Data Leaks
![a woman laying in the grass](https://securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Ironic: LetMeSpy Spyware Hackers Were Hacked (by Hackers)
Richi Jennings | | android spyware, cyberstalking, Data breach, Data Leaks, iOS spyware, LetMeSpy, maia arson crimew, Malware Spyware, Parental Control, parental controls, Privacy, SB Blogwatch, spyware, Stalkerware, Stalking, Stalkware
Content warning: Abuse, stalking, controlling behavior, Schadenfreude, irony, doxxing ...
Security Boulevard
![FBI seizes WeLeakInfo.com website for allegedly selling sensitive data breach info](https://securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
FBI seizes WeLeakInfo.com website for allegedly selling sensitive data breach info
The FBI, in cooperation with law enforcement from the UK, Netherlands, Germany and Ireland, seized the WeLeakInfo.com web site for allegedly selling personal information from data breaches. Crafted as a typical search ...
![working, home, hybrid, distributed workspaces hybrid digital work security](https://securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Keeping Workplace Privacy Accidents to a Minimum
Data privacy is taking center stage in countries worldwide. Organizations are strengthening privacy controls in the face of endless data breaches, tighter regulations, stiff penalties and customer pushback. We’re undergoing a major ...
Security Boulevard
![attacks Menlo Security FluBot Android Trojan mobile pandemic](https://securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
5 Mobile Security Threats to Recognize
Terry Higgins | | Data Leaks, mobile devices, Mobile Security, OS, passwords, social engineering, Wi-Fi
Mobile security has become a top concern for a number of companies, as the average cost of a corporate data breach is $3.86 million. Employees often access and use corporate data through ...
Security Boulevard
![VPN](https://securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
VPN Leaks: Knowing, Understanding and Preventing
VPNs have become much more popular as a way for people to keep their data secure in an increasingly insecure world. As the technology has grown in prevalence, a number of different ...
Security Boulevard
![A Practical Way to Use NFC Data to Exfiltrate Data](https://securityboulevard.com/wp-content/plugins/pt-content-views-pro/public/assets/images/lazy_image.png)
Meet NFCdrip – a New Security Concern for Air-Gapped Systems
Haidee LeClair | | air gap, air gapping, air-gapped systems, android, Android's NFC design, Attack Surface, Blog, data exfiltration, Data Leaks, near field communication, NFC, NFC frequency, NFC radio, NFCdrip, RFID, Technical Blog, vulnerable IoT objects
Air-gapping means physically isolating a secure computer from unsecured networks, such as the public Internet or an unsecured local area network. The concept of air-gapping represents just about the maximum protection one ...