Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-08-12 11:44:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Apple will hand out unlocked iPhones to vetted researchers

It formalizes the reality: "pre-jailbroken" iPhones were already on the black market.

Apple Black Hat IOS Mobile Operating Systems Security Threats Vulnerability Bounties Dev-fused IPhone Ethical Hackers Hackerone Ios IOS Security Research Device Program IPhones Jailbroken MacOS
2019-08-12 11:34:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Facebook facial recognition: class action suit gets court’s go ahead

The court said facial recognition could well harm privacy rights, given its “detailed, encyclopedic, and effortlessly compiled” biometrics collection.

Facebook Law & Order Privacy Biometrics BIPA Court Decision Court Ruling Faceprints Facial Recognition Illinois Patel V. Facebook
2019-08-12 11:07:00 UTC
Naked Security | Sophos
Naked Security | Sophos
GDPR privacy can be defeated using right of access requests

A British researcher has uncovered an ironic, gaping security hole in the EU’s General Data Protection Regulation (GDPR) - right of access requests.

Data Loss GDPR Compliance Privacy Security Threats Black Hat 2019 Data Privacy GDPR General Data Protection Regulation Identity Theft James Pavur Right Of Access Requests
2019-08-12 11:01:00 UTC
The Daily Swig
The Daily Swig
Wicked6: Infosec esports competition spotlights women in the workforce 

‘We have reached a point where cyber competitions can move beyond traditional exercises to being on par with esports’

2019-08-11 18:00:00 UTC
ThreatPost
ThreatPost
DEF CON 2019: Picture Perfect Hack of a Canon EOS 80D DSLR

Session shows how researchers found multiple vulnerability in Canon firmware that can be used in a malware attack.

Black Hat Hacks IoT Vulnerabilities Canon EOS 80D DSLR DEF CON Picture Transfer Protocol Ransomware
2019-08-10 23:45:00 UTC
ThreatPost
ThreatPost
Driver Disaster: Over 40 Signed Drivers Can’t Pass Security Muster

Dozens of insecure drivers from 20 vendors illustrate widespread weaknesses when it comes to kernel protection.

Hacks Malware Vulnerabilities ASUS BIOS CPU DEF CON Driver Security Gigabyte LoJax Microsoft MSI Rootkit Slingshot Windows
2019-08-10 21:00:00 UTC
ThreatPost
ThreatPost
DEF CON 2019: New Class of SQLite Exploits Open Door to iPhone Hack

Researchers exploit a SQLite memory corruption issue outside of a browser.

Black Hat Hacks Mobile Security Check Point Contact Database Def Con 2019 Ios Iphone IPhone Hack Memory Corruption New Attack Vectors Privilege Escalation SQLite
2019-08-10 13:00:00 UTC
ThreatPost
ThreatPost
DEF CON 2019: MacOS Gets a Malware Beatdown in Attack Demo

Patrick Wardle proves that signature-based anti-malware protection on Macs is woefully inadequate when fending off modern attacks.

Black Hat Hacks Malware Backdoor CreativeUpdate Cryptominer Def Con 2019 FruitFly Implant KeyRanger Mac MacOS Malware Olympic Destroyer Patrick Wardle Ransomware Windtail
2019-08-09 20:45:00 UTC
Dark Reading
Dark Reading
State Farm Reports Credential-Stuffing Attack

The insurer has informed customers a third party used a list of user IDs and passwords to attempt access into online accounts.

2019-08-09 20:18:00 UTC
ThreatPost
ThreatPost
Hack of High-End Hotel Smart Locks Shows IoT Security Fail

LAS VEGAS –  A vulnerability in a popular IoT lock key – used chiefly by a high-end hotel in Europe – allowed researchers to break into hotel rooms. The locks in question are dubbed “mobile keys” because of their reliance on mobile phones as opposed to card-based access such as those based on mag-strips and […]

Black Hat Hacks IoT

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring