data breach - News, Features, and Slideshows
data breach in pictures
The U.S. Securities and Exchange Commission has charged 32 defendants with fraud in an international scheme that used stolen, yet-to-be-published press releases from hacked websites to conduct stock trades.
By Grant Gross | 13 August, 2015 02:32
Nine people face criminal charges in the U.S. for allegedly hacking three press release distributors and stealing yet-to-be-published announcements in a stock trading scheme that authorities say generated about US$30 million in illegal profits.
By Grant Gross | 12 August, 2015 04:33
Retailer Fred's said Monday it found malware that collected payment card details on two of its servers, but it doesn't appear the data was removed from its systems.
By Jeremy Kirk | 11 August, 2015 11:38
Travel industry software maker Sabre is the latest company said to have been hit by the same hackers who recently attacked U.S. health insurer Anthem and the U.S. Office of Personnel Management (OPM), while American Airlines has been investigating its own systems for evidence of a similar breach.
By Katherine Noyes | 08 August, 2015 03:36
A group of Israeli researchers have improved on a way to steal data from air-gapped computers, thought to be safer from attack due to their isolation from the Internet.
By Jeremy Kirk | 07 August, 2015 10:55
The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.
By By Michael Crouse | 28 June, 2014 04:12
Follow me, if you will, on a journey back in time to just one year ago. As 2013 turned into 2014, the information security industry was buzzing about the latest spate of breaches. Target had ushered in a new era of retail security breaches, with 40 million card numbers lost to the hackers. Little did we know at the time that this was just the beginning, and small potatoes in comparison to what was to come. One year ago, Neiman Marcus and Michaels had joined Target, and <a href="http://www.computerworld.com/article/2487265/security0/security-manager-s-journal--cyberattacks-just-got-personal.html">I wrote in response to the growing number of breach disclosures</a> that "in fact, I have to wonder which retailers have <em>not</em> suffered breaches. The word on the street is that at least a half-dozen other retailers were compromised in the past few months, without publicity." Sadly, this turned out to be true. I hate being right all the time.
By By J.F. Rice | 12 February, 2015 05:01
Beyond the compromise of valuable information, loss of revenues and damage to brand reputation, data breaches can pose a threat to the careers of security professionals involved: witness the sudden <a href="http://www.networkworld.com/article/2174919/network-security/target-cio-resigns-following-breach.html">departures of both the CEO and the CIO</a> of Target after last year's compromise of 40 million customers' credit cards.
By Tim Greene | 29 January, 2015 02:48
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
By Jeremy Kirk | 17 September, 2013 12:01
Think you can guess the No. 1 threat to the security of your stored data? If you said hackers, or even trouble-making insiders, you'd be wrong. While malicious threats are an ongoing concern, it's your well-meaning employees who are more likely to unknowingly expose your company's stored data through, say, a file-sharing network or a misplaced laptop.
By Mary Brandel | 10 February, 2009 09:12
Whitepapers about data breach
This global study involving 350 companies in 16 industry sectors looks at the impact of data breaches and trends. The results from this annual research give insight and a better understanding of the factors that can minimise the financial consequences of a data breach, as well as the positive impact a business continuity management (BCM) program can have on the financial and reputational consequences of breaches.
Flash storage represents a quantum leap from the storage layer in terms of performance, however it is crucial companies understand their I/O profile in order to formulate a successful storage strategy. Find out in this eBook how flash storage can be beneficial for enterprises and useful questions to ask before making an informed decision on the purchase.
- CCIT Hadoop DevelopersQLD
- CCDesktop Support Engineer/Service Desk AnalystNSW
- CCSAP CRM Specialist- ABAPACT
- FTCyber Security SpecialistNSW
- CCSAP ABAP ProgrammersACT
- CCMultiple Java rolesACT
- CCLync/Skype EngineerNSW
- FTSystems Administrator/Engineer | $60-90K package | Northern BeachesNSW
- CCContract Analyst Programmer (Java/Visual VB.net) 160115/AP/vhsAsia
- FTNetwork EngineerNSW
- FTJunior Developer | C#, MVC & SQL | Class FinanceNSW
- CCImmediate iOS Developer RequiredNSW
- CCContract System Analyst (Network & System Mgt.) 160205/SA/561Asia
- CCContract System Analyst (SQL/.net) 160205/SA/561Asia
- FTSenior Front End Developer Required Working World Leading Digital TeamVIC
- CCIT Performance Test AnalystACT
- FTJava or Ruby Web DeveloperVIC
- CCContract System Engineer (Lotus Domin) 160129/SE/vccAsia
- CCSenior Android DeveloperNSW
- CCContract Analyst Programmer (Crystal Reports) 160129/AP/vhs-aAsia
- CCWeb DeveloperNSW
- CCTest ManagerQLD
- CCIT Solution Designer (SOA / Web-services)NSW
- CCJava Development Contract - MelbourneVIC
- CCSolution Architect - .NET environmentACT
Organisations are struggling with a torrent of data thanks to cloud computing, mobility and the Internet of Things. And conventional backup and recovery methods are failing. This white paper outlines the benefits of a modern approach to disaster recovery.
- Java-based Trojan was used to attack over 400,000 systems
- HPE servers get new names to help users figure out what they can be used for
- Amazon Web Services goes gunning for gamers with free FPS framework
- Android Studio 2.0 beta speeds up app restarts
- US government wants to sharply increase spending on cybersecurity
- Facebook faces restrictions in France on data transfer to US, tracking of users
- Cisco boosts, broadens Catalyst switches
- Flaws in Trane thermostats underscore IoT security risks, Cisco says
- Microsoft's Azure Stack beta gets new services and DevOps tools
- 9 technologies that could cut demand for lawyers, lower legal fees
- Prysm combines displays with SaaS to extend the reach of enterprise collaboration
- Kingston buys encrypted flash drive maker IronKey
- Users await possible Twitter feed change
- Microsoft previews enterprise-grade setting sync in Windows 10
- Forget Trump and Clinton: IBM's Watson is running for president