Loading

List of data breaches and cyber attacks in…

Thankfully, January was relatively quiet on the data breach front, following a chaotic end to 2020 in which we surpassed a thousand security incidents and 20 billion breached records. So far this year, we’ve recorded…

List of data breaches and cyber attacks in…

What else would you expect from the final month of 2020 than the highest number of publicly disclosed incidents we’ve ever recorded? We logged 134 security incidents in December, which accounted for 148,354,955 breached records.…

On the Twitter Hack

Twitter was hacked this week. Not a few people's Twitter accounts, but all of Twitter. Someone compromised the entire Twitter network, probably by stealing the log-in credentials of one of Twitter's system administrators. Those are…

List of data breaches and cyber attacks in…

The first half of 2020 ended on a familiarly bad note, with 92 security incidents accounting for at least 7,021,195,399 breached records. That figure was boosted significantly by KeepNet Labs finally bowing to pressure and…

Catches of the month: Phishing scams for May…

Coronavirus continues to dominate the cyber security landscape (and pretty much every other part of our lives), with cyber criminals cashing in on the disruption.Whether you’re forced to work from home, out of work or…

Catches of the month: Phishing scams for March…

Want to learn about the latest phishing scams? Our ‘catches of the month’ feature investigates the most prominent email attacks across the web, explaining how they occurred and the lessons you should learn. 1. Ordnance Survey…

Loading

U.S. Department of Interior Grounding All Drones

The Department of Interior is grounding all non-emergency drones due to security concerns: The order comes amid a spate of warnings and bans at multiple government agencies, including the Department of Defense, about possible vulnerabilities…

5G Security

The security risks inherent in Chinese-made 5G networking equipment are easy to understand. Because the companies that make the equipment are subservient to the Chinese government, they could be forced to include backdoors in the…