Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2020-01-17 15:20:00 UTC
Dark Reading
Dark Reading
ADP Users Hit with Phishing Scam Ahead of Tax Season

Fraudulent emails tell recipients their W-2 forms are ready and prompt them to click malicious links.

2020-01-17 14:01:00 UTC
The Daily Swig
The Daily Swig
MITRE launches ATT&CK for industrial control systems knowledge base

First steps in developing critical infrastructure defense methodology

2020-01-17 11:31:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Oracle’s January 2020 update patches 334 security flaws

The January 2020 update featured a joint record of 334 patches, matching an identical number released in July 2018.

Oracle Security Threats Vulnerability #MansionParty Oracle Patch Patch Patching Security Flaws Security Updates Vulnerabilities
2020-01-17 11:24:00 UTC
The Daily Swig
The Daily Swig
Cyber-attack fears growing among business leaders and policymakers

WEF report warns of long-term cybersecurity risk

2020-01-17 11:24:00 UTC
The Daily Swig
The Daily Swig
WEF report: Cyber-attack fears growing among business leaders and policymakers

WEF report warns of long-term cybersecurity risk

2020-01-17 11:13:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Google will now accept your iPhone as an authentication key

Google has updated its Smart Lock to let iOS users security-dongle-ize their iPhones.

2-factor Authentication Android Apple Google Google Chrome IOS Mobile Authentication Keys Bluetooth IPhone IPhones Secure Enclave Secure Enclave Processor SEP SIM Hijacking SIM Jacking Sim Swap SIM Swap Fraud SIM Swaps Smart Lock
2020-01-17 10:59:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Facial recognition is real-life ‘Black Mirror’ stuff, Ocasio-Cortez says

"People think they're going to put on a cute filter and have puppy dog ears, and not realize that that data's being collected."

Law & Order Machine Learning Privacy AI Alexandria Ocasio-Cortez Artificial Intelligence Biometrics Black Mirror Facial Recognition House Oversight Committee House Oversight Committee Hearing Joy Buolamwini Meredith Whittaker Surveillance Willie Lynch
2020-01-17 10:42:00 UTC
Naked Security | Sophos
Naked Security | Sophos
EDRi’s guidelines call for more ethical websites

Recommendations cover areas including security and privacy while listing alternatives to free online services that slurp your users' data.

Privacy EDRi Ethical European Digital Rights Web Developers Web Development Web Ethics Web Guidelines
2020-01-17 00:34:00 UTC
HackRead
HackRead
Hacker uses NSA-reported Windows 10 vulnerability to troll NSA

By Waqas

So this white-hat hacker used the Windows 10 flaw on NSA's official website to troll and expose how critical this flaw it.

This is a post from HackRead.com Read the original post: Hacker uses NSA-reported Windows 10 vulnerability to troll NSA

Hacking News Security GitHub Hacking NSA Security Vulnerability Windows 10
2020-01-16 22:55:00 UTC
Dark Reading
Dark Reading
With International Tensions Flaring, Cyber Risk is Heating Up for All Businesses

Risks of nation-state attacks go beyond Iran, and the need for awareness and security don't stop at any national border.

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES