News

Change Your DoorDash Password Now Because a Major Data Breach Has Been Discovered screenshot

Change Your DoorDash Password Now Because a Major Data Breach Has Been Discovered

Food delivery network DoorDash announced yesterday that it had suffered a data breach. Those of you who stay up-to-date with cybersecurity news probably aren't especially surprised by the fact that yet another online... Read more

September 27, 2019
YouTube Creators Hit by a Major Account Takeover Attack screenshot

YouTube Creators Hit by a Major Account Takeover Attack

Individual users fall victims to phishing and lose access to their online accounts on a daily basis, and this sort of thing rarely makes the news. When an attack is aimed at some of the most influential names in an... Read more

September 24, 2019
The Personal Data of the Entire Ecuadorian Population Could Have Been Leaked screenshot

The Personal Data of the Entire Ecuadorian Population Could Have Been Leaked

Some data leaks are bigger and more impactful than others. But how do we classify them exactly? When can a data security incident be considered a massive problem and when is it not that big of a deal? The sense of... Read more

September 19, 2019
Vulnerable Telnet Services Let Hackers Attack Systems Using Hijacked Radio Devices screenshot

Vulnerable Telnet Services Let Hackers Attack Systems Using Hijacked Radio Devices

Given the popularity of online streaming services that run on more or less any device that connects to the internet, some people might find it hard to believe that companies are selling dedicated IoT radios that... Read more

September 17, 2019
Yet Another Company Failed to Secure Its Database, and 198 Million Car Buyers Were Exposed screenshot

Yet Another Company Failed to Secure Its Database, and 198 Million Car Buyers Were Exposed

Far too often, high cost is quoted as the main reason for failing to secure people's private data. When organizations suffer a cyberattack, they tend to say that they would have used the right tools and would have... Read more

September 16, 2019
Hitachi Wants to Replace Passwords with Hand Gestures screenshot

Hitachi Wants to Replace Passwords with Hand Gestures

We all know that the traditional username-and-password authentication system is riddled with faults, and biometrics seems like the most obvious alternative. Unlike passwords, fingerprints and facial features are... Read more

September 12, 2019
CafePress Finally Fesses up to the Massive Data Breach screenshot

CafePress Finally Fesses up to the Massive Data Breach

Many people now know that popular t-shirt and merchandise retailer CafePress suffered a major data breach back in early 2019. In July, the followers of a Twitter account going by the name We Leak Info learned about... Read more

September 25, 2019
Hackers That Allegedly Breached the EtherDelta Cryptocurrency Exchange Have Been Charged screenshot

Hackers That Allegedly Breached the EtherDelta Cryptocurrency Exchange Have Been Charged

Data breaches often result in the leaking of phone numbers, but people, in general, don't seem to be too bothered about this particular piece of personal information. They reckon that criminals don't have much use for... Read more

September 24, 2019
Anyone with an Internet Connection Can Still Access 15,000 Webcams All Across the World screenshot

Anyone with an Internet Connection Can Still Access 15,000 Webcams All Across the World

Many products are put on the market with the idea of improving people's security, and it's always sad to see when one of them has the exact opposite effect. Unfortunately, this isn't such a rare phenomenon. Recently,... Read more

September 18, 2019
Security Researchers Expose Sensitive Data via Malware Analysis Sandboxes screenshot

Security Researchers Expose Sensitive Data via Malware Analysis Sandboxes

Security experts at the UK-based threat intelligence company Cyjax have studied data submitted to three of our favorite online malware analysis sandboxes and discovered that much of the publicly accessible information... Read more

September 17, 2019
Your D-Link and Comba Wireless Modems Could Be Leaking Your Passwords. Here's What You Can Do. screenshot

Your D-Link and Comba Wireless Modems Could Be Leaking Your Passwords. Here's What You Can Do.

Take a look at the comments under articles dedicated to vulnerabilities, and you'll see that every now and again, people tend to get annoyed by the amount of attention some security holes receive. Indeed, in many... Read more

September 16, 2019
Privacy of 50,000 'Get' Users Compromised Amidst a Data Breach screenshot

Privacy of 50,000 'Get' Users Compromised Amidst a Data Breach

In May 2017, a ticketing platform by the name of Qnect made the news for all the wrong reasons. Qnect's userbase was mostly comprised of Australian students who suddenly started receiving some strange unsolicited... Read more

September 11, 2019
Do Not Interact with the Fake Instagram 'Copyright Objection Form' Message screenshot

Do Not Interact with the Fake Instagram 'Copyright Objection Form' Message

Phishers seem to be on a roll at the moment, and they appear to be especially interested in social media accounts. We already told you about the campaign that hit a number of popular YouTube content creators, locking... Read more

September 25, 2019
Yahoo Is Finally Paying for the Massive 2012-2016 Data Breach, and You Can Get a Piece of It Too screenshot

Yahoo Is Finally Paying for the Massive 2012-2016 Data Breach, and You Can Get a Piece of It Too

Far too often, when an online service provider loses your data, you have no hope of receiving any sort of compensation for the damage that's been done to you. In most cases, this sort of thing happens to small... Read more

September 20, 2019
Google Notifies Chromebook Users to Reset their Internal Security Keys screenshot

Google Notifies Chromebook Users to Reset their Internal Security Keys

The invention of Two-Factor Authentication (2FA) was necessitated by the inherent flaws of the traditional username and password system. Security experts have been advocating its use for years, and because of the... Read more

September 17, 2019
Hackers Have Been Using Malicious Websites to Hack iPhones for Years screenshot

Hackers Have Been Using Malicious Websites to Hack iPhones for Years

Your smartphone is your gateway to the virtual world. It's your door to your social platforms, email accounts, entertainment, and information. Unfortunately, it is also a door that can expose you to virtual security... Read more

September 16, 2019
Schemers Hide Behind SharePoint to Expose Victims to Phishing Scams screenshot

Schemers Hide Behind SharePoint to Expose Victims to Phishing Scams

We've often said on these pages that in technical terms, phishing is the simplest form of cybercrime. Even so, pulling off a successful phishing attack still requires some preparation, especially if the crooks are... Read more

September 13, 2019
24 Google Play Apps Found to Distribute the Joker Malware screenshot

24 Google Play Apps Found to Distribute the Joker Malware

According to Google Play, the malicious apps that were designed to infect unsuspecting Android users with the new Joker malware were downloaded a total of 472,000 times. The number does seem relatively high, but we... Read more

September 11, 2019
Loading...