Data Security: Breach and Leak Stories

Check email or password leaked online, search data breaches you may be impacted, hot data security stories and tips.

 Search Data Breach Stories
Hot Words
Key Words
In Field

 Tips about Data Breach
 Check Data Breach Details by Email
(Check details if the email breached.)
Powered by HIBP(Have I Been Pwned)
 Check if My Password is Breached
(Check if the password breached.)
Powered by HIBP(Have I Been Pwned)
 Hot Data Security Stories
Disqus & Kickstarter Hacker Tells How to Against Password Reuse
After any data breached, they will be traded quickly in dark web or even public domain, and are available to cyber criminals all over the world. These privacy data are organized records to sell, showing password, email, name, address, and etc. It any vicitim reuses same password, he or she will become a potential target. The past hacker is telling how the attacks take place...
By Catalin Cimpanu  View Source  
Millions Of Fingerprint And Facial Recognition Data Breached
Traditional passwords aren't unique object of hackers. Biometric database of facial recognition or fingerprints is also hot in attacked list. One of them has been reported to be accessed without authorizing and its damage is not yet clear; but fingerprints and facial recognition data of millions of people have been exposed. These biometric data cannot be changed as usernames and passwords. It means they will be compromised forever...
By Zak Doffman  View Source  
100 Million Capital One Credit Card Data Are Leaked
How muh personal data can stop a hacker's digging? A hacker stole more than 100 million Capital One customers' data. Paige Thompson is accused of breaking into a Capital One server and getting 1 million Canadian Social Insurance numbers, one third of the total canada people, and 80,000 bank account numbers, in addition to people's names, addresses, credit scores, credit limits. It is just disclosed by related banks and the US Department of Justice, is the latest and one of the largest data leakage cases.
By Rob McLean  View Source  
Think before Bite: Phishing Targets Amazon Customers Ahead of Prime Day
This is a fault of Amazon or Prime Day, but its customers are becoming the targets for phishing. Recent years the more and more strong consumer group gives a larger space for cyber criminals to abuse. For example, a phishing kit makes it easy for beginning hacker to construct an email that looks uncomfortably similar to an email alert you would get from Amazon. Prime Day is becoming one of hottest shopping periods and also the hottest opportunities for cybercriminals...
By Austin Williams  View Source  
Huawei Laptop Backdoor Flaw in Windows 10 Raises Concerns
A flaw in Huawei laptops's Windows 10 has been found by Microsoft researchers. This flaw could have been used to take control of computer and even more, and it had probably been introduced at the manufacturing stage. BBC news said Huawei denies any collusion with Beijing, corrected the flaw after it was notified about it in January. A British Prof told BBC the flaw is related to a known computer security issue, which has been abused by a wide variety of hackers, including those who are state-sponsored and criminal gangs...
By Jane Wakefield  View Source  
Taipei Government Shocked Hacker Invasion: Mayor Ko Wen-je's Visit Leaked
The Taipei Government computers have been hacked, lots of data, including Taipei Mayor Ke Wen-je (Ke Wenzhe) and his visit to the US, are believed to leak, the police have begun investigations. Months ago, 3 million health data are stolen, and the attacking IP has been confirmed from China. This time, because 11 computers of the Taipei international affairs team had been hacked just before Mayor Ke's Washington trip, politic factors, either from China or US, may be the root of it...
By Lee I-chia  View Source  
1 million StreetEasy accounts have been hacked
You are hunting for new home, but your data are for sale on dark web. Say less online may become a trend when more and more hacker stories are reported. A million StreetEasy accounts have been hacked and for sale on the dark web. The company confirmed Tuesday evening. It's difficult for StreetEasy, its spokesperson said the stolen data included email addresses, user names and encrypted passwords. The actual leakage are even more, like phone numbers, the last four digits, card type, expiration dates, and billing addresses...
By JIM DALRYMPLE  View Source  
Formjacking Is the New Favorite Hack of Cyber Crooks
In some cases, your personal data is leaked not from your side. Every month, 4,800 websites around retail websites are targeted by cyber criminals, who snatch credit/debit card information with a hacking technique called formjacking, one of the newest favorite ways for hackers to steal personal data. Now small and medium-sized businesses are still the biggest targets of formjacking, but British Airways and Ticketmaster have also fallen victim to attacks. It possibly hurts confidences of online business...
By ALYSSA NEWCOMB  View Source  
Dow Jones 2.4M Records Left Exposed from Amazon Server
