Important: BreachAware does not operate under any other brand name and will never provide unauthorised access to compromised credentials. We ask our users to beware of illegitimate websites imitating BreachAware.

Global News Feed

POPULAR CYBERSECURITY PUBLICATIONS
2018-09-16 16:11:00 UTC
HackRead
HackRead
Medical records & patient-doctor recordings of thousands of people exposed

By Carolina

Another day, another trove of medical records leaked online, thanks to a misconfigured AWS S3 bucket. Medical records are considered to be sensitive documents and when a malicious third party has access to them it is a bad news as these records can be used for fraud, blackmailing and marketing purposes against patients’ will. However, […]

This is a post from HackRead.com Read the original post: Medical records & patient-doctor recordings of thousands of people exposed

Leaks Security Amazon AWS Data LEAKS Medical Privacy Security Vulnerability
2018-09-14 13:53:00 UTC
The Daily Swig
The Daily Swig
‘A major victory for freedom’

Top infosec trends in the media spotlight this week.

2018-09-13 20:26:00 UTC
Ars Technica
Ars Technica
New modification of the old cold boot attack leaves most systems vulnerable

The defenses put in place to thwart the 2008 attack turn out to be very weak.

Tech Cold Boot Hardware RAM Security
2018-09-13 13:08:00 UTC
The Daily Swig
The Daily Swig
Equifax a year on: Little has changed – at least for the billion-dollar company

The Daily Swig examines how the credit broker has recovered from its massive 2017 data breach.

2018-09-13 10:51:00 UTC
The Daily Swig
The Daily Swig
British Airways mega-breach underlines third-party script perils

Payment processing should be isolated from unnecessary code, says expert.

2018-09-12 20:58:00 UTC
Krebs on Security
Krebs on Security
U.S. Mobile Giants Want to be Your Online Identity

The four major U.S. wireless carriers today detailed a new initiative that may soon let Web sites eschew passwords and instead authenticate visitors by leveraging data elements unique to each customer's phone and mobile subscriber account, such as location, customer reputation, and physical attributes of the device. Here's a look at what's coming, and the potential security and privacy trade-offs of trusting the carriers to handle online authentication on your behalf.

A Little Sunshine Security Tools The Coming Storm AT&T International Computer Science Institute Johannes Jaskolski LocationSmart Nicholas Weaver Number Port-out Scams Project Verify Securus Technologies SIM Swap Sprint T-Mobile UC Berkeley Verizon
2018-09-12 15:28:00 UTC
The Daily Swig
The Daily Swig
Keybase browser extension forgoes encryption

Secure messaging app says ’it’s not worth a fix’.

2018-09-12 12:48:00 UTC
The Daily Swig
The Daily Swig
FreshMenu apologizes for keeping quiet over 2016 data breach

‘Trust is integral to the relationship we share,’ says company founder.

2018-09-12 11:00:00 UTC
The Daily Swig
The Daily Swig
Cybercrime pathways: Why do hackers turn to the dark side?

Researchers peel back the stereotypical black hoodie to prevent kids from taking the wrong path.

2018-09-12 08:30:00 UTC
Ars Technica
Ars Technica
Georgia says switching back to all-paper voting is logistically impossible

In Curling v. Kemp, both sides are set to duke it out in court on Wednesday.

Policy Curling Election Kemp Security Voting

BreachAware Insight

THE LATEST CURATED INTEL FROM OUR RESEARCH CENTRE
BreachAware Podcast

Listen to our podcast, where Andrew, the visionary CEO of BreachAware, sits down with unsung heroes of the cyber security industry. Get ready to uncover the stories and insights of industry trailblazers you might not have heard of before, as they share their experiences, opinions, and insider intel. But beware, it's not all serious talk—expect a healthy dose of humour (and the odd cussing) sprinkled throughout the conversation.

Amazon Music Apple Podcasts Spotify Podcast BreachAware YouTube Channel

Weekly Summary

SPOTLIGHT, VULNERABILITY CHAT & PRIVACY HEADLINES
18 November 2024
BREACHAWARE HQ
Spider Breach Exposure Monitoring