Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-08-29 15:36:00 UTC
ThreatPost
ThreatPost
Venmo’s Public Transactions Policy Stirs Privacy Concerns

In an open letter, the Mozilla Foundation and EFF scolded Venmo for its data privacy policies, which they say could open the door to stalking and spear-phishing.

Mobile Security Privacy Cyberattacks Data Privacy EFF Friends List Mozilla Phishing Privacy Concerns Privacy Policy Public By Default Social Media Spearphishing Transactions Venmo
2019-08-29 14:50:00 UTC
Naked Security | Sophos
Naked Security | Sophos
S2 Ep6: Instagram phishing, jailbreaking iPhones and social media hoaxes – Naked Security Podcast

New podcast episode available now!

Podcast Naked Security Podcast
2019-08-29 14:50:00 UTC
Naked Security | Sophos
Naked Security | Sophos
S2 Ep6: Instagram phishing, jailbreaking and social media hoaxes – Naked Security Podcast

New podcast episode available now!

Podcast Naked Security Podcast
2019-08-29 14:30:00 UTC
Dark Reading
Dark Reading
Privacy 2019: We're Not Ready

To facilitate the innovative use of data and unlock the benefits of new technologies, we need privacy not just in the books but also on the ground.

2019-08-29 14:30:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Web clickjacking fraud makes a comeback thanks to JavaScript tricks

More than a decade after hitting the headlines, clickjacking fraud remains an under-reported hazard on hundreds of popular websites.

Security Threats Ad Fraud Clickfraud Clickjacking Likejacking UI Redressing
2019-08-29 14:06:00 UTC
ThreatPost
ThreatPost
Critical Cisco VM Bug Allows Remote Takeover of Routers

CVE-2019-12643 has been given the highest possible severity rating.

Uncategorized Authentication Bypass Cisco Code Execution Critical Vulnerability CVE-2019-12643 Full Takeover Remote Attacker REST API Routers Virtual Machine
2019-08-29 13:00:00 UTC
ThreatPost
ThreatPost
Innovation on the Dark Web: How Bad Actors Are Keeping Pace

How criminals have adapted to develop the next generation of dark markets and operations.

Uncategorized Credential Stuffing Dark Web Dark Web Markets Darknet Darknetmarket Mfa MFA Bypass
2019-08-29 13:00:00 UTC
The Daily Swig
The Daily Swig
Bug bounty leaders: Six hackers cross $1m earnings threshold

Millionaire milestones unveiled as HackerOne releases 2019 Hacker-Powered Security Report

2019-08-29 11:36:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Video captures glitching Mississippi voting machines flipping votes

A video that shows an electronic machine switching voters' selections has gone viral, underscoring the need for paper audit trails.

Government Security 2020 Election 2020 US Presidential Election Election Systems And Software Elections Mississippi TSX Voter Fraud Voting Machines Voting Security Voting Systems
2019-08-29 10:58:00 UTC
The Daily Swig
The Daily Swig
People over profits: Reframing corporate responsibility for data breaches

Critics say the Equifax breach settlement is yet another reminder of the failings of data governance laws. Could the tide soon be changing?

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring