0 0 0

Chipotle hacked

There isn't a lot of information available to this story as to how the attack occurred. But that in itself is telling. 

The attack against...

Read More…
unknownx500

0 0 0

Healthcare data breaches

Apparently one in eight people have suffered a healthcare data breach. That's a lot higher than I would have expected, with pharmacies...

Read More…
unknownx500

0 0 0

Cybersecurity Tech Investments

Investment in cybersecurity tech firms has always been buoyant and predictions don't believe this will slow down. 

However, the question...

Read More…
unknownx500

0 0 0

Hacker sentenced to 27 years

I get it, crime needs to be punished, but 27 years for a non-violent crime seems a bit excessive. 

On Friday, a judge sentenced Roman Valerevich Seleznev, 32, to 27 years in prison — the longest sentence handed down for hacking-related...…

Read More…
unknownx500

0 0 0

Uber fingerprinting iOS devices

Allegations are being made that Uber took liberties with iOS, by fingerprinting, i.e. using identifiers to recognise a device even after...

Read More…
unknownx500

0 0 1

Food social network breached

Allrecipes has suffered a breach whereby customer emails and passwords appear to have been compromised. It has been emailing its...

Read More…
unknownx500

0 0 0

Another day, another game breach

Is apathy setting in on breaches? it seems as if fashion fantasy didn't even acknowledge the breach. 

It's very easy to create an app or...

Read More…
unknownx500

0 0 2

Credit card with fingerprint reader

Mastercard has launched a credit card with a fingerprint reader.

While biometrics are in no way perfect, if MasterCard are storing the...

Read More…
unknownx500

0 0 0

Can you spot the difference?

A new phishing method works by using letters from other alphabets which, to the naked eye look virtually identical in a browser.

It's not...

Read More…
unknownx500

0 0 0

IoT Botnet rivalry

I grew up hearing about epic rivalries, the bloods and the cribs, the East vs West side hip hop battles, the Rockers vs the Hart...

Read More…
unknownx500

0 0 0

Get your Ransomware source code

Ransomware has been an increasingly-favoured technique by cyber-criminals in recent times. Various business models are in use, from...

Read More…

0 0 0

Stop saying cyberattack!

The Associated Press (AP) Stylebook is the go-to publication for journalists, PR, corporate marketers, or any other writers. 

One of the...

Read More…

0 0 0

Rise in healthcare breaches

1.5m records lost in March health care industry data breaches represents a rather unsettling trend. While it's not pleasant to see...

Read More…
unknownx500

0 0 0

McAfee LinkedIn page hijack

Even companies like McAfee can get their LinkedIn pages hijacked. 

I guess it goes to show that social media accounts continue to rise as...

Read More…
unknownx500

0 1 0

When responsible disclosure works

So it appears as if Microsoft was able to patch most of the shadow brokers hacks a few weeks prior to the release.

It's a good example of...

Read More…
unknownx500

0 0 0

Battles on the IoT Front

Another day, another IoT botnet. It's the flavour of the month. But it doesn't look like it will slow down any time soon. After all, the...

Read More…

0 2 0

Intel Security is McAfee... again

In an on-and-off relationship, Intel acquired McAfee, tried to distance itself from the man who founded the company by renaming it to...

Read More…
unknownx500

As a free user, you can follow Passle and like posts.

To repost this post to your own Passle blog, you will need to upgrade your account.

For plans and pricing, please contact our sales team at sales@passle.net

Sorry, you don't have permission to repost or create posts.

Repost successful!

View the repost

Repost successful!

Your repost is currently a draft. Review your repost and request approval.

Something went wrong whilst reposting - please try again.

Sorry - this is not an option. This post already exists in the Passle you have selected.

Try reposting to another Passle.