Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-03-08 11:08:00 UTC
Naked Security | Sophos
Naked Security | Sophos
For sale: Gray-market iPhones that yield secrets to encryption

The prototype iPhones are slipping out of Apple's supply chain with disabled security, to the delight of researchers and jailbreakers.

Apple Cryptography IOS Mobile Vulnerability Black Hat Dev-fused IPhones Encryption IPhone IPhones Jailbreaking SEP Supply Chain Zero Days
2019-03-08 11:08:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Developer-only iPhones help reveal Apple’s secret security sauce

The prototype iPhones are slipping out of Apple's supply chain with disabled security, to the delight of researchers and jailbreakers.

Apple Cryptography IOS Mobile Vulnerability Black Hat Dev-fused IPhones Encryption IPhone IPhones Jailbreaking SEP Supply Chain Zero Days
2019-03-08 11:07:00 UTC
The Daily Swig
The Daily Swig
Low-hanging fruit: Cybercriminals increasingly targeting small businesses

New threat intel indicates a 400% surge in data breaches last year

2019-03-07 23:10:00 UTC
Dark Reading
Dark Reading
Phishing Attacks Evolve as Detection & Response Capabilities Improve

Social engineering scam continued to be preferred attack vector last year, but attackers were forced to adapt and change.

2019-03-07 21:11:00 UTC
ThreatPost
ThreatPost
RSA Conference 2019: Firms Continue to Fail at IoT Security

IoT is growing more popular in the home - and so too are the attacks that target these devices featuring valuable data, researchers said at RSA 2019.

Hacks IoT Videos AEG Smart Scale Iot Hack IoT Security Smart Home Smart Scale
2019-03-07 21:11:00 UTC
ThreatPost
ThreatPost
RSA Conference 2018: Firms Continue to Fail at IoT Security

IoT is growing more popular in the home - and so too are the attacks that target these devices featuring valuable data, researchers said at RSA 2019.

Editor's Picks Hacks IoT Videos AEG Smart Scale Iot Hack IoT Security Smart Home Smart Scale
2019-03-07 21:01:00 UTC
ThreatPost
ThreatPost
RSA Conference 2019: Ultrasound Hacked in Two Clicks

In a proof-of-concept hack, researchers penetrated an ultrasound and were able to download and manipulate patient files, then execute ransomware.

Hacks Privacy RSAC Check Point Data Breach Healthcare IoT Medical Devices Patient Records Proof Of Concept Hack RSA 2019 Ultrasound
2019-03-07 17:00:00 UTC
ThreatPost
ThreatPost
RSAC 2019: For Domestic Abuse, IoT Devices Pose New Threat

When it comes to domestic abuse, smart products around the house are turning into new threats, a panel of experts said at RSA.

IoT RSAC Connected Thermostat Nest Privacy RSA RSAC 2019 Smart Home Tech
2019-03-07 17:00:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Unclosable browser popup! 13-year-old charged for sharing code

She didn't create it, but she allegedly shared it. That's enough to get in trouble in Japan, with its history of being tough on cyber crime.

Law & Order Web Browsers Browser Popups Japan Malicious Code Schoolgirl
2019-03-07 16:44:00 UTC
Naked Security | Sophos
Naked Security | Sophos
NSA might shut down phone snooping program, whatever that means

We've heard this tale before. This time, it was mentioned by a congressional aide. Also, the NSA released Ghidra, a free reverse-engineering tool.

Government Security Law & Order Privacy Edward Snowden FISA Ghidra Github Luke Murry National Security Agency NSA Open-source Reverse Engineering RSA Conference Section 215 Section 702 Surveillance Tool USA Freedom Act USA Patriot Act

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring