Customer data stolen from the Adidas website in the US
Another day, another data violation; Adidas believes that hackers have not been able to access to credit card information or health and fitness data from customers. Adidas, one of theRead More →
Cyber Security Incident News | Infosec Blog | Information Security Tutorials
Another day, another data violation; Adidas believes that hackers have not been able to access to credit card information or health and fitness data from customers. Adidas, one of theRead More →
The security agency is eliminating millions of phone calls and text messages records dating for technical failures. The U.S. National Security Agency (NSA) announced that it is eliminating hundreds of millionsRead More →
Although Google has promised better privacy measures to its users, reports from Wall Street Journal suggest that thousands of application developers have access to Gmail users’ private messages. TheseRead More →
A hacker managed to download voter’s information. The Tasmanian Electoral Commission states that an attacker still unknown gained access and downloaded a backup file containing voters’ information such as names,Read More →
LTE was supposed to fix security and privacy shortcomings—now it’s broken, too. The Long Term Evolution mobile device standard used by billions of people was designed to fix many ofRead More →
Data breaches are always bad news, and this is peculiarly bad. Gentoo, a popular Linux distribution (or distro), has suffered the hacking of its repository on GitHub. The bad news is thatRead More →
Malicious software on third-party customer support product Inbenta Technologies caused the hack, the firm said on Twitter. “Some personal or payment information may have been accessed by an unknown thirdRead More →
The increased deals with cryptocurrencies such as Bitcoin and its various alternatives have led to the creation of coordinated phishing attacks from the so-called “Bitcoin Airdrops”. Computer users look forRead More →
Fast food franchise PDQ has informed its customers that information of the cards with which they have made their purchases could be compromised due to a security breach in oneRead More →
A researcher specialized in information security training recently discovered an Apple operating system failure that allows anyone with a Lightning cable the ability to bypass the password attempts limit ofRead More →