Security

Marketing agency for NFL, Mastercard, MLB and Soundcloud exposes clients’ sensitive data

CyberNews recently discovered that the digital marketing agency teamDigital was exposing multiple environment config files which contain sensitive data. By...
Read more about Marketing agency for NFL, Mastercard, MLB and Soundcloud exposes clients’ sensitive data

Miami-based tech company suffers massive 1TB customer and business data leak

The Miami-based “value-added solutions and technology products” company Intcomex has suffered a major data breach, with nearly 1 TB of...
Read more about Miami-based tech company suffers massive 1TB customer and business data leak

Cybersecurity Awareness Month reminder: Ensure everything connected is protected

Here are a few steps you can take to prevent your smart home from becoming a cyberattack in the waiting....
Read more about Cybersecurity Awareness Month reminder: Ensure everything connected is protected

Crypto exchange leaks every user’s support ticket to every other user

CyberNews recently discovered a bug affecting the cryptocurrency exchange platform Bitexlive in which support tickets were exposed to every visitor...
Read more about Crypto exchange leaks every user’s support ticket to every other user

You need to start taking WFH security seriously. Here’s how

1
Just a few months ago, having WFH in your work calendar was a perk that carried a stigma. Many battled...
Read more about You need to start taking WFH security seriously. Here’s how

What is a brute force attack & how can you prevent it?

Brute force attacks (also called a brute force cracking) are a type of cyberattack that involves trying different variations of...
Read more about What is a brute force attack & how can you prevent it?

The coronavirus continues to be a phishing nightmare

One in five UK businesses report receiving a phishing email.The coronavirus has been unkind to millions of people. We’ve been...
Read more about The coronavirus continues to be a phishing nightmare

10 Best cybersecurity courses online for 2021

4
Few career tracks have the kind of job security and growth potential as cybersecurity. Digital data isn’t going anywhere, and...
Read more about 10 Best cybersecurity courses online for 2021

Cybersecurity for gamers: 3 steps to stay safe

How to stay safe while playing onlineThe gaming industry is a massive contributor to the economy, bigger than most other...
Read more about Cybersecurity for gamers: 3 steps to stay safe

Australian social news platform leaks 80,000 user records

To increase efforts to secure user data, Snewpit will be reviewing “all server logs and access control settings” to confirm...
Read more about Australian social news platform leaks 80,000 user records

Brief history of cybersecurity and hacking

2
Nowadays, we’re all very aware of the risks of cybercriminals and hackers. But the practice is actually much older than our naughties era, and even quite a bit older than the 1995 film Hackers, starring Angelina Jolie.
Read more about Brief history of cybersecurity and hacking

Are encrypted messaging apps really secure?

8
What are the most secure encrypted messaging apps? This is one of the most common questions that users ask when...
Read more about Are encrypted messaging apps really secure?

Hashing vs encryption vs salting: what's the difference?

What are the ingredients of effective cybersecurity? As with most tech verticals, non-techies charged with researching the best options will...
Read more about Hashing vs encryption vs salting: what's the difference?

Car maintenance company leaks 12.7k US phone numbers, emails and MD5 unsalted passwords

The Ukrainian car maintenance company, XADO, has suffered a data breach of its American website, Xado.us, with 12,724 US phone...
Read more about Car maintenance company leaks 12.7k US phone numbers, emails and MD5 unsalted passwords

How governments abuse social media and tech: fake apps and SMS threats

Social media and technology might work as a catalyst for an uprising like the one in Belarus or a revolution...
Read more about How governments abuse social media and tech: fake apps and SMS threats

Monitoring tool abused to spy on victims’ cloud infrastructure

Security researchers observed a group of attackers using a monitoring tool to gain visibility over their victims’ cloud infrastructure. At...
Read more about Monitoring tool abused to spy on victims’ cloud infrastructure

Cybersecurity in the sharing economy

Uber's failure to report a massive data breach in 2016 has, ironically, focused far more attention on the incident than...
Read more about Cybersecurity in the sharing economy

8 best cybersecurity podcasts for 2021

15
Keeping up with cybersecurity news is a full-time job – no one has time to wade through white papers or...
Read more about 8 best cybersecurity podcasts for 2021

Pandemic provides boost to cloud-based security

The COVID-19 pandemic has put a rocket behind the shift towards cloud-based security, as workers have moved en masse from...
Read more about Pandemic provides boost to cloud-based security

College recruitment database leaking nearly 1 million students’ GPAs, SAT scores, IDs, and other personal data

1
We recently discovered an unsecured Amazon S3 (Simple Storage Service) bucket, or database, containing nearly 1 million records of sensitive...
Read more about College recruitment database leaking nearly 1 million students’ GPAs, SAT scores, IDs, and other personal data