Items tagged with security breach
by
Alan Velasco - Tue, Aug 13, 2024
Yet another leak of stolen data has made its way to Breach Forums, a popular site for bad actors who traffic in this kind of data theft. The data originates from the breach of National Public Data, which is a service that gathers...
Read more...
by
Aaron Leong - Tue, Mar 21, 2023
Famed automaker Ferrari announced yesterday that the company suffered a data breach involving personal information of its clients, without any impact on its operations.
A hacker or hackers were recently able to gain access to the...
Read more...
by
Nathan Wasson - Mon, Feb 13, 2023
Pepsi Bottling Ventures (PBV) has suffered a major data breach, with hackers making off with a trove of sensitive information. The company has begun notifying affected individuals of this incident, but the details remain sparse. According...
Read more...
by
Nathan Wasson - Fri, Jan 20, 2023
Yesterday, T-Mobile, one of the big three mobile internet service providers in the US, announced that it recently fell victim to a data breach. The company disclosed this information in both a news release and a filing with the Securities...
Read more...
by
Nathan Wasson - Mon, Jan 16, 2023
The Liquor Control Board of Ontario (LCBO), a government organization that sells alcoholic beverages within Ontario, Canada, has published a statement notifying customers of a cybersecurity incident affecting the retailer’s online store...
Read more...
by
Tim Sweezy - Fri, Nov 05, 2021
The number of ways hackers can exploit security flaws seems endless these days. The Cybersecurity and Infrastructure Security Agency (CISA) expanded on one of those this week when it encouraged vendors, manufacturers, and developers to...
Read more...
by
Nathan Ord - Mon, May 17, 2021
In the past 24 hours, security camera company Eufy had a massive lapse in privacy when customers began to report that they had access to other peoples’ devices live and recorded feeds. Though this could be a one-off situation, it begs the...
Read more...
by
Ben Funk - Sat, Mar 06, 2021
The never-ending parade of security vulnerabilities continues. Just as quickly as software vendors can tackle and resolve one set of exploitable issues -- i.e. the troubles at SolarWinds -- attackers find other vectors to break into...
Read more...
by
Brittany Goetting - Wed, Sep 04, 2019
Facebook must once again deal with the repercussions of a major security blunder. An exposed server recently published more than 419 million phone numbers and Facebook IDs. At least 133 million of those phone numbers were based in the...
Read more...
by
Brittany Goetting - Sat, Aug 03, 2019
Did you attend E3 this past June? Your data may have been leaked. The data of over 2,000 journalists and content creators was at risk thanks to a website security breach.
The Electronic Software Association (ESA) grants E3 press badges...
Read more...
by
Brandon Hill - Wed, Jun 26, 2019
Another day, another report on vulnerabilities in the software that many of us use on a daily basis. This time around, researchers from Check Point and CyberInt rallied together to detail a number of exploits that they discovered in the...
Read more...
by
Brandon Hill - Thu, Mar 21, 2019
Facebook just can’t seem to keep its nose clean with respect to security and user privacy. The latest blunder was first reported on by KrebsonSecurity, which discovered that the social networking giant was storing user account passwords in...
Read more...
by
Brittany Goetting - Thu, Nov 01, 2018
Rumor has it that the new Google Home Hub may have a few security vulnerabilities. A hacker recently demonstrated that a Google Home Hub could potentially be forced to reveal information about its owner, but Google has now refuted this...
Read more...
by
Shane McGlaun - Sat, Jan 27, 2018
A cryptocurrency exchange in Asia called Coincheck has announced that it was the victim of a massive hack that saw hundreds of millions of dollars worth of cryptocurrency stolen in what is the largest heist of its kind in history...
Read more...
by
Brandon Hill - Sat, Aug 08, 2015
It seems as though hackers are having a field day when it comes to infiltrating both private and government computer networks. The latest victim is Carphone Warehouse, which just so happens to be the United Kingdom’s largest independent...
Read more...
by
Kory Kessel - Thu, May 14, 2015
Data security research player CrowdStrike is reporting a security flaw that could allow hackers to exploit and take over data centers from within. Given the nasty moniker "VENOM" (for "Virtualized Environment Neglected Operations...
Read more...
by
Joshua Gulick - Sat, Feb 28, 2015
Uber announced that it suffered a database breach at the hands of hackers last year. The company admitted that about 50,000 drivers may have been affected by the breach and announced that a lawsuit has already been filed by Uber against...
Read more...
by
Brandon Hill - Mon, Feb 23, 2015
Conventional wisdom in years past was that hackers didn’t bother to exploit Apple’s OS X operating system because its relatively insignificant market share didn’t warrant wasting resources to exploit it. The reasoning was, why bother with...
Read more...
by
Sean Knight - Tue, Dec 09, 2014
Since the massive security breach at Sony Pictures has occurred, speculation has been that North Korea was behind it. Sony, with the help of cybersecurity firm Mandiant and the FBI, has been investigating the perpetrators behind the breach. However, a senior FBI official stated has stated that...
Read more...
by
Sean Knight - Fri, Dec 05, 2014
Sony Pictures Entertainment is not getting a break from the security break it experienced last month that resulted in Sony shutting down its computers. In the aftermath of the attack, the hackers, called Guardians of Peace, released a set...
Read more...
by
Joshua Gulick - Mon, Nov 17, 2014
Government agencies are prime targets for many hackers (particularly those funded by other governments), so it’s not surprising that the State Department was recently attacked. What makes the attack unusual is that it appears to have...
Read more...
by
Jennifer Johnson - Sun, Mar 29, 2009
After a 10-month cyber espionage investigation, researchers have found 1,295 computers in 103 countries with software that is capable of stealing information from high-profile targets such as the Dalai Lama and government agencies around the world. In the report published today by Information...
Read more...