Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2018-09-26 14:38:00 UTC
HackRead
HackRead
Banking trojan found in call recorder app on Play Store – stole over €10,000

By Waqas

Android is one of the most vulnerable mobile operating systems with hackers developing new Android malware and banking trojan every 17 seconds. Then, there is Google and questionable security measures to protect users from sophisticated and persistent malware attacks. Recently, Lukas Stefanko, an IT security researcher at ESET has discovered a nasty piece of banking trojan targeting […]

This is a post from HackRead.com Read the original post: Banking trojan found in call recorder app on Play Store – stole over €10,000

Android Malware Security Banking Google Hacking Play Store Scan TROJAN
2018-09-26 14:30:00 UTC
Dark Reading
Dark Reading
Owning Security in the Industrial Internet of Things

Why IIoT leaders from both information technology and line-of-business operations need to join forces to develop robust cybersecurity techniques that go beyond reflexive patching.

2018-09-26 14:00:00 UTC
The Daily Swig
The Daily Swig
The long road to freedom: What’s next for Silk Road founder Ross Ulbricht?

Lyn Ulbricht speaks to The Daily Swig about her son’s life in prison and his campaign for clemency.

2018-09-26 13:00:00 UTC
Dark Reading
Dark Reading
Mirai Authors Escape Jail Time - But Here Are 7 Other Criminal Hackers Who Didn't

Courts are getting tougher on the cybercrooks than some might realize.

2018-09-26 13:00:00 UTC
Dark Reading
Dark Reading
Mirai Authors Escape Jail Time – But Here Are 7 Other Criminal Hackers Who Didn't

Courts are getting tougher on the cybercrooks than some might realize.

2018-09-26 12:55:00 UTC
Dark Reading
Dark Reading
USB Drives Remain Critical Cyberthreat

USB thumb drives may be used less frequently than before, but they are still commonly used as infection vectors for a wide variety of malware.

2018-09-26 11:09:00 UTC
The Daily Swig
The Daily Swig
Google defends auto-login revamp amidst privacy storm

Mandatory sign-in – a benign UI feature or an erosion of user privacy?

2018-09-26 09:47:00 UTC
The Daily Swig
The Daily Swig
Australia pushes ahead with anti-encryption bill

… and no one is happy.

2018-09-25 20:45:00 UTC
Dark Reading
Dark Reading
The Cyber Kill Chain Gets A Makeover

A new report demonstrates how the cyber kill chain is consolidating as criminals find ways to accelerate the spread of their targeted cyberattacks.

2018-09-25 20:45:00 UTC
Dark Reading
Dark Reading
The Cyber Kill Chain Gets a Makeover

A new report demonstrates how the cyber kill chain is consolidating as criminals find ways to accelerate the spread of their targeted cyberattacks.

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES