What is new? This time a record number of 6.7 Million records were leaked through an LPG company. Not necessarily that they did it, but their complacency on their cyber security infrastructure made them vulnerable to data theft. Take note that Aadhar data were leaked through this company. It makes sense that if you cannot...Continue Reading
HSBC Bank USA, an American backup of UK based HSBC, has endured an information rupture that brought about the trade off of individual information of a few clients. Despite the fact that the number isn’t yet known, the bank has affirmed that the assault happened between October 4 and October 14, 2018. What was...Continue Reading
Thousands of wealthy Moscow residents who subscribed to a regional internet provider have had personal data including names, home addresses and mobile numbers posted online. People affected by the high-profile data leak are all clients of Moscow-based internet provider Akado Telecom, a large telecommunications network owned by billionaire businessman Viktor Vekselberg, which said it had...Continue Reading
For an individual or any business their website and its contents mean a lot to them. It can be considered a very important asset or property in this digital age. A person or a group of people devote their time, effort, and other valuable resources to make sure that these assets are protected and secure....Continue Reading
The seriously threatening part about data intrusion and getting hacked is the period from when the breach was done, and the actual time it takes for the end user or the company to find out that they’ve been attacked. You begin to think that from that certain phase, those cyber criminals may have already acquired...Continue Reading
Why account credentials? Account credentials are basically the email/username and password of a user for their own personally or business use. But what if these information gets exposed online? To criminals account credentials are important and they consider it as an essential in their threat structure. Ever since breaches of database has been making the...Continue Reading
The banking malware was known to have first appeared in 2016. In fact there was an article written about it within our blog: https://www.izoologic.com/2016/07/26/evolving-banking-malware-and-transaction-authentication/ As you can see the malware has evolved once more, but it isn’t new because the malware is customizable to give its evolution. The latest update on the Malware is to...Continue Reading
Identification and Verification is the foundation of security and we’re seeing significant evidence of its critical importance in the common trend of password- and credential-focused risks throughout the 2nd quarter of 2018. Regardless if it’s an elusive Identity-stealing malware or a brute force login attack, cyber attackers are adamant and concentrated on hacking passwords for...Continue Reading
How much do you trust the online sites you give your personal information to? Do you have the same level of trust and confidence when you provide the same information when you open a bank account? Where and how do you place your trust? Trust can be varying depending on each individual’s experience. Some doubt...Continue Reading
For criminals, life is cheap whether it be theirs or their victims. Criminals in the cyberspace are no different too. Lately, it has been a trend left and right that database leaks are frequently happening where people’s email address and password are exposed. However, that is just the tip of the iceberg, because those leaks...Continue Reading
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media.
If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked.