If You Have a ShopBack Account, Change Your Password Now
ShopBack, a cash reward platform that is used by over 5 million customers in the Asia-Pacific region, suffered a cyberattack and is now urging all its users to change their passwords as soon as possible. The platform... Read more
The Infamous LiveJournal Breach Aided Cybercriminals in Credential Stuffing Attacks for Years
Although data breaches can look the same from afar, they are more like snowflakes. Unique and pretty much unpredictable every time. Some are big, and some are small. Some are discovered right away, and others are... Read more
Watch Out for Fake VPN Update Alerts That Were Set up to Steal Your Office 365 Password
Are you still working from home? If your home is still the only office that you visit these days, you probably use a VPN to connect to your work databases remotely. Although working from home seems like a cozy and... Read more
Fake O2 Texts Phish for Victim Credentials
A new text-based scam is making the rounds in the UK. Potential victims of the scam receive fake text messages that pose as official communication from British telecom company O2, asking users to update billing... Read more
What to Do If You Are Using a D-Link Router That Has Been Found to Be Vulnerable?
Many users buy Wi-Fi routers, install them, and then forget about their existence until the Internet connection gets lost or they need to look up the Wi-Fi password. However, the fact that many users do so does not... Read more
Uh-Oh! TikTok's Multi-Factor Authentication Can Be Bypassed in Browsers
TikTok is still going strong despite the tension surrounding the app's future in the USA. However, there's a significant issue with one great security feature the app added in August. Tiktok's mult-factor... Read more
'CallStranger' Vulnerability Found in Most IoT Devices Gives Cybercriminals Advantages
Researchers warn users about a security vulnerability that may affect billions of IoT (Internet of Things) devices around the world. It is known as the CallStranger vulnerability, and, according to cybersecurity... Read more
Users Receive iCloud Breach Calls: Why Apple Does Not Announce Its Security Breach
It is known that the faster users who are affected by a data breach learn about it, the quicker they can take actions that would prevent hackers from misusing the possibly leaked data. It is a common practice for... Read more
Have You Made Sure That Your Google Home Is Secure?
People love modern gadgets. It doesn't matter if the gadget in question is a new smartphone that has marginally better hardware than your previous one, a new virtual reality headset that makes you feel just a bit less... Read more
Over 500k ArbiterSports Accounts Allegedly Breached
ArbiterSports is an application and a service used by sports officials in college, school and youth football in the USA. According to reports, the platform has been breached and 500 thousand user accounts have been... Read more
Modern Hardware Can Generate Billions of Passwords In Seconds - What Can You Do?
Nowadays credential theft through all sorts of attack vectors happens on a daily basis. Exposed, unsecured databases leak passwords, hackers breach even above-average defenses and obtain passwords in bulk, people are... Read more
What Is Google Prompt’s Two-Step Authentication and Should You Employ It?
How many Google accounts do you have? How many devices do you have connected to each account? Remember all those security emails that ask, “Is this you?” They are being sent out for a reason, as personal accounts and... Read more