data breach - News, Features, and Slideshows
data breach in pictures
Hackers have stolen user contact information, including email addresses and phone numbers, from the website of the European Central Bank and attempted to extort money from the institution.
By Lucian Constantin | 24 July, 2014 22:38
Six people have been indicted on charges of running an international ring that resold tickets bought through compromised StubHub accounts for some of New York's biggest concerts and sporting events.
By Martyn Williams | 24 July, 2014 05:34
A vulnerability in a web-based graphics system led to a breach of The Wall Street Journal's network by a hacker, the newspaper acknowledged late Tuesday.
By Jeremy Kirk | 23 July, 2014 20:34
Goodwill Industries International said on Monday that federal authorities are investigating a possible payment card breach at its US-based retail outlets.
By Jeremy Kirk | 22 July, 2014 13:43
Matt Oh, a senior malware researcher with HP, recently bought a single Aloha point-of-sale terminal -- a brand of computerized cash register widely used in the hospitality industry -- on eBay for US$200.
By Jeremy Kirk | 18 July, 2014 14:15
The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.
By By Michael Crouse | 28 June, 2014 04:12
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
By Jeremy Kirk | 17 September, 2013 12:01
Think you can guess the No. 1 threat to the security of your stored data? If you said hackers, or even trouble-making insiders, you'd be wrong. While malicious threats are an ongoing concern, it's your well-meaning employees who are more likely to unknowingly expose your company's stored data through, say, a file-sharing network or a misplaced laptop.
By Mary Brandel | 10 February, 2009 09:12
A new report warns that the cost from lost productivity at work related to the new NFL season could add up to US$10.5 billion. And there we were, thinking the biggest waste of time at work came from fielding an endless stream of IT industry reports?
By Network World staff | 16 September, 2008 09:53
Whitepapers about data breach
Eight breaches in 2013 provided a painful reminder that cybercrime remains prevalent. This year’s report once again covers the wide-ranging threat landscape, with data collected and analysed by security experts, while calling out seven areas that deserve special attention.
If you’re looking for your first ERP system or looking to upgrade from an existing system, the evaluation, selection and implementation process is a long-term strategic decision for your organization. To help you through this process, here are eight simple steps for a successful ERP system selection.
Internet expansion is moving beyond desktops and LANs, but many field service organizations have yet to explore the benefits of the Internet of Everything and expanded mobile connectivity. This whitepaper discusses the four basic usage models born from new data streams and services.
- LTE network for US public safety taking it one step at a time
- A new tool for disasters: The personal antenna
- Phone unlocking bill clears US House, next step is president's signature
- Apple hasn't exhausted its supply of Yosemite betas
- Oracle's new in-memory database option could spark unanticipated costs, expert warns
- Bose sues Beats over headphone patents
- SEC drops probe into Facebook's pre-IPO sales disclosures
- How Microsoft's CEO sees growth for Windows Phone and Lumia
- Thanks to NASA, you can now 3D print models of satellites, probes and planets
- Russian government offers money for identifying Tor users
- EU, Google, Microsoft, Yahoo meet on 'right to be forgotten' but questions remain
- The Pirate Bay makes searching for torrents easier on mobile devices
- Changes afoot as DARPA challenge robots prep for upgrade
- Apple faces privacy suit following Chinese TV report
- Government pushes website blocks to fight piracy