Security
Australian social news platform leaks 80,000 user records
To increase efforts to secure user data, Snewpit will be reviewing “all server logs and access control settings” to confirm...
Read more about Australian social news platform leaks 80,000 user records
Brief history of cybersecurity and hacking
Nowadays, we’re all very aware of the risks of cybercriminals and hackers. But the practice is actually much older than our naughties era, and even quite a bit older than the 1995 film Hackers, starring Angelina Jolie.
Read more about Brief history of cybersecurity and hacking
Are encrypted messaging apps really secure?
What are the most secure encrypted messaging apps? This is one of the most common questions that users ask when...
Read more about Are encrypted messaging apps really secure?
Hashing vs encryption vs salting: what's the difference?
What are the ingredients of effective cybersecurity? As with most tech verticals, non-techies charged with researching the best options will...
Read more about Hashing vs encryption vs salting: what's the difference?
Car maintenance company leaks 12.7k US phone numbers, emails and MD5 unsalted passwords
The Ukrainian car maintenance company, XADO, has suffered a data breach of its American website, Xado.us, with 12,724 US phone...
Read more about Car maintenance company leaks 12.7k US phone numbers, emails and MD5 unsalted passwords
How governments abuse social media and tech: fake apps and SMS threats
Social media and technology might work as a catalyst for an uprising like the one in Belarus or a revolution...
Read more about How governments abuse social media and tech: fake apps and SMS threats
Monitoring tool abused to spy on victims’ cloud infrastructure
Security researchers observed a group of attackers using a monitoring tool to gain visibility over their victims’ cloud infrastructure. At...
Read more about Monitoring tool abused to spy on victims’ cloud infrastructure
Cybersecurity in the sharing economy
Uber's failure to report a massive data breach in 2016 has, ironically, focused far more attention on the incident than...
Read more about Cybersecurity in the sharing economy
8 best cybersecurity podcasts for 2021
Keeping up with cybersecurity news is a full-time job – no one has time to wade through white papers or...
Read more about 8 best cybersecurity podcasts for 2021
Pandemic provides boost to cloud-based security
The COVID-19 pandemic has put a rocket behind the shift towards cloud-based security, as workers have moved en masse from...
Read more about Pandemic provides boost to cloud-based security
College recruitment database leaking nearly 1 million students’ GPAs, SAT scores, IDs, and other personal data
We recently discovered an unsecured Amazon S3 (Simple Storage Service) bucket, or database, containing nearly 1 million records of sensitive...
Read more about College recruitment database leaking nearly 1 million students’ GPAs, SAT scores, IDs, and other personal data
The Daily Mail asked us to hack their journalists. Here's what went wrong
The CyberNews team conducted an ethical hacking experiment in collaboration with The Daily Mail that involved trying to hack three...
Read more about The Daily Mail asked us to hack their journalists. Here's what went wrong
Online marketing company exposes 38+ million US citizen records
Following the 350 million email leak covered by CyberNews earlier in August, this is the second time this summer we encountered an Amazon bucket owned by an unidentified party and containing massive amounts of user data.
Read more about Online marketing company exposes 38+ million US citizen records
How cyberattacks happen: A tale of three major cyber breaches
Cyberattacks can strike seemingly from nowhere, but they all require some sort of way in. That can be a vulnerability in a pre-existing system that unsuspecting victims aren’t aware about, or it can be something more circumstantial.
Read more about How cyberattacks happen: A tale of three major cyber breaches
We hijacked 28,000 unsecured printers to raise awareness of printer security issues
Cybersecurity experts at Cybernews hijacked close to 28,000 unsecured printers worldwide and forced them to print out a guide on...
Read more about We hijacked 28,000 unsecured printers to raise awareness of printer security issues
Cybersecurity teams need a commercial mindset as we develop the ‘new normal’
The Covid-19 pandemic has created huge pressures for businesses across the world as they strive to retain some semblance of...
Read more about Cybersecurity teams need a commercial mindset as we develop the ‘new normal’
Evan Greer: facial recognition is a uniquely dangerous form of surveillance
Companies and governments are eager to get a hold of our sensitive biometric data, and we are not making it...
Read more about Evan Greer: facial recognition is a uniquely dangerous form of surveillance
Exposed FCM keys leaves billions of users open to mass spam and phishing notifications
The FCM exploit originally discovered by security researcher Abss seems to have hit Microsoft Teams as well....
Read more about Exposed FCM keys leaves billions of users open to mass spam and phishing notifications
Report shows IT professionals are dismayed by today’s security standards
The third-annual Cloud Threat Report from tech giant Oracle and consulting firm KPMG reminds us that even in these disruptive...
Read more about Report shows IT professionals are dismayed by today’s security standards
Most antivirus programs can’t detect new coronavirus malware that steals victims’ money, personal data
Additional reporting by Edvardas Mikalauskas As the COVID-19 pandemic was sweeping the world in spring, staying informed and up-to-date about...
Read more about Most antivirus programs can’t detect new coronavirus malware that steals victims’ money, personal data