5 Dating Apps Leak More than 1 Million User Profiles and Sensitive Information

This month, WizCase researchers discovered 5 separate data leaks of personal information belonging to dating app users in the US, Japan and South Korea. The data, which was easily accessed due to misconfigured and unsecure servers, included user inform… Continue reading 5 Dating Apps Leak More than 1 Million User Profiles and Sensitive Information

Data exfiltration: The art of distancing

We have all seen the carefully prepared statement. A cyber incident has occurred, we are investigating but please do not worry since no data has left our network. Perhaps we will also see the obligatory inclusion of a ‘sophisticated’ threat actor by wa… Continue reading Data exfiltration: The art of distancing

New technique keeps your online photos safe from face recognition algorithms

In one second, the human eye can only scan through a few photographs. Computers, on the other hand, are capable of performing billions of calculations in the same amount of time. With the explosion of social media, images have become the new social cur… Continue reading New technique keeps your online photos safe from face recognition algorithms

22,900 MongoDB Databases Held to Ransom by Hacker Threatening to Report Firms for GDPR Violations

Hackers are once again finding unsecured MongoDB databases carelessly left exposed on the internet, wiping their contents, and leaving a ransom note demanding a cryptocurrency payment for the data’s safe return. As ZDNet reports, ransom notes hav… Continue reading 22,900 MongoDB Databases Held to Ransom by Hacker Threatening to Report Firms for GDPR Violations

Trickbot Malware Using Screen Resolution Checks as Anti-VM Tactic

Security researchers spotted Trickbot malware checking the screen resolution as a means of evading analysis on a virtual machine (VM). Digital security firm MalwareLab came across a sample of the trojan that checked to see whether a computer’s sc… Continue reading Trickbot Malware Using Screen Resolution Checks as Anti-VM Tactic

White-Box Encryption: Ending Web App Vulnerability

Key management must give way to new options that enable and protect true encryption for organizations For as long as they’ve existed, web applications have been a favorite target for hackers. They are relatively easy to break and give hackers potentia… Continue reading White-Box Encryption: Ending Web App Vulnerability

New Mac Ransomware Leveraged Piracy as Means of Distribution

Security researchers detected a new ransomware strain that leveraged piracy as a means of distributing itself to Mac users. On June 29, a Twitter user reached out to Malwarebytes about a malicious Little Snitch installer that was available for download… Continue reading New Mac Ransomware Leveraged Piracy as Means of Distribution

Google Removes 25 Malicious Google Play Apps Stealing Facebook Login Credentials

Last month, Google removed 25 Android apps from its Google Play Store after discovering they were stealing users’ Facebook account credentials. The malicious apps, identified by security company Evina, appeared to be created by the same developer… Continue reading Google Removes 25 Malicious Google Play Apps Stealing Facebook Login Credentials

A Boxcryptor audit shows no critical weaknesses in the software

More and more companies, self-employed and private customers are using Boxcryptor to protect sensitive data – primarily in the cloud. Boxcryptor ensures that nobody but authorized persons have access to the data. Cloud providers and their staff, as wel… Continue reading A Boxcryptor audit shows no critical weaknesses in the software