News

Let InnfiRAT In, and Your Passwords and Crypto Wallet Data May Be Stolen screenshot

Let InnfiRAT In, and Your Passwords and Crypto Wallet Data May Be Stolen

You might think that stealing people's money over the internet isn't that hard. You just compromise some credit card details or some online banking credentials, and you're ready to go. The thing is, it's a bit more...

Read more
September 20, 2019
Yahoo Is Finally Paying for the Massive 2012-2016 Data Breach, and You Can Get a Piece of It Too screenshot

Yahoo Is Finally Paying for the Massive 2012-2016 Data Breach, and You Can Get a Piece of It Too

Far too often, when an online service provider loses your data, you have no hope of receiving any sort of compensation for the damage that's been done to you. In most cases, this sort of thing happens to small...

Read more
September 20, 2019
The Hackers Behind the Gootkit Malware Forgot to Secure Their Database with a Password screenshot

The Hackers Behind the Gootkit Malware Forgot to Secure Their Database with a Password

Some people have problems getting their heads around how much damage a cybercrime operation can do. ZDNet's Catalin Cimpanu and SecurityDiscovery.com's Bob Diachenko spent some time looking closely into an...

Read more
September 19, 2019
The Personal Data of the Entire Ecuadorian Population Could Have Been Leaked screenshot

The Personal Data of the Entire Ecuadorian Population Could Have Been Leaked

Some data leaks are bigger and more impactful than others. But how do we classify them exactly? When can a data security incident be considered a massive problem and when is it not that big of a deal? The sense of...

Read more
September 19, 2019
Anyone with an Internet Connection Can Still Access 15,000 Webcams All Across the World screenshot

Anyone with an Internet Connection Can Still Access 15,000 Webcams All Across the World

Many products are put on the market with the idea of improving people's security, and it's always sad to see when one of them has the exact opposite effect. Unfortunately, this isn't such a rare phenomenon. Recently,...

Read more
September 18, 2019
Google Notifies Chromebook Users to Reset their Internal Security Keys screenshot

Google Notifies Chromebook Users to Reset their Internal Security Keys

The invention of Two-Factor Authentication (2FA) was necessitated by the inherent flaws of the traditional username and password system. Security experts have been advocating its use for years, and because of the...

Read more
September 17, 2019
Vulnerable Telnet Services Let Hackers Attack Systems Using Hijacked Radio Devices screenshot

Vulnerable Telnet Services Let Hackers Attack Systems Using Hijacked Radio Devices

Given the popularity of online streaming services that run on more or less any device that connects to the internet, some people might find it hard to believe that companies are selling dedicated IoT radios that...

Read more
September 17, 2019
Security Researchers Expose Sensitive Data via Malware Analysis Sandboxes screenshot

Security Researchers Expose Sensitive Data via Malware Analysis Sandboxes

Security experts at the UK-based threat intelligence company Cyjax have studied data submitted to three of our favorite online malware analysis sandboxes and discovered that much of the publicly accessible information...

Read more
September 17, 2019
Hackers Have Been Using Malicious Websites to Hack iPhones for Years screenshot

Hackers Have Been Using Malicious Websites to Hack iPhones for Years

Your smartphone is your gateway to the virtual world. It's your door to your social platforms, email accounts, entertainment, and information. Unfortunately, it is also a door that can expose you to virtual security...

Read more
September 16, 2019
Yet Another Company Failed to Secure Its Database, and 198 Million Car Buyers Were Exposed screenshot

Yet Another Company Failed to Secure Its Database, and 198 Million Car Buyers Were Exposed

Far too often, high cost is quoted as the main reason for failing to secure people's private data. When organizations suffer a cyberattack, they tend to say that they would have used the right tools and would have...

Read more
September 16, 2019
Your D-Link and Comba Wireless Modems Could Be Leaking Your Passwords. Here's What You Can Do. screenshot

Your D-Link and Comba Wireless Modems Could Be Leaking Your Passwords. Here's What You Can Do.

Take a look at the comments under articles dedicated to vulnerabilities, and you'll see that every now and again, people tend to get annoyed by the amount of attention some security holes receive. Indeed, in many...

Read more
September 16, 2019
Schemers Hide Behind SharePoint to Expose Victims to Phishing Scams screenshot

Schemers Hide Behind SharePoint to Expose Victims to Phishing Scams

We've often said on these pages that in technical terms, phishing is the simplest form of cybercrime. Even so, pulling off a successful phishing attack still requires some preparation, especially if the crooks are...

Read more
September 13, 2019
Hitachi Wants to Replace Passwords with Hand Gestures screenshot

Hitachi Wants to Replace Passwords with Hand Gestures

We all know that the traditional username-and-password authentication system is riddled with faults, and biometrics seems like the most obvious alternative. Unlike passwords, fingerprints and facial features are...

Read more
September 12, 2019
Privacy of 50,000 'Get' Users Compromised Amidst a Data Breach screenshot

Privacy of 50,000 'Get' Users Compromised Amidst a Data Breach

In May 2017, a ticketing platform by the name of Qnect made the news for all the wrong reasons. Qnect's userbase was mostly comprised of Australian students who suddenly started receiving some strange unsolicited...

Read more
September 11, 2019
24 Google Play Apps Found to Distribute the Joker Malware screenshot

24 Google Play Apps Found to Distribute the Joker Malware

According to Google Play, the malicious apps that were designed to infect unsuspecting Android users with the new Joker malware were downloaded a total of 472,000 times. The number does seem relatively high, but we...

Read more
September 11, 2019
The Customers of Foxit Software Are Warned About a Data Breach That Exposed Passwords screenshot

The Customers of Foxit Software Are Warned About a Data Breach That Exposed Passwords

Foxit Software has disclosed that it was recently a victim of a security breach in which private user data was left unprotected with an unknown third party. The people whose accounts were affected have been contacted...

Read more
September 11, 2019
Shenzhen i365 Tech Sells 600,000 GPS Trackers with '123456' Set as the Default Password screenshot

Shenzhen i365 Tech Sells 600,000 GPS Trackers with '123456' Set as the Default Password

In August 2018, the State of California passed a bill which is supposed to make Internet of Things (IoT) devices more secure. It has already caused more than a little controversy, with some arguing that lawmakers...

Read more
September 10, 2019
What Is Retadup and How Can It Jeopardize the Security of Your Passwords? screenshot

What Is Retadup and How Can It Jeopardize the Security of Your Passwords?

Retadup is one of the malware families that has never really managed to catch the attention of mainstream media the way Trickbot has, for example. This seems a bit strange because while it has never really been the...

Read more
September 5, 2019