Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-06-25 13:37:00 UTC
The Daily Swig
The Daily Swig
Using the ATT&CK framework to discover exploit dependency chains

Finding dependencies between adversary techniques can allow security teams to better optimize their defenses, according to Mitre Corporation’s Andy Applebaum

2019-06-25 12:03:00 UTC
HackRead
HackRead
10 risky apps that you need to monitor on your kids’ smartphone

By Owais Sultan

Parents should know if their under 18 child has these apps on their smartphone – No underage child should use these apps. Apart from being a great invention, smartphones are also taken as a most apt tool for killing time. Kids between the age of 11-19 spend 90 percent of their times on their cell […]

This is a post from HackRead.com Read the original post: 10 risky apps that you need to monitor on your kids’ smartphone

Cyber Crime Privacy Scams And Fraud Bullying Cyber Bullying Fraud Internet Pedophiles Scam Security
2019-06-25 12:03:00 UTC
HackRead
HackRead
9 risky apps that you need to monitor on your kids’ smartphone

By Owais Sultan

Parents should know if their under 18 child has these apps on their smartphone – No underage child should use these apps. Apart from being a great invention, smartphones are also taken as a most apt tool for killing time. Kids between the age of 11-19 spend 90 percent of their times on their cell […]

This is a post from HackRead.com Read the original post: 9 risky apps that you need to monitor on your kids’ smartphone

Cyber Crime Privacy Scams And Fraud Bullying Cyber Bullying Fraud Internet Pedophiles Scam Security
2019-06-25 11:31:00 UTC
The Daily Swig
The Daily Swig
State-sponsored hacking campaign targets global telcos

Operation Soft Cell said to impact millions Millions of consumers have had their phone records and identities compromised as part of an advanced nation-state hacking campaign that has been targeting g

2019-06-25 11:22:00 UTC
Naked Security | Sophos
Naked Security | Sophos
WeTransfer sends user file links to wrong people

Popular file transfer service WeTransfer faces embarrassment this week after admitting that it had mailed file links to the wrong users.

Data Loss Privacy Security Threats Data Loss Encryption File Transfer WeTransfer
2019-06-25 10:48:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Presidential text alerts are open to spoofing attacks, warn researchers

Researchers have shown that it’s technically possible for hackers to target the US Presidential text Alerts system to send fake messages.

Government Security Security Threats Vulnerability Alerts Federal Emergency Management Agency (FEMA) Presidential Alerts Spoofing Text Message Wireless Emergency Alerts (WEA)
2019-06-25 10:47:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Government agencies still send sensitive files via hackable .zips

Senator Ron Wyden has written to NIST asking for guidance and training for government staff in how to share files securely.

Cryptography Government Security Security Threats .zip Files Encryption Espionage File-sharing Hack Back Nist Sharing Files Weak Encryption ZIP
2019-06-25 10:46:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Cop awarded $585K after colleagues snooped on her via license database

Krekelberg alleged that 58 fellow officers broke a federal privacy law by searching for her driver’s license data without any reason.

Law & Order Privacy Amy Krekelberg Data Access DPPA Driver Privacy Protection Act Lawsuit License Databases Minnesota Police St. Paul
2019-06-24 22:45:00 UTC
Dark Reading
Dark Reading
DDoS-for-Hire Services Doubled in Q1

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring