An attacker can lock you out of the app using just your phone number and without requiring any action on your part. If you use WhatsApp, you may want to be wary of an attack where cybercriminals could suspend your account using only your phone number. The underlying loophole abuses a lapse in security of … More WhatsApp flaw lets anyone lock you out of your account
Reports of another trove of scraped user data add to the recent woes of popular social media platforms. It seems that threat actors are increasingly setting their sights on extracting vast amounts of data from social media platforms. The cascade of incidents started off with a data leak impacting more than half a billion Facebook users and … More Clubhouse in the spotlight after user records posted online
Easy to redeem and hard to trace, gift cards remain a hot commodity in the criminal underground. A cybercriminal has sold almost 900,000 gift cards and over 300,000 payment cards on a top-tier cybercrime forum on the dark web. The total value of the cards was claimed to be some US$38 million. The hacker probably gained … More $38 million worth of gift cards stolen and sold on dark web
Some personal information just doesn’t age – here’s what the Facebook data leak may mean for you. ‘Half a billion Facebook users’ data breached’, this or something very similar is a headline you may have seen in the media in recent days. Any data breach, especially one that affects such a large quantity of users, … More Does data stolen in a data breach expire?
How can organizations tackle the growing menace of attacks that shake trust in software? Cybersecurity is only as good as the weakest link, and in a supply chain this could be virtually anywhere. The big questions may be, “what and where is the weakest link?” and “is it something that you have control over and … More Supply‑chain attacks: When trust goes wrong, try hope?