Index/Organizations/Infosecurity Magazine

Infosecurity Magazine

UK scientific journal

Fact-Checks

6 results
Dec 8, 2025
Most Viewed

https://leakbase.la/

LeakBase (leakbase.la and related domains/forums) is repeatedly cited by researchers and outlets as a cybercrime forum and leak distributor that has posted large datasets — including a 16 million–reco...

Nov 25, 2025
Most Viewed

Types of duolingo threats and how to manage them

The dominant documented threat to Duolingo users in reporting is large-scale data scraping of public profiles — a disclosed incident that produced a dataset of about 2.6 million user records and expos...

Dec 14, 2025
Most Viewed

What metadata leaks can still expose Tor users to government surveillance?

Traffic and protocol metadata — such as which IP is connecting to which Tor relay, circuit timing and volume, and relay bandwidth claims — can still allow network-level observers (like ISPs or states)...

Nov 27, 2025

What are the risks of participating in carding?

Carding — the automated testing and fraudulent use of stolen card data — poses legal, financial, operational and technical risks to anyone involved, from buyers and sellers on underground markets to b...

Dec 2, 2025

What forensic indicators (wreckage, buoyancy aids, fuel stains) reveal typical cargo loads after interceptions?

Forensic indicators of intercepted cargo are rarely detailed in recent reporting, which focuses instead on theft methods (fraud, cyber intrusion, double-brokering) and prevention; sources emphasize do...

Nov 10, 2025

Can Tor browser protect against zero-day exploits on .onion sites?

Tor Browser reduces risk but does not eliminate the possibility of zero‑day exploits on .onion sites: historical incidents show browser vulnerabilities have been exploited in the wild, Tor maintainers...