data breach - News, Features, and Slideshows
data breach in pictures
A hacker extracted customer log-in credentials from a server owned by Bitdefender that hosted the cloud-based management dashboards for its small and medium-size business clients.
By Lucian Constantin | 31 July, 2015 23:40
The cyberespionage group that stole the personal records of millions of Americans from U.S. health insurer Anthem and the U.S. Office of Personnel Management (OPM) has also reportedly breached United Airlines.
By Lucian Constantin | 30 July, 2015 20:14
The U.S. Census Bureau said a data breach early last week did not expose survey data it collects on households and businesses.
By Jeremy Kirk | 27 July, 2015 10:41
Cybercriminals are casting increasingly wider nets in their search for new point-of-sale systems to infect. This appears to be the case with a new memory scraping malware program called GamaPoS that's distributed by a large botnet known as Andromeda.
By Lucian Constantin | 17 July, 2015 02:54
Two sister mobile and telecom service providers will pay a combined US$3.5 million after the U.S. Federal Communications Commission found that they were storing customers' personal data on unprotected servers accessible over the Internet.
By Grant Gross | 10 July, 2015 05:54
The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.
By By Michael Crouse | 28 June, 2014 04:12
Follow me, if you will, on a journey back in time to just one year ago. As 2013 turned into 2014, the information security industry was buzzing about the latest spate of breaches. Target had ushered in a new era of retail security breaches, with 40 million card numbers lost to the hackers. Little did we know at the time that this was just the beginning, and small potatoes in comparison to what was to come. One year ago, Neiman Marcus and Michaels had joined Target, and I wrote in response to the growing number of breach disclosures that "in fact, I have to wonder which retailers have not suffered breaches. The word on the street is that at least a half-dozen other retailers were compromised in the past few months, without publicity." Sadly, this turned out to be true. I hate being right all the time.
By By J.F. Rice | 12 February, 2015 05:01
Beyond the compromise of valuable information, loss of revenues and damage to brand reputation, data breaches can pose a threat to the careers of security professionals involved: witness the sudden departures of both the CEO and the CIO of Target after last year's compromise of 40 million customers' credit cards.
By Tim Greene | 29 January, 2015 02:48
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
By Jeremy Kirk | 17 September, 2013 12:01
Think you can guess the No. 1 threat to the security of your stored data? If you said hackers, or even trouble-making insiders, you'd be wrong. While malicious threats are an ongoing concern, it's your well-meaning employees who are more likely to unknowingly expose your company's stored data through, say, a file-sharing network or a misplaced laptop.
By Mary Brandel | 10 February, 2009 09:12
Whitepapers about data breach
Organisations are readily launching BYOD programs to boost employee productivity and reduce costs. But this all comes at a risk and you maintain your vigilance in sustaining compliance with data security and privacy regulations. This whitepaper looks at several best practices are key for maintaining regulatory compliance with any BYOD program.
Cloud, big data and analytics, mobile, social, and IT security have impacted networking – bringing it almost to breaking point. This whitepaper looks at the future of networking to accommodate these evolving trends.
With employees and customers increasingly depending on corporate websites, reliability and security have become more critical than ever.
- Telstra reveals increase in warrant-free access to customer data
- DNS server attacks begin using BIND software flaw
- Fake Apple iOS crash reports prove tricky to remove
- NBN to invest $40m to boost construction workforce
- Windows 10's usage share jumps 4x in three days
- Lawmakers propose new visa for foreign tech entrepreneurs
- Microsoft bests Google in patent case appeal
- Yahoo picks up fashion commerce site Polyvore
- Mt. Gox CEO Karpeles arrested by Japanese police
- Facebook says Flash security woes could hurt its business
- IBM fattens patent portfolio in cloud tech
- Microsoft scores with free Windows 10 upgrade as downloads tally 10x Windows 8's first-day sales
- It's SysAdmin Day: Let us celebrate with coffee
- ISP argues net neutrality rules violate its right to block content
- Former Hacking Team developer reportedly in contact with a terrorist group