Timehop Hacked — Hackers Stole Personal Data Of All 21 Million Users

And the hacks just keep on coming.

Timehop social media app has been hit by a major data breach on July 4th that compromised the personal data of its more than 21 million users.

Timehop is a simple social media app that collects your old photos and p… Continue reading Timehop Hacked — Hackers Stole Personal Data Of All 21 Million Users

Discover What Happened After a Security Incident — Without Losing Your Cool

When a dreaded security incident or breach takes place, you’ll face your true testing time. Here’s how to discover what happened after a security incident — without losing your cool.

The post Discover What Happened After a Security Incident — Without Losing Your Cool appeared first on Security Intelligence.

Continue reading Discover What Happened After a Security Incident — Without Losing Your Cool

Panera Bread’s half-baked security

We’ve heard it all before. XYZ Company “takes your data security very seriously.” Most commonly you’ll hear these words just after a company has suffered an embarrassing data breach, perhaps having carelessly exposed the persona… Continue reading Panera Bread’s half-baked security

Survey: How Well Will Organizations Respond To The Next Data Breach?

The European Union’s General Data Protection Regulation (GDPR) goes into effect this May, and lawmakers in the U.S. are proposing stricter data breach legislation. With the pressure on to better protect data and improve notification procedures in… Continue reading Survey: How Well Will Organizations Respond To The Next Data Breach?

Creating an Incident Response Checklist to Prepare for a Data Breach

When faced with an external attack or data breach, an organization is helpless unless it has an incident response plan firmly in place. The goal of such a plan is to minimize the damage of an attack, meaning that the recovery effort should take as little time as possible and avoid unnecessary costs, which include […]

The post Creating an Incident Response Checklist to Prepare for a Data Breach appeared first on Security Intelligence.

Continue reading Creating an Incident Response Checklist to Prepare for a Data Breach

Outsourced MFA (Multi-Factor Authentication)

Digital security is a major area of importance in the modern enterprise. With large organizations like Target, LinkedIn, and Yahoo all being breached recently (CNN), IT admins have the security…
The post Outsourced MFA (Multi-Factor Authentication) a… Continue reading Outsourced MFA (Multi-Factor Authentication)

New tool exposes websites that have suffered data breaches

By Waqas
Last month, Mozilla joined hands with HaveIbeenpwned, a data breach
This is a post from HackRead.com Read the original post: New tool exposes websites that have suffered data breaches
Continue reading New tool exposes websites that have suffered data breaches

Wireless Security Lessons From the WPA2 Vulnerability

One of the biggest WPA2 vulnerability wireless security lessons: Few people are aware, fewer know how to patch it and fewer still will do so.

The post Wireless Security Lessons From the WPA2 Vulnerability appeared first on Security Intelligence.

Continue reading Wireless Security Lessons From the WPA2 Vulnerability