Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2019-11-22 13:00:00 UTC
The Daily Swig
The Daily Swig
Cybersecurity becoming top priority in the boardroom, say industry leaders

Security education, regulation, and strategy placed front and center at London business summit

2019-11-22 11:53:00 UTC
ThreatPost
ThreatPost
Google Will Award $1M-Plus to People Who Can Hack Titan M Security Chip

The company expanded its Android bug bounty program as one of several recent moves to ramp up mobile security.

Vulnerabilities Web Security Android Android Security Rewards Bug Bounty Device Security Google Google Play Hackers Mobile Security Pixel Titan M Vulnerabilities
2019-11-22 11:12:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Why do cryptocurrency scams work and how do you avoid them?

What are ICOs, why are they so popular and why do crooks love them so much?

Cryptocurrency Cryptocoin Cryptocurrency Cybercrime Ico Ponzi Scam
2019-11-22 11:12:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Why do cryptocoin scams work, and how to avoid them?

What are ICOs, why are they so popular and why do crooks love them so much?

Cryptocurrency Cryptocoin Cryptocurrency Cybercrime Ico Ponzi Scam
2019-11-22 11:12:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Why cryptocoin scams work, and how to avoid them

What are ICOs, why are they so popular and why do crooks love them so much?

Cryptocurrency Cryptocoin Cryptocurrency Cybercrime Ico Ponzi Scam
2019-11-22 11:11:00 UTC
Naked Security | Sophos
Naked Security | Sophos
Convicted Nigerian fraudster keeps a-fraudin’ from behind bars

He was supposed to be serving a 24-year sentence in the "maximum security" prison, not continuing the fraud... and going to parties.

Law & Order Mobile Contraband Convict Efcc Fraud Hope Olusegun Aroke Mobile Phones Nigeria Prison
2019-11-22 11:06:00 UTC
HackRead
HackRead
Hackers access customer data in latest T-Mobile data breach

By Waqas

This will be the second time when hackers have targeted T-Mobile in two years. Find out what data has been accessed by hackers this time...

This is a post from HackRead.com Read the original post: Hackers access customer data in latest T-Mobile data breach

Cyber Attacks Security Breach Hacking Security T-Mobile Telecom
2019-11-21 22:35:00 UTC
Dark Reading
Dark Reading
Leaks of NSA, CIA Tools Have Leveled Nation-State Cybercriminal Capabilities

The wide availability of tools leaked by the Shadow Brokers and WikiLeaks in 2016 and 2017 have given emerging cyber powers a way to catch up, DarkOwl says.

2019-11-21 22:07:00 UTC
ThreatPost
ThreatPost
Senators Demand Amazon Disclose Ring Privacy Policies

Amazon's Ring data collection policies are in the spotlight.

Government IoT Privacy Amazon Privacy Policy Ring Security Senator Letter
2019-11-21 19:15:00 UTC
ThreatPost
ThreatPost
Microsoft Outlook for Android Bug Opens Door to XSS

Successful exploitation allows attackers to steal potentially sensitive information, change appearance of the web page, and perform phishing, spoofing and drive-by-download attacks.

Mobile Security Vulnerabilities Web Security Cross Site Scripting CVE-2019-1460 Email Spoofing Microsoft Outlook For Android Security Vulnerability XSS

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Point of View

OUR TAKE ON TRENDING STORIES

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
23 December 2024
BREACHAWARE HQ
Power Off Exposure Monitoring