We usually think financial organization like Dow Jones should have higher data security standards. A bad news is telling its watchlist of more than 2.4 million 'high-risk' clients was leaked to the public due to incorrectly configured from unsecured Elasticsearch database, hosted on AWS, the famous cloud of Amazon. A report said the the list, as big as 4.4GB, was sitting on a public Elasticsearch and available for public access. We doubt that game level technology or management can really protect serious privacy?
By Adam Shepherd  View Source  
Hackers Start Exploiting Serious WinRAR Flaw to Spread Malware
If you are WinRAR user, you shouldn't ignore this warning: hackers are starting to exploit its newly disclosed bug to secretly install malware on Windows. A Chinese security firm has uncovered several samples that exploit the WinRAR vulnerability to deliver malware. The first sample was detected only two days after the WinRAR bug was disclosed. Over 500 million users'privacy are in risk because of WinRAR, hacker, or even the vulnerability reporter?
By Michael Kan  View Source  
Are Huawei Phones Safe for Your Private Communication
When you choose cell phone, please consider its security reputation or say does it deserve your trust. Last year, Huawei phones were banned by networks including Verizon and AT&T for possible security threat Meanwhile, a few security analysts believe it is entirely plausible that the firm’s phones could be used to spy. Here we don't want to put a finger to any vendor but just raise a serious question: now that we know phones are very different in protecting privacy, why some guys choose weaker ones?
By Kate O'Flaherty  View Source  
North Korean Hackers Allegedly Pick on Russian Targets
North Korean hackers, known as Lazarus Group and run by government, typically focuses objects of South Korea, Japan and the U.S., but since January one of its suspected campaigns appears to have targeted Russian businesses. Some reports from international cyber security companies shew the attacks are with its signature Lazarus backdoor malware. Is it a positive signal for Feb summit?...
By Bradley Barth  View Source  
China Facial Recognition Database Leak Sparks Fears
The new data leaking is about 2.5 million people's personal data, including facial recognition database; it's causing huge worry in common Chinese people, who used to not wear mask or similar cover in public. But if the AI companies, which run security software systems for face recognition, crowd analysis, and personal verification, just like SenseNets, expose our privacy data easily, do we need makeup somehow to protect our faces?...
By Kate O'Flaherty  View Source  
How Facebook Harvests Personal Data from Popular Apps
Facebook has been covertly collecting deeply personal information from a number of popular apps without your knowing. At 11 or more Apps have been sending personal data to Facebook. For example, Realtor, a real estate app, is linked with the collection as a Wall Street Journal investigation found. Other highly sensitive data are like users' weight, height, blood pressure, and even pregnancy status...
By ANNIE PALMER  View Source  
Privacy Data of Chinese Celebrities Is Reportedly for Sale
Some Chinese starts find their privacy data are for sale too. Either east or west, celebrities have found themselves victims of cyber attacks. However, difference or gap still remind us even in hackers' world: information on celebrities in China is easier and cheaper. Local Chinese media outlet Beijing News claims that they discovered it cost just US$45 to purchase data on more than 700 celebrities...
By Masha Borak  View Source  
The Best Free Antivirus Protection for 2019
Your antivirus should definitely have the ability to root out existing malware, but its ongoing task is to prevent ransomware, botnets, Trojans, and other types of nasty programs from getting a foothold. Even if you're running Windows 10, you shouldn't rely on Microsoft's security tools only. Many free third-party security apps are more effective at keeping you safe...
By Neil J. Rubenking  View Source  
Singapore HIV Data Leak Shakes Vulnerable Community
Details of more than 14,000 HIV infected people in Singapore had been made public in a massive data breach. The government has blamed the leak on the American partner of a local doctor, who had access to the records kept on all known HIV-positive people in Singapore. This leak isn't due to a traditional hacker, but an internal player, whose job granted him rare access to the confidential registry...
By Sharanjit Leyl  View Source  
Russian Hackers Leave Chinese in Their Cyberdust
Who is the champion on the hacker world? In the country sponsored race, Russian get the first place. Kremlin-backed groups, such as "Fancy Bear", take only 18 minutes and 49 seconds on average to "break out", or move from a single computer they have compromised into other machines in an organisation's network. The same task will costs two hours 20 minutes for North Korean hackers, and 4-5 hours for hackers of China and Iran...
By Mark Bridge  View Source