Security
How governments abuse social media and tech: fake apps and SMS threats
Social media and technology might work as a catalyst for an uprising like the one in Belarus or a revolution...
Read more about How governments abuse social media and tech: fake apps and SMS threats
Monitoring tool abused to spy on victims’ cloud infrastructure
Security researchers observed a group of attackers using a monitoring tool to gain visibility over their victims’ cloud infrastructure. At...
Read more about Monitoring tool abused to spy on victims’ cloud infrastructure
Cybersecurity in the sharing economy
Uber's failure to report a massive data breach in 2016 has, ironically, focused far more attention on the incident than...
Read more about Cybersecurity in the sharing economy
8 best cybersecurity podcasts for 2021
Keeping up with cybersecurity news is a full-time job – no one has time to wade through white papers or...
Read more about 8 best cybersecurity podcasts for 2021
Pandemic provides boost to cloud-based security
The COVID-19 pandemic has put a rocket behind the shift towards cloud-based security, as workers have moved en masse from...
Read more about Pandemic provides boost to cloud-based security
College recruitment database leaking nearly 1 million students’ GPAs, SAT scores, IDs, and other personal data
We recently discovered an unsecured Amazon S3 (Simple Storage Service) bucket, or database, containing nearly 1 million records of sensitive...
Read more about College recruitment database leaking nearly 1 million students’ GPAs, SAT scores, IDs, and other personal data
The Daily Mail asked us to hack their journalists. Here's what went wrong
The CyberNews team conducted an ethical hacking experiment in collaboration with The Daily Mail that involved trying to hack three...
Read more about The Daily Mail asked us to hack their journalists. Here's what went wrong
Online marketing company exposes 38+ million US citizen records
Following the 350 million email leak covered by CyberNews earlier in August, this is the second time this summer we encountered an Amazon bucket owned by an unidentified party and containing massive amounts of user data.
Read more about Online marketing company exposes 38+ million US citizen records
How cyberattacks happen: A tale of three major cyber breaches
Cyberattacks can strike seemingly from nowhere, but they all require some sort of way in. That can be a vulnerability in a pre-existing system that unsuspecting victims aren’t aware about, or it can be something more circumstantial.
Read more about How cyberattacks happen: A tale of three major cyber breaches
We hijacked 28,000 unsecured printers to raise awareness of printer security issues
Cybersecurity experts at Cybernews hijacked close to 28,000 unsecured printers worldwide and forced them to print out a guide on...
Read more about We hijacked 28,000 unsecured printers to raise awareness of printer security issues
Cybersecurity teams need a commercial mindset as we develop the ‘new normal’
The Covid-19 pandemic has created huge pressures for businesses across the world as they strive to retain some semblance of...
Read more about Cybersecurity teams need a commercial mindset as we develop the ‘new normal’
Evan Greer: facial recognition is a uniquely dangerous form of surveillance
Companies and governments are eager to get a hold of our sensitive biometric data, and we are not making it...
Read more about Evan Greer: facial recognition is a uniquely dangerous form of surveillance
Exposed FCM keys leaves billions of users open to mass spam and phishing notifications
The FCM exploit originally discovered by security researcher Abss seems to have hit Microsoft Teams as well....
Read more about Exposed FCM keys leaves billions of users open to mass spam and phishing notifications
Report shows IT professionals are dismayed by today’s security standards
The third-annual Cloud Threat Report from tech giant Oracle and consulting firm KPMG reminds us that even in these disruptive...
Read more about Report shows IT professionals are dismayed by today’s security standards
Most antivirus programs can’t detect new coronavirus malware that steals victims’ money, personal data
Additional reporting by Edvardas Mikalauskas As the COVID-19 pandemic was sweeping the world in spring, staying informed and up-to-date about...
Read more about Most antivirus programs can’t detect new coronavirus malware that steals victims’ money, personal data
Netflix is a phishing goldmine for cybercriminals
We all love Netflix – which leaves us open to being tricked. The amount of time we’ve spent scrolling through...
Read more about Netflix is a phishing goldmine for cybercriminals
Chinese apps: alternatives to TikTok, WeChat and other popular apps
It's a well-known fact that China is guilty of spying over its citizens. However, its reach doesn't stop there. The...
Read more about Chinese apps: alternatives to TikTok, WeChat and other popular apps
350 million decrypted email addresses left exposed on an unsecured server
The CyberNews research team uncovered an unsecured data bucket owned by an unidentified party, containing seven gigabytes worth of unencrypted...
Read more about 350 million decrypted email addresses left exposed on an unsecured server
Beware using postal and parcel apps
As we’re ordering more online, the attack vectors for hackers become more obviousCybercriminals know how to capitalize on changes in...
Read more about Beware using postal and parcel apps
270 million malware attacks occurred between January and March
While many parts of the economy are slowing down, hacking isn’t We’ve seen an unprecedented change in the world economy...
Read more about 270 million malware attacks occurred between January and March