News

News

Expert Comments On Possible Carnival Cruise Line Data Breach

March 06, 2020 -- Carnival Cruise line has reported a potential breach of its network after they found suspicious activity. The company reported the incident to the California Attorney General.[quote]"With 325,000 people sailing aboard Carnival ships every day, it is a party that hackers do not want to miss. Although there is no evidence that the compromised information has been used for fraud, it is important that companies are ready to prevent this potential misuse of the stolen information. "[/quote]

Read More >

Virgin Media Data Breach Affects 900,000 People

March 06, 2020 -- A Virgin Media database containing the personal details of 900,000 people was left unsecured and accessible online for 10 months, the company has admitted. The information was accessed “on at least one occasion” by an unknown user.[quote]"Dark web data brokers are hard at work scraping up any piece of data exposed or breached. With each ounce of information, cybercriminals are putting the pieces of a consumer’s identity together to create a full data profile of an

Read More >

Expert Reaction On Estee Lauder Data Exposure

February 12, 2020 -- 440 million records from the Estee Lauder company were exposed online according to security Researcher at Security Discovery who found the door wide open on an Internet Facing database.[quote]"With the data stolen, customers are the primary targets for cybercriminals, who will use their information to take over accounts the victims have with other online companies. There is also the risk of impersonation by bad actors who will create new accounts with the victim’s information or open

Read More >

Expert Analysis On Most Sophisticated Phishing Techniques Using Brand Impersonation

February 10, 2020 -- Cybercriminals are employing the most sophisticated phishing techniques using brand impersonation, social engineering and phishing to lure in victims to take over their email accounts according to a study by Researchers from Barracuda and UC Berkeley.[quote]"Attacks happen in phases and this report does a good job following them. Account takeover attacks start with the theft of the credentials, either through a system breach, malware, or phishing. There are three broad phases for an attack: gathering the

Read More >