article thumbnail

Hacking Grindr Accounts with Copy and Paste

Troy Hunt

The vulnerability allow an attacker to hijack any account. On a surface of it, things looked bad: complete account takeover with a very trivial attack. All I needed was for Scott to create an account and let me know the email address he used which in this case, was test@scotthelme.co.uk. Full account takeover.

article thumbnail

Professional services infosec policy template

Notice Bored

Professional services engagements, and hence the associated information risks, are so diverse that it made no sense to specify particular infosec controls, except a few examples. The policy is generic, pragmatic and yet succinct at just over 2 pages.

InfoSec 66
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Account Takeover Risks of Small Businesses: How to Avoid Them

CTOVision Cybersecurity

Read Ben Hartwig explain how small and medium businesses can avoid account takeover risks on Infosec Magazine: Account takeover seeks to infiltrate an existing account and use them for the […].

article thumbnail

Chik-fil-A Investigates 'Suspicious Activity' on Customer Accounts

SecureWorld News

Popular fast food restaurant chain Chik-fil-A recently said it was investigating reports of "suspicious activity" on customer accounts. chik-fil-a.com #cybersecurity #infosec @ChickfilA pic.twitter.com/kWSBpvQCNt — Dominic Alvieri (@AlvieriD). The breach that he mentions apparently involves customer accounts and loyalty points.

article thumbnail

Who’s to Blame for Hacked Social Media Accounts, Spoofed Online Meeting Requests and Malware

Security Boulevard

In episode 320, Tom and Scott discuss the contentious issue of who is accountable when Facebook or Instagram accounts are hacked, discussing potential failings on both the user’s and Meta’s part.

Media 75
article thumbnail

The World of Scambaiting, Preventing Social Media Account Takeovers, Network Wrenches Hacked

Security Boulevard

Then they switch to the best practices to prevent social media account takeovers, highlighting […] The post The World of Scambaiting, Preventing Social Media Account Takeovers, Network Wrenches Hacked appeared first on Shared Security Podcast.

Media 78
article thumbnail

Infosec principles (Hinson tips)

Notice Bored

Thinking about the principles underpinning information risk and security, here's a tidy little stack of "Hinson tips" - one-liners to set the old brain cells working this chilly mid-Winter morning: Address information confidentiality, integrity and availability, broadly Address internal and external threats, both deliberate and accidental/natural Celebrate (..)

InfoSec 63