Remove Accountability Remove Authentication Remove Hacking Remove Personal Security
article thumbnail

On the Twitter Hack

Schneier on Security

Twitter was hacked this week. Not a few people's Twitter accounts, but all of Twitter. The hacker used that access to send tweets from a variety of popular and trusted accounts, including those of Joe Biden, Bill Gates, and Elon Musk, as part of a mundane scam -- stealing bitcoin -- but it's easy to envision more nefarious scenarios.

Hacking 312
article thumbnail

No, Spotify Wasn't Hacked

Troy Hunt

Here's a perfect example of what I'm talking about, this one eventually triggering an email to me just last week: Let's imagine you're the first person on the list; you get a notification from HIBP, you check out the paste and see your Hotmail account listed there alongside your Spotify password and the plan you're subscribed to.

Hacking 223
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Until we eliminate passwords, follow these 4 sure steps to password hygiene

The Last Watchdog

With so much critical data now stored in the cloud, how can people protect their accounts? But simpler passwords are much easier to hack. After breaking a password, cybercriminals don’t only access that single account. Silo your risk by generating a unique password for each of your online accounts.

Passwords 244
article thumbnail

What Are the Risks of a Data Breach?

Identity IQ

The type of data disclosed could involve anything personal, such as names, addresses, Social Security numbers , and financial data. Breaches can occur due to various reasons, including cyberattacks, hacking, employee negligence, physical loss of devices, and social engineering to name a few.

article thumbnail

The 773 Million Record "Collection #1" Data Breach

Troy Hunt

One of my contacts pointed me to a popular hacking forum where the data was being socialised, complete with the following image: As you can see at the top left of the image, the root folder is called "Collection #1" hence the name I've given this breach. The collection totalled over 12,000 separate files and more than 87GB of data.