What is a data breach? A data breach is a security lapse where a non-authorized person can assess sensitive information without authorization....
1Password password manager has introduced a new tool called Password Secure Sharing Tool or Psst! that lets users share their passwords or...
According to FarFaria, its apps are “created for children ages 2-9” meaning that the incident exposed children to cybercriminals. Another day, another...
The data was exposed due to an unprotected Elasticsearch cluster and remained open to public access without any security authentication. Well-known security...
Lithuania’s Defense Ministry has released a warning, urging consumers to get rid of their Chinese phones and not to buy new ones....
Governments and regimes across the globe use censorship as a tool to control the flow of information. This article highlights how one...
ProtonMail is being criticized for sharing French activist’s IP address with Swiss authorities while claiming it does not save logs. End-to-end encrypted...
The Whitehat hacker and IT security researcher Marcus Hutchins, who saved the world from the WannaCry ransomware attack, has shared simple yet...
Originally, O.MG Cable was introduced in 2019. In 2019, at DEFCON, an IT security researcher going by the online handle of MG...
According to researchers, the incident involved 47 government and private entities across the United States. The IT security researchers at UpGuard published...
Most of the email addresses checked by researchers contained .gov suffixes or indicated that the user worked for New York Police Department....
In total, CPA exposed 502 GB worth of data without any security authentication. Anurag Sen, a security researcher identified a data leak...
The Elasticsearch database was left exposed without any security authentication which means it could have been accessed by anyone with access to...
The trove of data was left exposed unencrypted and without any password or security authentication. The team of IT security researchers at...
In groundbreaking research, it has been revealed that governments and regimes around the world used NSO Group’s Pegasus spyware, a company based...
“Surveilling the Gamers: Privacy Impacts of the Video Game Industry,” a new research reveals how personal and financial data collected by gaming...
View Once feature will keep the images accessible for a maximum of 14 days and expire afterward. It’s quite amusing that Facebook...
More and more people are falling victim to identity theft today. This concept covers any kind of crime, scam, or form of...
Reportedly, Carter’s failure to implement proper authentication protocols on the store’s parcel tracking pages exposed data and shoppers to scams. VpnMentor analysts...
Tired of accepting or rejecting cookie notices on websites you visit? You can now use any of these 3 browser extensions to...
The vulnerability exisits in the company’s P2P SDK, a function that allows a client on a desktop or mobile app to access...