© 2022 CyberNews - Latest tech news,
product reviews, and analyses.

If you purchase via links on our site, we may receive affiliate commissions.

Security

Monitoring tool abused to spy on victims’ cloud infrastructure

Security researchers observed a group of attackers using a monitoring tool to gain visibility over their victims’ cloud infrastructure. At...
Read more about Monitoring tool abused to spy on victims’ cloud infrastructure

Cybersecurity in the sharing economy

Uber's failure to report a massive data breach in 2016 has, ironically, focused far more attention on the incident than...
Read more about Cybersecurity in the sharing economy

8 best cybersecurity podcasts for 2021

15
Keeping up with cybersecurity news is a full-time job – no one has time to wade through white papers or...
Read more about 8 best cybersecurity podcasts for 2021

The man behind The Daily Mail attack: only the criminal’s imagination is what’s stopping them from doing anything they want

The Daily Mail journalists, willingly hacked by the CyberNews team, said they were alarmed by the results. The ethical hacker...
Read more about The man behind The Daily Mail attack: only the criminal’s imagination is what’s stopping them from doing anything they want

Pandemic provides boost to cloud-based security

The COVID-19 pandemic has put a rocket behind the shift towards cloud-based security, as workers have moved en masse from...
Read more about Pandemic provides boost to cloud-based security

College recruitment database leaking nearly 1 million students’ GPAs, SAT scores, IDs, and other personal data

1
We recently discovered an unsecured Amazon S3 (Simple Storage Service) bucket, or database, containing nearly 1 million records of sensitive...
Read more about College recruitment database leaking nearly 1 million students’ GPAs, SAT scores, IDs, and other personal data

The Daily Mail asked us to hack their journalists. Here's what went wrong

The CyberNews team conducted an ethical hacking experiment in collaboration with The Daily Mail that involved trying to hack three...
Read more about The Daily Mail asked us to hack their journalists. Here's what went wrong

How to avoid data breaches

Mistakes cost big money. A data breach can be a costly situation – and not just in terms of the...
Read more about How to avoid data breaches

Online marketing company exposes 38+ million US citizen records

Following the 350 million email leak covered by CyberNews earlier in August, this is the second time this summer we encountered an Amazon bucket owned by an unidentified party and containing massive amounts of user data.
Read more about Online marketing company exposes 38+ million US citizen records

Why you shouldn’t throw away your broken IP camera

Despite numerous reports about the vulnerabilities of internet protocol (IP) cameras, they continue being entry points for malicious actors. Recent...
Read more about Why you shouldn’t throw away your broken IP camera

How cyberattacks happen: A tale of three major cyber breaches

Here’s what went wrong – and what to avoid. Cyberattacks can strike seemingly from nowhere, but they all require some...
Read more about How cyberattacks happen: A tale of three major cyber breaches

We hijacked 28,000 unsecured printers to raise awareness of printer security issues

13
Cybersecurity experts at CyberNews hijacked close to 28,000 unsecured printers worldwide and forced them to print out a guide on...
Read more about We hijacked 28,000 unsecured printers to raise awareness of printer security issues

Cybersecurity teams need a commercial mindset as we develop the ‘new normal’

The Covid-19 pandemic has created huge pressures for businesses across the world as they strive to retain some semblance of...
Read more about Cybersecurity teams need a commercial mindset as we develop the ‘new normal’

Evan Greer: facial recognition is a uniquely dangerous form of surveillance

6
Companies and governments are eager to get a hold of our sensitive biometric data, and we are not making it...
Read more about Evan Greer: facial recognition is a uniquely dangerous form of surveillance

5 ways security can be built into the customer experience

As cybersecurity becomes a more pressing concern, it’s time to make robust security a central part of product and service...
Read more about 5 ways security can be built into the customer experience

Exposed FCM keys leaves billions of users open to mass spam and phishing notifications

2
The FCM exploit originally discovered by security researcher Abss seems to have hit Microsoft Teams as well....
Read more about Exposed FCM keys leaves billions of users open to mass spam and phishing notifications

Report shows IT professionals are dismayed by today’s security standards

The third-annual Cloud Threat Report from tech giant Oracle and consulting firm KPMG reminds us that even in these disruptive...
Read more about Report shows IT professionals are dismayed by today’s security standards

From BLM to the Belarus Revolution - why is facial recognition so scary?

Police in the US have reportedly used facial recognition technology (FRT) to arrest protestors from the Black Lives Matter movement....
Read more about From BLM to the Belarus Revolution - why is facial recognition so scary?

Most antivirus programs can’t detect new coronavirus malware that steals victims’ money, personal data

Additional reporting by Edvardas Mikalauskas As the COVID-19 pandemic was sweeping the world in spring, staying informed and up-to-date about...
Read more about Most antivirus programs can’t detect new coronavirus malware that steals victims’ money, personal data

Glacier Kwong from Hong Kong: speaking up when you’re being monitored takes a lot of creativity

Hong Kong is nothing more than a Chinese city now, says Glacier Kwong from Keyboard Frontline. She welcomes Google’s decision...
Read more about Glacier Kwong from Hong Kong: speaking up when you’re being monitored takes a lot of creativity