks

New research from IOActive has found that “blindly” trusting the encryption of the widely adopted device protocol can lead to DDoS, sending of false data and other cyber attacks.

IoT Vulnerabilities Critical Infrastructure Cyber Attacks Cybersecurity DDoS Encryption Hackers Healthcare Industrial Control Networks IOActive IoT Security Long Range Wide Area Networking LoRaWAN Networks Network Keys Smart Home
2020-01-28 12:02:00 UTC
ThreatPost
ThreatPost
LoRaWAN for IoT: Beware Encryption Misconfigurations and Security Pitfalls

Researchers warn users not to “blindly” trust the encryption implementations of their LoRaWAN networks.

IoT Vulnerabilities Critical Infrastructure Cyber Attacks Cybersecurity DDoS Encryption Hackers Healthcare Industrial Control Networks IOActive IoT Security Long Range Wide Area Networking LoRaWAN Networks Network Keys Smart Home
2020-01-28 11:02:00 UTC
Naked Security | Sophos
Naked Security | Sophos
States sue over rules that allow release of 3D-printed gun blueprints

The government has flip-flopped, most recently proposing rules that would transfer regulation out of the hands of the State Department.

Law & Order 3d Printed Gun 3d Printing Firearms Ghost Guns Gun Legislation Gun Regulation Lawsuit
2020-01-28 11:00:00 UTC
ThreatPost
ThreatPost
Zoom Fixes Flaw Opening Meetings to Hackers

Zoom has patched a flaw that could have allowed attackers to guess a meeting ID and enter a meeting.

Vulnerabilities Web Security Cpx 360 Teleconference Meeting Web Conferencing Zoom Zoom Flaw
2020-01-28 10:51:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Facial recognition firm sued for scraping 3 billion faceprints

A potential class action says Clearview AI is breaking biometrics privacy law by ransacking social media so police can match photos with IDs.

Facebook Law & Order Machine Learning Privacy Social Networks Twitter AI Artificial Intelligence Biometrics BIPA Class Action Clearview AI David Mutnick Faceprints Facial Recognition Hoan Ton-That Illinois Illinois Biometric Information Privacy Act Law Enforcement Lawsuit Privacy Law Venmo YouTube

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring