Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-08-12 18:20:00 UTC
Dark Reading
Dark Reading
Security Pros, Congress Reps Talk National Cybersecurity at DEF CON

Cybersecurity and government leaders discussed why Congress is unprepared for a major cyberattack and how the two parties can collaborate.

2019-08-12 18:15:00 UTC
Dark Reading
Dark Reading
More Focus on Security as Payment Technologies Proliferate

Banks and merchants are expanding their payment offerings but continue to be wary of the potential fraud risk.

2019-08-12 17:22:00 UTC
ThreatPost
ThreatPost
Tips for Successful Zero-Trust Implementation

"Never trust, always verify" is a solid security concept -- but it's important to realize that putting it into practice can be complex.

Featured InfoSec Insider Web Security Always Verify Complexity David Cannelos Ericom Implementation Micro-segmentation Never Trust Remote Browser Isolation Security Model Tips Zero Trust
2019-08-12 15:42:00 UTC
ThreatPost
ThreatPost
Black Hat 2019 News Wrap: The Best and Worst of the Show

Threatpost breaks down the highs and lows from Black Hat 2019, from new vulnerabilities and industry collaboration to a scandal around a sponsored session.

Black Hat Mobile Security Podcasts Vulnerabilities Apple Apple Bug Bounty Black Hat 2019 Bug Bounty DEF CON Encryption Exploit IoT Microsoft Time Ai Top News Vulnerability
2019-08-12 15:07:00 UTC
ThreatPost
ThreatPost
Gamers Beware: Zero-Day in Steam Client Affects All Windows Users

An elevation-of-privilege bug allows attackers to run any program on a target machine with high privileges.

Vulnerabilities Web Security Felix HackerOne Privilege Escalation Steam Steam Client Unpatched Valve Windows Windows Registry Zero Day
2019-08-12 15:04:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Hacking 4G hotspots – when did you last update?

Your 4G hotspot might seem very basic and low risk compared to your phone, but you need to keep it patched just as carefully!

Vulnerability Hotspot Vulnerability Wi-fi
2019-08-12 14:00:00 UTC
Dark Reading
Dark Reading
6 Security Considerations for Wrangling IoT

The Internet of Things isn't going away, so it's important to be aware of the technology's potential pitfalls.

2019-08-12 11:44:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Apple will hand out unlocked iPhones to vetted researchers

It formalizes the reality: "pre-jailbroken" iPhones were already on the black market.

Apple Black Hat IOS Mobile Operating Systems Security Threats Vulnerability Bounties Dev-fused IPhone Ethical Hackers Hackerone Ios IOS Security Research Device Program IPhones Jailbroken MacOS
2019-08-12 11:34:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Facebook facial recognition: class action suit gets court’s go ahead

The court said facial recognition could well harm privacy rights, given its “detailed, encyclopedic, and effortlessly compiled” biometrics collection.

Facebook Law & Order Privacy Biometrics BIPA Court Decision Court Ruling Faceprints Facial Recognition Illinois Patel V. Facebook
2019-08-12 11:07:00 UTC
Naked Security | Sophos
Naked Security | Sophos
GDPR privacy can be defeated using right of access requests

A British researcher has uncovered an ironic, gaping security hole in the EU’s General Data Protection Regulation (GDPR) - right of access requests.

Data Loss GDPR Compliance Privacy Security Threats Black Hat 2019 Data Privacy GDPR General Data Protection Regulation Identity Theft James Pavur Right Of Access Requests

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES