Skip to main content


    Cyber Criminals Can Hack Your Plane Tickets
    Cyber Criminals Can Hack Your Plane Tickets

    The Global Distribution System (GDS) is a unique tool used by travel agents worldwide to book air travel – yet it has very few security features. Unless the system’s IT infrastructure is overhauled, cybercriminals will continue to be able to access passengers’ personal data and hack their plane tickets.

    Guerre des ransomwares, les bases MongoDB dans la tourmente
    Ransomware wars: MongoDB databases under siege

    The dangers of unsecured connected devices were made all too clear in 2015 when the personal data of more than 3 million Hello Kitty clients, stored on an open MongoDB database, was leaked to the public. Today, companies continue to suffer from major data leaks caused by inadequate security, as seen in the Ghostshell affair.

    A French researcher demonstrates homographic phishing
    A French researcher demonstrates homographic phishing

    Despite the widespread notoriety of the processes used in phishing campaigns, they continue to claim victims. In general, acts of fraud can be detected by paying close attention to the URL.

    Data leak of 36 million user accounts : a brutal “awareness” campaign

    A Romanian hacker acting under the pseudonym GhostShell has posted 36 million user accounts stolen by compromising 110 MongoDB databases. Among these accounts, 3.6 million are coupled with passwords.

    Des hackers loupent le casse du siècle
    Hackers miss out on the heist of the century because of a spelling error

    Hackers robbed over $951 million from the Federal Bank of Bangladesh, but “only” $81 million actually slipped through the cracks and into the hands of the criminals. The remaining $870 million were frozen and should be returned to the Federal Bank of Bangladesh.

    Are passwords a thing of the past?

    In 2015, the most frequently-used password was (and still is) “123456”. For reasons of security, and because users cannot always remember a strong, unique password for each account, businesses are taking the bull by the horns and testing new ways of authentication. This article will take you on a quick tour of intrusion-prevention methods. Simple […]