Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2018-11-06 13:54:00 UTC
HackRead
HackRead
Best Anonymization Tools and Techniques for 2019

By David Balaban

Anonymizers are tools that ensure the anonymity of web surfing. They are also used to circumvent the web filters and local legislative restrictions\blocking of websites. Some types of anonymizers (VPN) may also encrypt your traffic. This article discusses how anonymizers are used and what types of anonymizers are there. Introduction These days browsers are open […]

This is a post from HackRead.com Read the original post: Best Anonymization Tools and Techniques for 2019

Privacy Security Anonymity Anonymizers Proxy Security Technology Tor VPN
2018-11-06 13:27:00 UTC
ThreatPost
ThreatPost
Apache Struts Warns Users of Two-Year-Old Vulnerability

Users must update their vulnerable libraries manually.

Vulnerabilities Apache Apache Struts Critical Vulnerability Remote Code Execution Vulnerability
2018-11-05 22:38:00 UTC
Dark Reading
Dark Reading
'Trump' Tops Election-Spam Subject Lines

Fake email messages - aka spam - contain the President's name in 2,811% of median message sampling.

2018-11-05 21:27:00 UTC
ThreatPost
ThreatPost
Online Radio Stations at Risk from Icecast Flaw

A buffer overflow bug could silence online stations.

Vulnerabilities Web Security Buffer Overflow CVE-2018-18820 Icecast Online Radio Station Streaming Platform Vulnerability
2018-11-05 19:10:00 UTC
Dark Reading
Dark Reading
7 Non-Computer Hacks That Should Never Happen

From paper to IoT, security researchers offer tips for protecting common attack surfaces that you're probably overlooking.

2018-11-05 17:59:00 UTC
ThreatPost
ThreatPost
Newsmaker Interview: Tom Kellermann on Hacking the Midterm Elections

Concerns over midterm election tampering reach a boiling point in the days leading up to actual voting.

Breach Critical Infrastructure Government Hacks Newsmaker Interviews Privacy Midterm Elections U.S. Elections
2018-11-05 17:56:00 UTC
ThreatPost
ThreatPost
PortSmash Side-Channel Attack Siphons Data From Intel, Other CPUs

An exploit was released for a flaw existing in a process in CPUs called Simultaneous Multithreading (SMT).

Hacks Vulnerabilities AMD CPU CVE-2018-5407 Data Hyper Threading Intel Meltdown Side-channel Side-channel Attack SMT Spectre TLBleed
2018-11-05 17:51:00 UTC
ThreatPost
ThreatPost
Passwords: Here to Stay, Despite Smart Alternatives?

"Password-killing" authentication efforts may be on a road to nowhere.

Breach Cloud Security Cryptography IoT Privacy Web Security Alternatives Authentication Biometrics Fido Password Password Killer Passwords In Use Troy Hunt Webauthn
2018-11-05 15:30:00 UTC
Dark Reading
Dark Reading
After the Breach: Tracing the 'Smoking Gun'

Systems, technology, and threats change, and your response plan should, too. Here are three steps to turn your post-breach assessment into a set of workable best practices.

2018-11-05 14:41:00 UTC
The Daily Swig
The Daily Swig
Australian shipbuilder Austal hit by data breach

Company said it will not respond to attackers’ extortion attempts.

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
16 September 2024
BREACHAWARE HQ
Toilet Breach Exposure Monitoring