data breach - News, Features, and Slideshows
data breach in pictures
Adult Friend Finder, one of the largest online dating sites, may have been breached more than two months ago, and the sensitive files -- include names, ages, email addresses, zip codes and more -- are apparently still online.
By Jeremy Kirk | 22 May, 2015 12:44
Cybercriminals are increasingly copying cyberespionage groups in using targeted attacks against their victims instead of large-scale, indiscriminate infection campaigns.
By Lucian Constantin | 05 May, 2015 22:00
Sally Beauty Holdings said it is investigating another possible payment card breach, about a year after it reported a similar cyberattack.
By Jeremy Kirk | 05 May, 2015 12:32
The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.
By By Michael Crouse | 28 June, 2014 04:12
Follow me, if you will, on a journey back in time to just one year ago. As 2013 turned into 2014, the information security industry was buzzing about the latest spate of breaches. Target had ushered in a new era of retail security breaches, with 40 million card numbers lost to the hackers. Little did we know at the time that this was just the beginning, and small potatoes in comparison to what was to come. One year ago, Neiman Marcus and Michaels had joined Target, and I wrote in response to the growing number of breach disclosures that "in fact, I have to wonder which retailers have not suffered breaches. The word on the street is that at least a half-dozen other retailers were compromised in the past few months, without publicity." Sadly, this turned out to be true. I hate being right all the time.
By By J.F. Rice | 12 February, 2015 05:01
Beyond the compromise of valuable information, loss of revenues and damage to brand reputation, data breaches can pose a threat to the careers of security professionals involved: witness the sudden departures of both the CEO and the CIO of Target after last year's compromise of 40 million customers' credit cards.
By Tim Greene | 29 January, 2015 02:48
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
By Jeremy Kirk | 17 September, 2013 12:01
Think you can guess the No. 1 threat to the security of your stored data? If you said hackers, or even trouble-making insiders, you'd be wrong. While malicious threats are an ongoing concern, it's your well-meaning employees who are more likely to unknowingly expose your company's stored data through, say, a file-sharing network or a misplaced laptop.
By Mary Brandel | 10 February, 2009 09:12
Whitepapers about data breach
Targeted phishing attacks are affecting the security in businesses of all sizes. This helpful infographic shows who’s at risk, why data breaches are growing and the layers of defence you can have. • 1 in 2 phishing attacks have been targeted at large enterprises • Attacks on businesses with 1 to 250 employees have increased in the last two years • Most mobile vulnerabilities are on the Apple iOS platform
Axon wanted to win more business by reaching out to CIOs and key technology decision makers with more flexible, affordable and easy-to-manage disaster recovery solutions.
This whitepaper gives an overview of networks and applications, describes basic principles of web application optimization, and then examines the benefits and drawbacks of various acceleration techniques to ultimately improve web application performance. •Most organisations want to improve web application performance for their users, but they can’t always justify the cost of implementing acceleration techniques •A simplified web application acceleration solution that lowers the operational and commercial barriers and improves user experience is idea •F5 offers a simple, low-risk, and low-cost acceleration solution that can significantly improve the end-user experience
- Amazon rules Gartner's magical box
- Google gives Android developers new tools for tracking app performance
- Microsoft offers Windows 10 carrot, threatens with stick
- US Senate leader pushes to extend NSA phone dragnet
- IBM defends use of temp visa workers
- Marines test augmented reality battlefield
- Pebble Time smartwatch to begin shipping on May 27
- Adblock browsers for Android and iOS to keep mobile ads, tracking at bay
- Torque G02 smartphone doesn't mind a saltwater dunk
- The Upload: Your tech news briefing for Friday, May 22
- Factory reset in Android phones leaves sensitive user data behind
- Secom security drone follows, photographs intruders
- Alibaba's UC Browser found leaking users' data
- Freelance hacking site vows to clean up dodgy listings
- Bigcommerce, PayPal team up for payments