iVerify: Added security for iPhone and iPad users
I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download. ...
January: A database used by the Department of Homeland Security's Office of the Inspector General was confirmed breached in January, affecting over 247,167 and former employees and individuals associated with the department's previous investigations. The breach marked the first one of the first intrusions this year.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
February: A company acquired by FedEx leaked thousands of customer records, thanks to a leaking Amazon S3 bucket. The data included names, addresses, and phone numbers.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
March: The travel booking site said about 880,000 payment cards, or about two years' worth of data, was stolen by a hacker, thanks to a security vulnerability in the travel site's legacy booking system.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
March: India's national ID database, claimed by the government to be secure, leaked data on potentially every Indian citizen -- some 1.1 billion people -- who signed up to the database, including their names and information about services they are connected to, such as their bank details.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
March: French weekly news magazine L'Express left a server containing a database of its readers exposed online for weeks without a password. Even after the Paris-based magazine was warned of the exposure, the database wasn't secured for another month
Photo by: (Image: file photo)
Caption by: Zack Whittaker
March: The controversial Trump campaign-linked data was suspended from Facebook for using the data to determine who voters might choose at the ballot box. In the end, more than 80 million people were affected by the data exposure.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
May: Twitter admitted that user passwords were briefly stored in plaintext, and might have been exposed to the company's internal tools and staff. The company said it fixed the bug and that an investigation "shows no indication of breach or misuse" by anyone.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
May: An exposed and unauthenticated API on T-Mobile's website let anyone access the personal account details of any customer with just their cell phone number. The returned data included a customer's full name, postal address, billing account number, and in some cases information about tax identification numbers.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
May: A major TV network, a UK cell giant, and one US government agency are among the companies affected by this new class of attacks that allows hackers to pivot quickly and easily inside a company's cloud infrastructure.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
May: Rail Europe, a site used by Americans to buy train tickets in Europe, has revealed a three-month data breach of credit cards and debit cards, which resulted in credit card numbers, expiration dates, and card verification codes swiped from its servers -- everything needed by a fraudster to carry out unauthorized purchases.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
June: A data breach at a federally funded active shooter training center has exposed the personal data of thousands of US law enforcement officials. Not only that, the leaked data revealed that many police departments are unable to respond in an active shooter situation.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
June: Some 340 million records were stolen from a server run by Exactis, a company you've likely never heard of, after the data was found on a publicly accessible system. Each record contains a huge amount of data, including contact information and public records, to "more than 400 variables on a vast range of specific characteristics."
Photo by: (Image: file photo)
Caption by: Zack Whittaker
June: Sports clothing maker Adidas said that its website was hacked, and data -- including contact information, usernames, and hashed passwords -- were stolen in the breach.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
July: A recent breach at Ticketmaster was just "the tip of the iceberg" of a wider, massive credit card skimming operation, research has found. By targeting suppliers of third-party code installed on e-commerce websites -- like Ticketmaster -- the hackers were able to in some cases get "nearly 10,000 victims instantly."
Photo by: (Image: file photo)
Caption by: Zack Whittaker
July: The fitness tracking app, Polar Flow, allowed anyone to access a user's fitness activities over several years -- simply by modifying the browser's web address. That location data revealed the home addresses of intelligence officers -- even when their profiles were set to private.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
July: Thousands of credentials for accounts associated with New Zealand-based file storage service Mega have been published online. Their accounts had been improperly accessed and file names scraped. One of the accounts in the file contained file listings for what described child abuse content.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
July: Usernames, email addresses,and social media tokens -- used to log into accounts -- for 21 million users were stolen from the social media app -- with over 4.7 million phone numbers also taken. Timehop later said that genders and dates of birth were also taken in the breach. None of the data was protected with two-factor, the company said.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
July: The government of Singapore described the attack as "deliberate, targeted, well-planned." Even the country's prime minister had his data stolen in the breach, which affected 1.5 million patients who visited SingHealth's outpatient clinics over a three year period.
Photo by: (Image: file photo)
Caption by: Zack Whittaker
Dozens of breaches, over a billion affected.
March: The travel booking site said about 880,000 payment cards, or about two years' worth of data, was stolen by a hacker, thanks to a security vulnerability in the travel site's legacy booking system.
Caption by: Zack Whittaker
iVerify: Added security for iPhone and iPad users
I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download. ...
iStorage datAshur BT hardware encrypted flash drive
FIPS 140-2 Level 3 compliant storage drive with wireless unlock feature and remote management. IP57 rated for dust and water resistance.
Netgear BR200 small-business router
The Netgear BR200 Insight Managed Business Router has been designed to be easy to set up, and features a built-in firewall, VLAN management, and remote cloud monitoring, and can be ...
YubiKey 5C NFC: The world’s first security key to feature dual USB-C and NFC connections
The YubiKey 5C NFC can be used across a broad range of platforms -- iOS, Android, Windows, macOS and Linux -- and on any mobile device, laptop, or desktop computer that supports USB-C ...
Apricorn Aegis Secure Key 3NXC
The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have ...
YubiKey 5Ci Clear Limited Edition
Transparency in security.
Certo AntiSpy iPhone Spyware Detection
Certo AntiSpy is not an app. Instead, it is a utility that you download and install on a Windows or Mac, and you use that to scan a backup of your iOS or iPadOS for subtle signs of intrusion. ...
Join Discussion