Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-01-30 20:41:00 UTC
ThreatPost
ThreatPost
Attackers Can Track Kids’ Locations via Connected Watches

A severe flaw exposes sensitive information for 35,000 kids and 20,000 individual accounts.

IoT Mobile Security Privacy Caref Gator GPS Kid Tracking Watches Privilege Escalation Vulnerability Real Time Location Data Sensitive Information
2019-01-30 20:00:00 UTC
Dark Reading
Dark Reading
Iran Ups its Traditional Cyber Espionage Tradecraft

Newly named APT39 hacking team exemplifies Iran's growing sophistication in nation-state hacking operations.

2019-01-30 19:30:00 UTC
Dark Reading
Dark Reading
Yes, You Can Patch Stupid

Before you start calling users stupid, remember that behind every stupid user is a stupider security professional.

2019-01-30 17:00:00 UTC
Dark Reading
Dark Reading
Discover Issues New Cards Following Data Breach

The credit card company reports Discover's card systems were not involved in the breach, discovered in August 2018.

2019-01-30 16:59:00 UTC
ThreatPost
ThreatPost
Stealthy Malware Disguises Itself as a WordPress License Key

A spam injector hides in plain site within WordPress theme files.

Malware Web Security Hide In Plain Sight License Key Malware Obfuscation Spam Injector Sucuri Wordpress Wordpress Theme
2019-01-30 16:53:00 UTC
ThreatPost
ThreatPost
Apple Blasts Facebook Over Data-Sucking ‘Research’ App

Another one of Facebook's apps has been banned from Apple's ecosystem due to the level of data that it collects and how it was distributed.

Mobile Security Privacy Web Security App Privacy Apple Banned Data Collection Enterprise Developer Facebook Facebook Privacy Facebook Research Project Onavo Protect Paid Data Tracking Project Atlas Teens
2019-01-30 16:30:00 UTC
Dark Reading
Dark Reading
Access Control Lists: 6 Key Principals to Keep in Mind

Build them carefully and maintain them rigorously, and ACLs will remain a productive piece of your security infrastructure for generations of hardware to come.before adding them to the toolbox.

2019-01-30 16:30:00 UTC
Dark Reading
Dark Reading
Access Control Lists: 6 Key Principles to Keep in Mind

Build them carefully and maintain them rigorously, and ACLs will remain a productive piece of your security infrastructure for generations of hardware to come.before adding them to the toolbox.

2019-01-30 16:21:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Ep. 017 – DNS hijacking, a weird breach and a cybersecurity confession [PODCAST]

Here's the latest Naked Security podcast - enjoy!

Uncategorized
2019-01-30 15:30:00 UTC
Dark Reading
Dark Reading
Open Source & Machine Learning: A Dynamic Duo

If machine learning can be demonstrated to solve particular use cases in an open forum, more analysts will be willing to adopt the technology in their workflows.

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
21 October 2024
BREACHAWARE HQ
Island Breach Exposure Monitoring