RockYou2024 and the four other largest data breaches in history
A breakdown of the most high-profile data leaks ever: from Yahoo to RockYou2024.
88 articles
A breakdown of the most high-profile data leaks ever: from Yahoo to RockYou2024.
Almost six out of ten passwords can be cracked in less than an hour using either a modern graphics card or cloud services. All it costs is a few dollars and some free time. How this is possible and what to do about it is the topic of our study.
Dropbox has shared a report on a data breach in the Dropbox Sign e-signature service. What does this mean for users, and what should they do?
On World Password Day, we explain how we protect your sensitive data, and share tips for creating truly strong passwords.
Time to update Fortra GoAnywhere MFT: an exploit has been developed for a critical vulnerability that allows attackers to bypass authentication and create admin accounts.
How online services should store user passwords, and how to minimize the damage in the event of a leak or hack.
Offboarded employees often retain access to work information. What are the risks, and how to deal with them?
Where to store credentials: browser or password manager? The latter, of course. Here’s why.
DIY security trainings for your colleagues that are both fun (for you) and educational (for them).
We explain how two-factor authentication with one-time codes works, what the benefits and risks are, and what else you can do to better protect your accounts.
Food delivery services’ databases may not contain payment information, but leaks can still cause major problems.
Home video surveillance systems are said to be safe. But are you ready to become a reality TV star without realizing it?
Queryable Encryption in the MongoDB database management system, and how it can improve data protection.
Report on the research about the applied telehealth practices, views on the development and the difficulties that emerge when providing medical services remotely.
What do James Bond and his Secret Intelligence Service colleagues know about cybersecurity?
Misconfigured applications built with Microsoft Power Apps leave millions of personally identifiable information entries exposed.
Loss or leaks of sensitive information can be serious problems for small businesses. Here’s how to keep confidential data safe.
Many companies throw out information that can pose a security or reputational risk.
In the face of high-profile ransomware attacks on healthcare institutions, here’s how to protect your business from the threat.