Hacking

The Dropbox Data Breach

The dropbox data breach that recently took place highlighted prior security breaches. The passwords and data compromised come within an extensive list of primarily exposed credentials. It seems like dropbox is a frequent target for hackers. Dropbox might be considered negligent, but is that the case? Let us reflect further. How Did it Happen Like […]

An Overview of the Optus Infotech Hack

Australian telecom giant, Optus, fell victim to a hack. Exposing nearly 2.1 million of its current and previous clients suffered a data leak of their personal and critical information. With at least one form of their identification number leaked due to the breach. Optus infotech has already started its quest to try and save itself. […]

Uber Admits Covering up 2016 Hacking, Avoids Prosecution in U.S. Settlement

Uber Technologies Inc on Friday accepted responsibility for covering up a 2016 data breach that affected 57 million passengers and drivers, as part of a settlement with U.S. prosecutors to avoid criminal charges. In entering a non-prosecution agreement, Uber admitted that its personnel failed to report the November 2016 hacking to the U.S. Federal Trade […]

Apple and Android Phones Hacked by Italian Spyware, Google Says

An Italian company’s hacking tools were used to spy on Apple Inc and Android smartphones in Italy and Kazakhstan, Alphabet Inc’s Google said in a report on Thursday. Milan-based RCS Lab, whose website claims European law enforcement agencies as clients, developed tools to spy on private messages and contacts of the targeted devices, the report […]

Instagram introduces security tool to recover hacked accounts

Instagram announced on Tuesday a security feature that would enable its users to help recover their hacked accounts.   The Facebook owned platform revealed the new tool called “Security Checkup” in a blog post to guide its users, whose accounts may have been hacked, through the steps needed to secure them.  Users through this feature will undergo four major steps: after checking their login activity, they will be asked to review their profile information, followed by a confirmation […]