Category: Cybersecurity News

Timehop was Hacked – Data Breach Exposes 21 Million Users

Timehop, the extremely popular app that allows users to share their previous moments, has reported that it was the victim of a major data breach over the holiday, which took place on the Fourth of July. Timehop is available for both iOS and Android smartphone users and, since its startup in 2011, the app has ...

The Recent 4G LTE Network Vulnerabilities and Attacks

In this blog post, I'll discuss the design and operation of a 4G LTE network. In hindsight, I realize topics such as these can get extremely lengthy. For that reason, I'll limit this discussion down to only the necessary technical details required to understand these new LTE attacks, while excluding any complicating, non-essentials. These new ...

Wi-Fi Networks to Receive a Massive Security Upgrade: Wi-Fi Alliance Launches WPA3

Yesterday, the Wi-Fi Alliance announced the long-awaited, next generation in Wi-Fi security, WPA3. After 15 years, WPA3 will now begin to replace the existing WPA2 protocol, which is currently used by billions of wireless devices every day. For quite some time, WPA2 has long been considered insecure. It has always been vulnerable to brute force ...

Over 3,000 iOS and Android Apps Leak 100 Million User Sensitive Records via Misconfigured Firebase Backends

When building an app that needs to store and share data from a server, software developers can rely on Google's Firebase Realtime cloud-hosted database. This Infrastructure as a Service (IaaS) removes serious time constraints by providing app developers with maintenance and support, offline support, and real-time synchronization of data with clients in real-time. And, since ...

KRACK Attacks: Key Reinstallation AttaCKs that Break WPA2

This is something I covered last year, but I wanted to go more in-depth in this topic now that there is more information on it. Our Wi-Fi wireless networks are currently protected by a security encryption protocol called "Wi-Fi Protected Access 2 (WPA2)." In the previous decades before, our wireless networks depended on a legacy ...