
Faster, harder, Twitter: millions of passwords leaked
Database with millions of Twitter accounts is being sold on the Darknet. At least 32 million of them are unique and probably active. What you need to do is change your password ASAP!
92 articles
Database with millions of Twitter accounts is being sold on the Darknet. At least 32 million of them are unique and probably active. What you need to do is change your password ASAP!
Do you have some long abandoned accounts? Do you use the same password everywhere? If so, change all of them now!
Researchers expose details of 70,000 OKCupid accounts, without permission.
Spotify users’ account data once again found its way onto Pastebin. Change your password.
Journalists and their whistle-blowers managed to keep the biggest data leak in secret. How did they do it?
It looks like Spotify accounts have been published on the Dark Web. It’s a good time to check up on your passwords.
In this edition of Security Week infosec digest we’ll cover threecases of companies being hacked and data being leaked and companies reacting on the incidents.
The rulebook for freethinking people: how not to get made the next time you log on Ashley Madison or buy goods in a sex shop online.
Infosec digest: exploit kit Neutrino in Wordpress, yet another GitHub DDoS, Wyndham responsible for breach, while Target is not.
Once more into a breach: 9.7 gigabytes of stolen data with users’ emails, credit card transactions and profiles leaked into the darknet.
Devices that have functions of special importance, or that contain top-secret information, are not usually connected to the Internet. However, going offline is not the ultimate protection.
New allegations against the NSA claim the group hacked into the network of the world’s largest SIM card provider, stealing encryption keys to millions of devices.
The top privacy data leaks in 2014 include: data breaches at Target and Home Depot, hacks of JP Morgan and Barclays banks, and leaks at Orange and Dropbox.
We collected the 10 best tweets related to an IT security event in 2014.
Internal and external threats may be quite different in nature, but they demand equal attention from the IT staff in order for the protection to be complete.
Using an in-room tablet in a hotel is an easy way to share your precious private data with the whole world and make it public.
A large number of logins and passwords to accounts in several free email services – Mail.ru, Yandex and Gmail.com – had been leaked. Once again, passwords prove to provide insufficient protection. What does it mean for businesses?
A number of celebrities private (very private) photos were leaked. While it is first and foremost a blatant invasion of privacy, this is also a wake-up call for businesses.
Data breaches have become a routine. It can happen to any site, any day. You can’t prevent it, but there is a way to minimize the damage.
Wrapping up our Big Data Week, in this post we talk about potential of abuse of Big Data, which is arguably extreme.
Big Data means increased risks: a large-scale leak may lead to tremendous reputational damages, so cyber-resilience is extremely important.