This time a record number of 6.7 Million records were leaked through an LPG company. Not necessarily that they did it, but their complacency on their cyber security infrastructure made them vulnerable to data theft and identity fraud. Take note that Aadhar data were leaked through this company. It makes sense that if you cannot...Continue Reading
Another data has surfaced with respect to the Under Armor’s MyFitnessPal application information break. The information rupture that happened in February 2018, has influenced around 3,977,385 Australian clients. MyFitnessPal lets users monitor their calorie intake and measure it against the amount of exercise they are doing, with a database of more than 2 million...Continue Reading
HSBC Bank USA, an American backup of UK based HSBC, has endured an information rupture that brought about the trade off of individual information of a few clients. Despite the fact that the number isn’t yet known, the bank has affirmed that the assault happened between October 4 and October 14, 2018. What was...Continue Reading
Thousands of wealthy Moscow residents who subscribed to a regional internet provider have had personal data including names, home addresses and mobile numbers posted online. People affected by the high-profile data leak are all clients of Moscow-based internet provider Akado Telecom, a large telecommunications network owned by billionaire businessman Viktor Vekselberg, which said it had...Continue Reading
The seriously threatening part about data intrusion and getting hacked is the period from when the breach was done, and the actual time it takes for the end user or the company to find out that they’ve been attacked. You begin to think that from that certain phase, those cyber criminals may have already acquired...Continue Reading
The banking trojan malware was known to have first appeared in 2016. In fact there was an article written about it within our blog: https://www.izoologic.com/2016/07/26/evolving-banking-malware-and-transaction-authentication/ As you can see the malware has evolved once more, but it isn’t new because the malware is customizable to give its evolution. The latest update on the Malware is...Continue Reading
It would seem that Cyber Criminals have no sense of self-respect or humane characteristics after all. As Hurricane Florence rips through North and South Carolina in the US, scammers and threat actors will very likely look to exploit this natural calamity for financial gain or other malicious purposes, as warned by an interstate cyber security...Continue Reading
How much do you trust the online sites you give your personal information to? Do you have the same level of trust and confidence when you provide the same information when you open a bank account or process crypto exchange? Where and how do you place your trust? Trust can be varying depending on each...Continue Reading
For criminals, life is cheap whether it be theirs or their victims. Criminals in the cyberspace and in darkweb are no different too. Lately, it has been a trend left and right that database leaks are frequently happening where people’s email address and password are exposed. However, that is just the tip of the iceberg,...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.