data breach - News, Features, and Slideshows
data breach in pictures
Account information for users of Twitch, the popular live-streaming service for gamers, may have been accessed through unauthorised means, the service warned on Monday.
By Zach Miners | 24 March, 2015 08:32
Retailers beware: A new Trojan program targets point-of-sale (PoS) terminals, stealing payment card data that can then be abused by cybercriminals.
By Lucian Constantin | 24 March, 2015 01:46
Attackers who compromised personal data of about 11 million customers of healthcare provider Premera were likely after intelligence about groups or individuals, not cashing in on the information, even though it has enormous market value, experts say.
By Tim Greene | 20 March, 2015 02:10
Proposed legislation that would require U.S. businesses to notify affected customers after data breaches is too weak because it would preempt stronger breach notification laws in several states and it wouldn't cover several classes of data, including geolocation and health information, critics told lawmakers.
By Grant Gross | 19 March, 2015 05:30
Premera Blue Cross may have been attacked using the same methods employed against its fellow health insurer Anthem, suggesting that a single group may be behind both breaches.
By Jeremy Kirk | 18 March, 2015 15:18
The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.
By By Michael Crouse | 28 June, 2014 04:12
Follow me, if you will, on a journey back in time to just one year ago. As 2013 turned into 2014, the information security industry was buzzing about the latest spate of breaches. Target had ushered in a new era of retail security breaches, with 40 million card numbers lost to the hackers. Little did we know at the time that this was just the beginning, and small potatoes in comparison to what was to come. One year ago, Neiman Marcus and Michaels had joined Target, and I wrote in response to the growing number of breach disclosures that "in fact, I have to wonder which retailers have not suffered breaches. The word on the street is that at least a half-dozen other retailers were compromised in the past few months, without publicity." Sadly, this turned out to be true. I hate being right all the time.
By By J.F. Rice | 12 February, 2015 05:01
Beyond the compromise of valuable information, loss of revenues and damage to brand reputation, data breaches can pose a threat to the careers of security professionals involved: witness the sudden departures of both the CEO and the CIO of Target after last year's compromise of 40 million customers' credit cards.
By Tim Greene | 29 January, 2015 02:48
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
By Jeremy Kirk | 17 September, 2013 12:01
Think you can guess the No. 1 threat to the security of your stored data? If you said hackers, or even trouble-making insiders, you'd be wrong. While malicious threats are an ongoing concern, it's your well-meaning employees who are more likely to unknowingly expose your company's stored data through, say, a file-sharing network or a misplaced laptop.
By Mary Brandel | 10 February, 2009 09:12
Whitepapers about data breach
Targeted phishing attacks are affecting the security in businesses of all sizes. This helpful infographic shows who’s at risk, why data breaches are growing and the layers of defence you can have. • 1 in 2 phishing attacks have been targeted at large enterprises • Attacks on businesses with 1 to 250 employees have increased in the last two years • Most mobile vulnerabilities are on the Apple iOS platform
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
- FT.Net Solution ArchitectNSW
- CCMobile iOS DeveloperNSW
- CC.Net Solution ArchitectNSW
- CCMobile Designer / Developer - IOSNSW
- CCDBA (Oracle/SQL)NSW
- CCSenior Systems EngineerNSW
- CCMobile Designer / Developer - IOSNSW
- FTBusiness Management - Account Director - Leading Entertainment ClientNSW
- CCFront End Web Developer (Drupal)NSW
- FTJunior Media Buyer - Sales CoordinatorNSW
- FTSenior SQL DBANSW
- FTApplication Support SpecialistNSW
- CCSenior Release EngineerNSW
The most basic network attacks attempt to overwhelm a defensive device with sheer volumes of traffic. Sometimes these volumetric attacks are designed to overload the connections-per-second (CPS) capacity (e.g., the ramp-up rate). Learn how to mitigate DDoS attacks
- FCC will vote next month on plan to share valuable 3.5GHz spectrum
- Intel could strengthen its server product stack with Altera
- Kleiner Perkins cleared of sex discrimination against Ellen Pao
- Facebook reveals the logic behind its forced Messenger split
- French self-driving car goes for a spin around Paris monument
- Google to bring imaging, sensor technology to the operating room
- 5 freshly-funded cloud computing companies worth watching
- Why Meerkat and Periscope are the next big challenge for marketers
- USB Type-C peripherals are on the way, and storage devices are first up
- Microsoft should forget the Surface, stick to the Pro 2-in-1 line
- Slack hacked, compromising users' profile data
- Congress moves quickly on cyberthreat information sharing
- New mobile-malware detection technique uses gestures
- Google Cloud Launcher deploys VM-based apps in a snap
- Apple Watch mini-stores to open in London, Paris, Tokyo luxury retail shops