Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-07-17 09:58:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Researchers hide data in music – and human ears can’t detect it

It's now possible to secretly transfer data inside music without turning it into unlistenable mush.

Data Transfer Music OFDM Sound Wi-fi
2019-07-17 08:30:00 UTC
HackRead
HackRead
Meet IRpair & Phantom; powerful anti-facial recognition glasses

By Waqas

IRpair and Phantom are the first-ever collections of anti-facial recognition glasses and sunglasses designed to block facial recognition, eye tracking & infrared radiation including 3D IR surveillance cameras during both day and night. Facial recognition technology is the single biggest tool for authorities to keep an eye on suspected (and unsuspected) individuals; but thanks to […]

This is a post from HackRead.com Read the original post: Meet IRpair & Phantom; powerful anti-facial recognition glasses

Privacy Surveillance Technology News Anti-Surveillance Facial Recognition Infrared Security Technology
2019-07-16 19:59:00 UTC
ThreatPost
ThreatPost
LenovoEMC Storage Gear Leaks Sensitive Financial Data

Lenovo patches enterprise and SMB network attached storage devices for a vulnerability that leaked data to the public internet.

Breach Cloud Security Hacks Privacy Vulnerabilities API Application Programming Interface Home Media Network Hard Drive Leaky Storage LenovoEMC NAS Network Attached Storage StorCenter Vulnerability
2019-07-16 18:30:00 UTC
Dark Reading
Dark Reading
FBI Publishes GandCrab Decryption Keys

Publishing the keys should render existing versions of the ransomware far less dangerous for victims.

2019-07-16 18:00:00 UTC
Dark Reading
Dark Reading
How Attackers Infiltrate the Supply Chain & What to Do About It

With some security best practices, enterprises can significantly reduce the chances that a potential supply chain attack will affect business operations.

2019-07-16 17:21:00 UTC
HackRead
HackRead
Hackers used Samsung website to access Sprint’s customer data

By Waqas

Sprint Corporation, an American telecommunications company has announced that it has suffered a data breach after unknown hackers accessed customer accounts credentials using the Samsung.com “add a line” website. Originally, the company was informed about the breach on June 22nd, 2019. The personal information which was accessed in the incident included full names, phone numbers, […]

This is a post from HackRead.com Read the original post: Hackers used Samsung website to access Sprint’s customer data

Security Breach Hacking Samsung Security Sprint
2019-07-16 16:55:00 UTC
ThreatPost
ThreatPost
The Future is Female: A Key to the Cybersecurity Workforce Challenge

With cybersecurity worldwide facing a major applicant shortage, businesses should be courting women and supporting girls.

Webinars Boston University Cybersecurity Cybertech Jobs Gender Diversity Women Workforce Shortage
2019-07-16 16:50:00 UTC
ThreatPost
ThreatPost
WhatsApp, Telegram Coding Blunders Can Expose Personal Media Files

The issue, present on Android versions, is similar to the known man-in-the-disk attack vector.

Malware Mobile Security Privacy Vulnerabilities Attack Vector Developer Practices Exposure Man In The Disk Media File Jacking Media Files Secure Messaging Telegram WhatsApp
2019-07-16 15:34:00 UTC
Krebs on Security
Krebs on Security
Meet the World’s Biggest ‘Bulletproof’ Hoster

For at least the past decade, a computer crook variously known as "Yalishanda," "Downlow" and "Stas_vl" has run one of the most popular "bulletproof" Web hosting services catering to a vast array of phishing sites, cybercrime forums and malware download servers. What follows are a series of clues that point to the likely real-life identity of a Russian man who appears responsible for enabling a ridiculous amount of cybercriminal activity on the Internet today.

Breadcrumbs Ne'er-Do-Well News Web Fraud 2.0 AbdAllah Alexander Alexandrovich Volosovik Alexander Volosovyk Bulletproof Hosting Providers Chronopay Delft University Of Technology Downlow Dutch National High-Tech Crimes Unit Intel471 Jason Passwaters King Saud University MaxiDed Mikhail Rytikov New York University Sosweet Stas_vl@mail.ru Yalishanda
2019-07-16 15:10:00 UTC
Dark Reading
Dark Reading
US Mayors Commit to Just Saying No to Ransomware

The group of more than 1,400 top elected municipal officials takes the admirable, recommended stance against paying ransoms. However, can towns and cities secure their information technology infrastructure to withstand attacks?

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring