Remove Book Remove Passwords Remove VPN
article thumbnail

Barnes & Noble Experiences Major Data Breach

Adam Levin

The cyberattack also impacted the company’s online services relating to its Nook line of e-book readers. While Barnes & Noble has yet to provide details of the nature of the cyberattack, a security researcher pointed out that the company’s VPN servers had not been patched against a critical vulnerability.

article thumbnail

Weekly Update 334

Troy Hunt

Plus, there's a heap of new data breach and some really, really good news about the NTLM hashes now being available in Pwned Passwords. Book a demo today. In short - it's painful - but listen to this week's update to hear precisely why. It's Device Trust tailor-made for Okta.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

1 in 10 people do nothing to stay secure and private on vacation

Malwarebytes

38% of people said they will book their next travel opportunity through a general search, which could leave them vulnerable to malvertising. Take, for example, the 38% of people who told Malwarebytes that they would conduct a general search online in booking their next vacation.

article thumbnail

Tips to make your summer travels cyber safe

Webroot

Fewer than 1 in 3 travelers (31%) protect their data with a virtual private network (VPN) when traveling internationally. As soon as you start booking your trip, the cybercriminals start circling. Be sure to create strong passwords for your accounts and check your balances regularly.

VPN 82
article thumbnail

Google just spilled its airfare secrets: here's the cheapest day to book your next flight

Zero Day

PT Getty Images The last time I booked a vacation flight, I literally spent over an hour finding the cheapest ticket to Hawaii with two criteria in mind: that it wasn't a red-eye flight, and it only had one layover. What is the cheapest day to book a flight? Written by Chris Bayer, Editor June 6, 2025 at 4:30 a.m.

article thumbnail

Everyday Threat Modeling

Daniel Miessler

Example 2: Using a VPN. A lot of people are confused about VPNs. If you log in at the end website you’ve identified yourself to them, regardless of VPN. VPNs encrypt the traffic between you and some endpoint on the internet, which is where your VPN is based. This is true. So, probably not a win.

VPN 326
article thumbnail

Have I Been Pwned is Now Partnering With 1Password

Troy Hunt

The penny first dropped for me just over 7 years ago to the day: The only secure password is the one you can't remember. In an era well before the birth of Have I Been Pwned (HIBP), I was doing a bunch of password analysis on data breaches and wouldn't you know it - people are terrible at creating passwords! Everywhere.