News

Identity Theft at Birth: 752,000 Applications for Copies of Birth Certificates Were Exposed Online screenshot

Identity Theft at Birth: 752,000 Applications for Copies of Birth Certificates Were Exposed Online

Whether we like it or not, online companies of all shapes and sizes handle enormous amounts of personal data. Somewhat predictably, they don't always do it very well. Earlier this month, for example, penetration... Read more

December 17, 2019
You Can Now Use 'Verified SMS' and 'Spam Protection' on Your Android Messages App screenshot

You Can Now Use 'Verified SMS' and 'Spam Protection' on Your Android Messages App

If you think about it, the online threat landscape is, for all intents and purposes, nothing more than a cat and mouse game played by cybercriminals and software vendors' security teams. Here's an example. Some time... Read more

December 17, 2019
If You Are Thinking About Buying Your Kid a Smartwatch from Amazon, You Need to Think Again screenshot

If You Are Thinking About Buying Your Kid a Smartwatch from Amazon, You Need to Think Again

As a part of a penetration testing exercise, researchers from Rapid7 recently ordered three smartwatches from Amazon – the Children's SmartWatch, the G36 Children's Smartwatch, and the SmarTurtles Kid's Smartwatch. As... Read more

December 16, 2019
1 Billion Passwords and Email Addresses Have Been Leaked. What Does That Mean? screenshot

1 Billion Passwords and Email Addresses Have Been Leaked. What Does That Mean?

You hear cybersecurity specialists talk about credential stuffing all the time, but have you ever thought about the pure logistics of pulling off such an attack? Credential stuffing (or password stuffing, as it's... Read more

December 13, 2019
Workstations in a European Airport Found to Be Riddled with Crypto-Miners screenshot

Workstations in a European Airport Found to Be Riddled with Crypto-Miners

When you walk into an airport, you might expect crowds, overworked staff, people who had too much fun with the free perfume samples at a duty-free store, and bad food. And you might be willing to accept it all. It’s... Read more

December 12, 2019
This Phishing Scam Threatens to Hijack Microsoft 365 Accounts Using Fake Voicemails screenshot

This Phishing Scam Threatens to Hijack Microsoft 365 Accounts Using Fake Voicemails

Microsoft 365 had over 155 million business users in 2018, and with its popularity continuously growing, it is no wonder that hackers find it worth their while to attack users of such services. According to... Read more

December 12, 2019
Whoops! Were You One of the 78% of People Who Forgot Their Passwords in the Last Three Months? screenshot

Whoops! Were You One of the 78% of People Who Forgot Their Passwords in the Last Three Months?

We all know that people use weak passwords. This has been the case pretty much ever since the traditional authentication system we all know and hate came to prominence, and for years, the security community has been... Read more

December 11, 2019
Unpatched VPN Flaws Can Help Hackers Attack Enterprises, Warn NSA and NCSC screenshot

Unpatched VPN Flaws Can Help Hackers Attack Enterprises, Warn NSA and NCSC

Investigations by NSA (National Security Agency) and NCSC (National Cyber Security Centre) revealed that particular VPN (Virtual Private Network) services might be under attack from cybercriminal groups known as APT... Read more

December 11, 2019
Do You Know What 2FA Is? 72% of Americans Do Not screenshot

Do You Know What 2FA Is? 72% of Americans Do Not

Whether you have an email account or a social networking account, you have an online identity. It is just as important to protect your online identity as it is your physical identity, and while not every person in... Read more

December 11, 2019
Sweaty Betty Customers Are Warned About a 'Sophisticated Cybersecurity Incident' screenshot

Sweaty Betty Customers Are Warned About a 'Sophisticated Cybersecurity Incident'

Over the last few months, the name 'Magecart' has been used with increasing frequency by cybersecurity experts. The term was actually coined a while ago, and it has now come to be used as a collective name for the... Read more

December 10, 2019
German Researchers Prove That Password-Protected PDF Files Can Be Breached screenshot

German Researchers Prove That Password-Protected PDF Files Can Be Breached

You create a PDF file. You put a password on it to ensure that no one can access the information inside it. You forget about the file and its security, thinking that you are 100% safe. Unfortunately, it was proven by... Read more

December 10, 2019
A Cyber Security Awareness Study Reveals That Most People Find Advanced Security Measures

A Cyber Security Awareness Study Reveals That Most People Find Advanced Security Measures "Inconvenient"

We have covered various topics on cyber security before. For instance, we discussed the differences between cyber security and information security. We also talked about its future. However, we believe it is important... Read more

December 10, 2019
Here's What Happens When a Sprint Contractor Exposes AT&T, T-Mobile, and Verizon Bills screenshot

Here's What Happens When a Sprint Contractor Exposes AT&T, T-Mobile, and Verizon Bills

On its website (which, on an unrelated note, is loaded through HTTP, and not HTTPS), Deardorff Communications, a marketing and communications company based in Georgia, says that its team is highly experienced in a... Read more

December 9, 2019
Let's Bust 10 Myths That Android and iPhone Users Continue to Believe screenshot

Let's Bust 10 Myths That Android and iPhone Users Continue to Believe

How important is your smartphone for you? Do you keep up with your business endeavors using it? Do you mainly use it to communicate with your family and friends? Perhaps it’s a tool for entertainment? Whatever the... Read more

December 9, 2019
FBI Warns That Social Engineering Techniques Could Help Bypass Multi-Factor Authentication screenshot

FBI Warns That Social Engineering Techniques Could Help Bypass Multi-Factor Authentication

A while ago, we talked about how useful Two-Factor Authentication and Multi-Factor Authentication systems can be and how they can help users protect their accounts from hackers. However, with time, cybersecurity... Read more

December 9, 2019
Are You Thinking About Purchasing a Webcam from Amazon? Think Twice screenshot

Are You Thinking About Purchasing a Webcam from Amazon? Think Twice

Many users install webcams in their homes to feel safer or to watch over their kids. However, recent discoveries by Which? (Consumer’s Association based in the United Kingdom) have revealed that many webcams sold on... Read more

December 9, 2019
Students of an Ivy League University Are Bombarded with Fake Job Offers via Phishing Emails screenshot

Students of an Ivy League University Are Bombarded with Fake Job Offers via Phishing Emails

Are you a Dartmouth student? Are you ready to start a career linked to your degree? If you are, you need to look out for phishing emails that might offer high-paying jobs. It is possible that the schemers behind these... Read more

December 6, 2019
A Newly Uncovered WhatsApp Bug Proves That GIFs Are Not So Innocent screenshot

A Newly Uncovered WhatsApp Bug Proves That GIFs Are Not So Innocent

How do you like GIFs? If you’re online every single day, you probably cannot imagine your social media or even your text messaging without them. Maybe you use them as memes. Maybe you attach one to your currency... Read more

December 6, 2019