Advertisement
Top

Tag: Users


Data loss, Privacy protection, Security

Think changing your Yahoo password is enough? Think again…

September 30, 2016

Via: TrendMicro Blog

With the recent announcement of more than 500 million accounts impacted by a security breach, many Yahoo users have been changing their passwords. After all, that’s the official guidance. However, as ZDI’s Simon Zuckerbraun points out, a new password isn’t enough. […]


Data loss, Privacy protection

Yahoo sued over data breach

September 27, 2016

Via: Computer Weekly

Yahoo is facing a class action lawsuit that alleges that the internet firm showed a reckless disregard for the security of its users that resulted in a breach affecting half a billion accounts A New Yorker is suing Yahoo over […]


Privacy protection

Here’s how Microsoft is using containerization to protect Edge users

September 27, 2016

Via: CIO

One of the biggest security risks for computer users is their web browser. According to Microsoft, 90 percent of phishing emails use the browser to initiate attacks, which can then be used to help attackers establish a beachhead inside a […]


Cyber-crime, Vulnerabilities

It seems that Internet Explorer and Edge users were in danger for so long

September 22, 2016

Via: Security Affairs

Microsoft finally fixed a set of vulnerabilities in Internet Explorer years after they were discovered by black-hats in the hacking underground. I have contacted a black hat in the underground that who made a catastrophic prediction: “And millions of people affected […]


Data loss

ClixSense Data Breach, 6.6 Million users’ records stolen

September 16, 2016

Via: Security Affairs

Here we are again to discuss a new data breach that exposed million user records of the advertising ClixSense service. ClixSense allows its clients to earn money online by paying surveys, free offers and paid per click advertising. The popular security expert Troy […]


Hacker, Virus & Malware

Bitcoin website suspects it will be targeted by state-sponsored hackers, warns users

August 19, 2016

Via: Hot for Security

Hopefully we are all aware that we should exercise caution when downloading programs from the internet. There have been plenty of cases of malicious software being distributed via the web, and even legitimate programs being tampered with in order to […]


Phishing

Spearphishing: It’s Curiosity That Makes Them Click

August 10, 2016

Via: Dark Reading

Researchers prove that people can be fooled just because they want to know what’s on the other end of that email. Here are three steps you can take without spending too much money. If it was curiosity that killed the […]


Application security, Data loss

Data of 200 million Yahoo users offered for sale

August 3, 2016

Via: Help Net Security

Data of some 200 million Yahoo users has been offered for sale on the TheRealDeal dark web market by “peace_of_mind” (aka “Peace”). Even though Yahoo is yet to confirm whether the batch actually contains their users’ data, chances are good […]


Access control

Most are unable to control user activity in their IT infrastructure

July 4, 2016

Via: Help Net Security

A majority of organizations report that they lack visibility into their cloud infrastructure, file shares, user activity and mobile devices, greatly impacting data security and system uptime, according to Netwrix. The survey of 830 respondents, conducted by Netwrix in April […]


Network security

Can Google replace passwords by tracking you more thoroughly?

May 25, 2016

Via: Naked Security

With password managers to take care of ch00sing c0MPl1c/\tEd p455WOrdz for us, and with two-factor authentication (2FA) to reduce the value of stolen or poorly-chosen passwords, you could argue that we no longer need to supplant passwords, because they’re easier […]


Data loss

Former Tor developer helped the FBI unmask Tor users

April 29, 2016

Via: Help Net Security

A developer who used to work at Tor Project is the mastermind behind “Torsploit” (aka “Cornhusker”), the malware that was used by the FBI in 2012 to unmask visitors to three child pornography websites on the Dark Web, The Daily […]


Malware

Public institutions targeted with shape changing Qbot malware

April 15, 2016

Via: Help Net Security

A new strain of Qbot, malicious software that steals user credentials and creates backdoors on targeted devices, has infected over 54,000 PCs in thousands of organisations across the world, BAE System experts have found. Following an attack on a public […]


Vulnerabilities

Security Flaw in Truecaller Exposes Millions of Android Users

March 31, 2016

Via: Security Week

Popular phone call management application Truecaller was discovered to pack a remotely exploitable security flaw that potentially impacts 100 million Android users, researchers at Cheetah Mobile Security Research Lab warn. The vulnerability provides attackers with the possibility to steal sensitive […]


Application security

Defunct iPhone App Exposes Details of 198,000 Users

March 17, 2016

Via: InfoSecurity Live

A researcher discovered an unprotected database storing the details of 198,000 users who had signed up for a now-defunct iOS application. A misconfigured MongoDB database associated with the iPhone app Kinotopic was discovered by Chris Vickery, a researcher who currently […]


Access control

SHA-1 cutoff could block millions of users from encrypted websites

December 11, 2015

Via: CSO Online

Millions of Web users could be left unable to access websites over the HTTPS protocol if those websites only use digital certificates signed with the SHA-2 hashing algorithm. The warning comes from Facebook and CloudFlare as browser makers are considering […]


Network security

Mozilla admits bug-tracker breach led to attacks against Firefox users

September 6, 2015

Via: network-security

#mozilla said an unknown #attacker accessed its #bugzilla bug-and-change tracking database, stole information about 53 critical security #vulnerabilities, and used at least one of those flaws to attack #firefox #users. Bugzilla is the open-source #tracker that Mozilla’s developers — both […]