How to Prevent a Data Leak?
In this blog, we walk you through the steps necessary to prevent a data leak in your organization.
In this blog, we walk you through the steps necessary to prevent a data leak in your organization.
In this blog, we walk you through your options once you’re aware that you’re at risk of identity theft.
In this blog, we discuss what makes or breaks a data breach search engine.
In this blog, we provide you with the data breach investigation and mitigation checklist necessary to avoid mishaps when dealing with a data breach.
In this blog, we walk you through the TikTok and weChat data breaches in more detail – join us to learn more!
Preface Data breach classification is a part of BreachDirectory. Data breach classification is made possible by using classifiers that can provide strong assumptions in regards to what’s going to happen next in the data breach world by looking at data. Simply put, this classifier learns from data. The more data is provided, the more accurate the calculations get. Classification – email addresses The following table depicts the probability of email domain usage in the next data breach: # Email Domain…
Introduction Zynga is an American social game developer. The company was founded in April 2007 with headquarters in San Francisco, California, United States. The company has a mission to “connect the world through video games”. The company has developed multiple well-known games including Farmville, Zynga Poker, Words With Friends, Mafia Wars and Empires & Allies amongst others. Zynga acknowledged the breach in September 2019 – in total, the data breach contains 206,267,210 records including duplicates and 150,363,954 records without duplicates….
Preface Edmodo, an educational technology company offering a communication, collaboration and coaching platform to K-12 schools and teachers, suffered a data breach in the spring of 2017. The stolen data includes usernames, email addresses and passwords. After the company found out about the data breach, they contracted third party cybersecurity experts to conduct a full analysis to determine how the hackers managed to access their system. What data is at risk? The breached Edmodo data includes IDs, usernames, email addresses…
Preface The 2013 Verizon Breach Report found that 76% of intrusions exploited weak or stolen credentials. The problem is apparent – password reuse. It’s been there for a long time and as sad as it is, it seems that we’re not moving away from passwords anytime soon. The Exploit.in data breach is one of the prime examples of this problem in the wild. What is it? The Exploit.in data breach does not originate from one particular website – rather, it…
Preface On November 23, 2017 imgur was notified of a potential security breach. The breach affected email addresses and passwords of approximately 1.7 million imgur users – with duplicates, the data includes 1,757,680 records. What data is at risk? After the data breach was disclosed, the imgur team said that data at risk includes email addresses and passwords. The service says it always encrypted user passwords, but it admits passwords may have been cracked using brute force due to an…