data breach - News, Features, and Slideshows
data breach in pictures
The IT infrastructure of the National Research Council of Canada was recently compromised by highly sophisticated Chinese state-sponsored hackers, the Canadian government said Tuesday.
By Lucian Constantin | 30 July, 2014 03:43
Hackers have stolen user contact information, including email addresses and phone numbers, from the website of the European Central Bank and attempted to extort money from the institution.
By Lucian Constantin | 24 July, 2014 22:38
Six people have been indicted on charges of running an international ring that resold tickets bought through compromised StubHub accounts for some of New York's biggest concerts and sporting events.
By Martyn Williams | 24 July, 2014 05:34
A vulnerability in a web-based graphics system led to a breach of The Wall Street Journal's network by a hacker, the newspaper acknowledged late Tuesday.
By Jeremy Kirk | 23 July, 2014 20:34
Goodwill Industries International said on Monday that federal authorities are investigating a possible payment card breach at its US-based retail outlets.
By Jeremy Kirk | 22 July, 2014 13:43
The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.
By By Michael Crouse | 28 June, 2014 04:12
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
By Jeremy Kirk | 17 September, 2013 12:01
Think you can guess the No. 1 threat to the security of your stored data? If you said hackers, or even trouble-making insiders, you'd be wrong. While malicious threats are an ongoing concern, it's your well-meaning employees who are more likely to unknowingly expose your company's stored data through, say, a file-sharing network or a misplaced laptop.
By Mary Brandel | 10 February, 2009 09:12
A new report warns that the cost from lost productivity at work related to the new NFL season could add up to US$10.5 billion. And there we were, thinking the biggest waste of time at work came from fielding an endless stream of IT industry reports?
By Network World staff | 16 September, 2008 09:53
Whitepapers about data breach
Eight breaches in 2013 provided a painful reminder that cybercrime remains prevalent. This year’s report once again covers the wide-ranging threat landscape, with data collected and analysed by security experts, while calling out seven areas that deserve special attention.
If you’re looking for your first ERP system or looking to upgrade from an existing system, the evaluation, selection and implementation process is a long-term strategic decision for your organization. To help you through this process, here are eight simple steps for a successful ERP system selection.
In this report From Infrastructure to Applications: The Future of IT is On-Demand Network World evaluates how IT departments are employing disruptive virtualisation and cloud computing approaches to support business growth and move IT into a value-adding profit centre.
- Vodafone says it's 'right in the middle' of turnaround
- Samsung, Apple still dominate smartphones, but their shares slip
- Ford and GM sued for millions over CD-ripping tech in cars
- Twitter more than doubles its sales, stock soars
- BlackBerry focuses on security for the enterprise
- Chinese officials seize Microsoft PCs, emails, financial info in antitrust probe
- Oracle hits back at ex-employee's claims over in-memory database option
- Homeland Security wants corporate board of directors more involved in cyber-security
- BlackBerry buying German firm for voice encryption
- NASA breakthrough improves 3D printing in space
- Secrets to CIO Longevity
- Uber, Airbnb go after businesses
- Guns, vandals and thieves: Data shows US networks under attack
- As IoT changes how carriers make money, Ericsson is buying new smarts
- Google, Linaro develop custom Android edition for Project Ara