After the Hack: Tips for Damage Control

Reading Time: ~4 min.According to the Identity Theft Research Center, in 2017 alone, nearly 158 million social security numbers were stolen as a result of 1579 data breaches. Once a cybercriminal has access to your personal info, they can open credit cards, take out loans that quickly ruin your credit, or leave you with a giant bill. But The post After the Hack: Tips for Damage Control appeared first on Webroot Blog.
Read more

A Look at the 2018 Verizon DBIR: Key Takeaways and Industry Highlights

Now in its 11th installment, Verizon’s Data Breach Investigations Report (DBIR) is a must-read for cybersecurity professionals across the globe. The 2018 edition dives deep into more than 53,000 real incidents and 2,216 confirmed data breaches with the ultimate goal of informing defenders on the threats they face and how to protect against them. The … Read More The post A Look at the 2018 Verizon DBIR: Key Takeaways and Industry Highlights appeared first on The State of Security.
Read more

Gmail ‘dots don’t matter’ feature exposes Netflix users to phishing attacks

If your Netflix account is registered with a Gmail address, beware of any emails from Netflix asking you to renew your payment info. This, according to a developer who came within inches of paying someone else’s Netflix bill with his credit card number. James Fisher signed up for Netflix in 2013 using jameshfisher@gmail.com, an email
Read more

Obscure E-Mail Vulnerability

This vulnerability is a result of an interaction between two different ways of handling e-mail addresses. Gmail ignores dots in addresses, so bruce.schneier@gmail.com is the same as bruceschneier@gmail.com is the same as b.r.u.c.e.schneier@gmail.com. (Note: I do not own any of those email addresses -- if they're even valid.) Netflix doesn't ignore dots, so those are all unique e-mail addresses and...
Read more
Page 1 of 2312345...1020...Last »