Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-10-24 11:26:00 UTC
The Daily Swig
The Daily Swig
Snuffleupagus: Open source security tool hardens PHP sites against cyber-attacks

The successor to Suhosin is protecting sites from the inside

2019-10-24 09:59:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Stalker app maker Retina-X settles FTC charges

It's the first time we've gone after a stalking app, the FTC said. In this case, that would be a stalking app that got breached - twice.

Data Loss Law & Order Malware Privacy Security Threats MobileSpy PhoneSheriff Retina-X Spyware Stalkerware Stalking Apps TeenShield
2019-10-23 20:30:00 UTC
Dark Reading
Dark Reading
FTC Warns Consumers About Stalking Apps

Agency offers tips on how to detect and eradicate the spyware.

2019-10-23 20:05:00 UTC
Ars Technica
Ars Technica
Republicans storm ultra-secure “SCIF,” some with cell phones blazing

Lawmakers flout strict rules designed to prevent eavesdropping by adversaries.

Biz & IT Policy Breach Congress Scif Security Sensitive Compartmented Information Facility
2019-10-23 20:05:00 UTC
Ars Technica
Ars Technica
Republicans storm ultra-secure “SCIF,” some with cell phones blazing [Update]

Lawmakers flout strict rules designed to prevent eavesdropping by adversaries.

Biz & IT Policy Breach Congress Scif Security Sensitive Compartmented Information Facility
2019-10-23 19:18:00 UTC
ThreatPost
ThreatPost
Bedside Hotel Robot Hacked to Stream In-Room Video

An unsecured NFC tag opens a door to trivial exploitation of robots inside Japanese hotels.

Hacks IoT Vulnerabilities Bedside Robot Hack Henn Na His Group Hotel Robots Japan Lance Vick Unsecured Nfc Tag Vulnerability
2019-10-23 18:03:00 UTC
ThreatPost
ThreatPost
Fujitsu Wireless Keyboard Plagued By Unpatched Flaws

Two high-severity vulnerabilities in a Fujitsu wireless keyboard expose passwords and allow keystroke injection attacks.

Hacks IoT Vulnerabilities Encryption Fujitsu Keylogging Keystroke Injection LX390 Password Radio Frequency Vulnerability Wireless Attack Wireless Keyboard
2019-10-23 17:23:00 UTC
The Daily Swig
The Daily Swig
Gone phishing: NCSC hails Active Cyber Defence success

Public and private organizations benefit from far-reaching security initiative

2019-10-23 16:43:00 UTC
ThreatPost
ThreatPost
ThreatList: Google’s Advertising Network Dominates Global Data Collection

With DoubleClick, Analytics and AdWords under its belt, Google continues dominating when it comes to global data collection for advertising, a new report found.

Most Recent ThreatLists Privacy Adsense Advertising Advertising Network AdWords Analytics Aol Advertising Data Collection DoubleClick Google Moat Tracking
2019-10-23 15:45:00 UTC
Dark Reading
Dark Reading
10% of Small Businesses Breached Shut Down in 2019

As a result of cybercrime, 69% of small organizations were forced offline for a limited time and 37% experienced financial loss.

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES