Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-12-24 14:00:00 UTC
ThreatPost
ThreatPost
The Case for Cyber-Risk Prospectuses

Cyber-disclosure statements noting how long a company can go without a breach can help customers understand the reality of cyber-incidents and their exposure to loss.

Hacks InfoSec Insider Cyber Risk Data Breach Information Security Maturity Infosec Insider Jack Freund Prospectus Risk Exposure Risklens
2019-12-24 12:38:00 UTC
Naked Security | Sophos
Naked Security | Sophos
What a decade! Our baddest stories and biggest lessons, year by year…

From the bizarre, through the crazy, all the way to the outright impossible - there's still plenty to learn from all of these stories.

Security Threats Cybersecurity Decade
2019-12-24 12:33:00 UTC
HackRead
HackRead
Here is a list of top 25 worst passwords of 2019

By Waqas

If your password is on the list, the risk of having your account hacked and identity stolen is high.

This is a post from HackRead.com Read the original post: Here is a list of top 25 worst passwords of 2019

Security Dark Web Passwords Privacy Security
2019-12-24 11:30:00 UTC
The Daily Swig
The Daily Swig
Ransomware attacks prompt push for US schools cybersecurity bill

We do need an education With schools across the US increasingly falling prey to ransomware attacks, two US senators are calling for the Department of Homeland Security (DHS) to create a set of guideli

2019-12-24 05:00:00 UTC
Dark Reading
Dark Reading
[Just Released] How Enterprises are Attacking the Cybersecurity Problem

Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.

2019-12-23 19:29:00 UTC
ThreatPost
ThreatPost
Twitter Fixes Bug that Enabled Takeover of Android App Accounts

Twitter for Android users are urged to update their app to fend off a security bug that allows hackers to access private account data and control accounts to send tweets and direct messages.

Hacks Vulnerabilities Android Android KitKat Android Lollipop KitKat Twitter Twitter Bug Twitter For Android
2019-12-23 19:24:00 UTC
HackRead
HackRead
Apple Bug bounty: Earn big backs for hacking iPhone & other products

By Waqas

Hack iPhone and earn big bucks the right way.

This is a post from HackRead.com Read the original post: Apple Bug bounty: Earn big backs for hacking iPhone & other products

Apple News IPad IPhone Security Technology News Apple Apple Watch Bug Bounty IPhone X MacOS Security
2019-12-23 17:43:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Serious Security: The decade-ending “Y2K bug” that wasn’t

We explain why you really need to RTFM. Even if TFM is very long and complicated and you are very experienced.

Vulnerability Bug Code Review Java Serious Security Testing Y2k
2019-12-23 16:15:00 UTC
Dark Reading
Dark Reading
Former NY Hospital Employee Admits to Stealing Colleagues' Data

Richard Liriano pleads guilty to compromising hospital computers and co-workers' email accounts, as well as stealing personal files and photos.

2019-12-23 15:40:00 UTC
HackRead
HackRead
ToTok app caught spying on millions of Android & iPhone users

By Waqas

It's time to delete the ToTok app right now!

This is a post from HackRead.com Read the original post: ToTok app caught spying on millions of Android & iPhone users

Privacy Surveillance Android IOS IPhone Play Store Scam Security Spying ToTok UAE

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES