apple watch

Data of 60 Million Fitness and Health Tracking Records Exposed

An online database left millions of wearable tech users exposed, including those who use Fitbit and Apple’s HealthKit. The records are said to come from GetHealth, a company who’s platform also takes health-related data from places like Misfit Wearables, Microsoft Band, Strava and Google Fit. Sensitive information was included in the data repository, including names, […]

Private Nude Photos Stolen in Horrifying iCloud Scam

A California man has plead guilty to a scam that involved stealing and distributing private photos of young women. The person in question, 40-year old Hao Kuo Chi of La Puente, impersonated Apple’s customer support team in order to steal iCloud passwords. He collected over 620,000 private photos and videos from his social engineering campaign. […]

google home

Security Risk As Chinese Firms Control Your Smart Devices

Chinese smart technologies are in many of the items you use. And they could pose a decent security risk. Tuya, Inc. of Hangzhou is a technology firm that services more than 1,1000 areas from healthcare and agriculture to apartment management, and whose products are sold in over 220 countries. Affiliated with Tencent, Tuya provides platform […]

T-Mobile Cyberattack Exposed Vulnerable Information For 40 Million People

The data breach in question included sensitive information like first and last names, birth dates and social security numbers. The tech company was informed of the hack and has been investigating the incident within the last week. According to a Vice report, someone in an online forum tried to sell $270,000 worth of stolen information […]

Hacker Returns Cryptocurrency After Stealing $600 Million In Assets

Funds from one of the largest cryptocurrency hacks to date is now being returned just days later. Poly Network, a decentralized finance (DeFi) platform, was hacked on August 10th which allowed attackers to transfer Binance Chain, Ethereum, and Polygon forms of crypto to their wallets. Cryptocurrencies are a type of virtual currency that uses blockchain […]

Amazon Kindle Security Flaw And eBooks with Malware

Your e-reader could’ve been compromised. A security bug disclosed this past week would’ve allowed hackers to install devices with malware, giving them unauthorized access to Amazon accounts and other sensitive information. Once a malicious kindle book was opened, a user’s screen would be locked and an attacker would gain total control of the e-reader. While […]

Chipotle’s Marketing Service Breached, What You Need To Know

If you signed up to receive emails from Chipotle Mexican Grill, you may have gotten more than just coupons in your inbox. Last month, the fast food chain’s marketing service was breached. This led to customers receiving phishing emails and other dubious links that, when clicked, aimed to steal personal information. The cybersecurity attack occurred […]

iPhone Not As Secure As You Think, According To Researchers

Apple’s cybersecurity may be lacking when it comes to its smartphone applications. A new report from media outlets and Amnesty International suggests that iMessage security is easily thwarted by hackers. The tech giant has a reputation of catering to user privacy and security more so than other companies. Reasons for this positive association include a […]

security officer

Do You Have A Security And Privacy Officer? Why Do You Need One?

In order to maintain cybersecurity best practices, your organization should consider the roles of both a Security Officer and a Chief Privacy Officer. Data security is necessary for protecting any information your organization handles. It doesn’t matter whether you’re in a highly-regulated industry and need to maintain strict compliance (HIPAA, PCI-DSS, etc.) or just a […]

Largest Streaming Service Spotify Suffers Third Breach In A Month

E-mail addresses, display names, passwords and dates of birth were among the personal information exposed by the music service after suffering a third data breach since November. Spotify stated that the exposure was due to a software vulnerability that occurred from April until it was rectified mid-November this year. The first incident occurred when threat […]