Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.
Global News Feed
POPULAR CYBERSECURITY PUBLICATIONSA Spearphone attacker can use the accelerometer in LG and Samsung phones to remotely eavesdrop on any audio that's played on speakerphone, including calls, music and voice assistant responses.
Hack like the GRU
A patch does not yet exist for a critical buffer overflow vulnerability in VLC Media Player that could enable remote code execution.
A patch does not yet exist for a critical buffer overflow vulnerability in VLC Media Player that could enable remote code execution.
At some dark moment, have you ever wondered: what if the programmers are adding the bugs deliberately?
Nations commit to information exchange agreement
A security clanger has been spotted in the current beta version of iOS 13 which allows anyone to access a user’s stored web and app passwords without having to authenticate.
Researchers have created an attack called Spearphone that uses the motion sensors in Android phones to listen to phone calls, interactions with your voice assistant, and more.
A hacking group that distributed files stolen from a Russian contractor to the media last week has published some of the documents online.
APT? French firms are struggling to cope with even unsophisticated threats
BreachAware Insight
THE LATEST CURATED INTEL FROM OUR RESEARCH CENTREListen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.