login
Authentication vs Login – What’s the Difference?
Most cybercriminals attack users and exploit businesses by targeting weak authentication and login mechanisms. Businesses first need to understand the fundamental difference between authentication and login. Once they know the aspects of ...
Billions of Leaked Credentials Available on the Dark Web
Researchers have found over 15 billion credentials from more than 100,000 data breaches on the dark web, including access to everything from streaming services to banking accounts and financial services. Despite what ...
Nintendo Confirms that 160,000 Accounts Were Compromised
Nintendo admitted that around 160,000 accounts have been compromised through the Nintendo Network ID (NNID) system. The company announced that the NNID system was disabled, at least for now. Reports surfaced in ...
Phishing Campaign Uses Clever Tricks to Steal Stripe Credentials
Researchers have detected a new phishing campaign that uses some clever tricks in order to steal users’ Stripe credentials. Cofense discovered the campaign when it came across an attack email that pretended ...
Cave of Broken Mirrors: 3 Issues with AWS Cognito
Secure Ideas is currently working on a revamp and redesign of our website and client portal, to promote a better user experience for our clients. Since a lot of our infrastructure is ...
Don’t give social media hackers a chance
Pranksters, malicious attackers, extremists — hackers come in different forms, but they all have one thing in mind: compromising your online privacy and security. Some of them specialize in hacking social media, ...
Twitter security snafu: change your passwords
A recent error caused passwords to be exposed internally at Twitter. As a precaution, they're advising all users to change their passwords. Read on to find out what happened, and what you ...