data breach - News, Features, and Slideshows
data breach in pictures
The growing number of data breaches resulting in massive numbers of payment cards being stolen from retail stores and other businesses is occurring because they're failing to keep up with the Payment Card Industry's data security standard, according to the PCI Security Standards Council.
By Ellen Messmer | 28 August, 2014 22:54
Email addresses and encrypted passwords of around 97,000 users who tested early builds of the Bugzilla bug tracking software were left exposed for three months following a server migration.
By Lucian Constantin | 28 August, 2014 22:38
A payment card industry security consortium warned retailers on Wednesday of the urgency to secure their systems against "Backoff," a malicious software program that steals card numbers.
By Jeremy Kirk | 28 August, 2014 16:00
A line of routers from a China-based manufacturer has a serious flaw that could allow a hacker to monitor someone's Internet traffic, according to research from Trend Micro.
By Jeremy Kirk | 26 August, 2014 16:25
The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.
By By Michael Crouse | 28 June, 2014 04:12
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
By Jeremy Kirk | 17 September, 2013 12:01
Think you can guess the No. 1 threat to the security of your stored data? If you said hackers, or even trouble-making insiders, you'd be wrong. While malicious threats are an ongoing concern, it's your well-meaning employees who are more likely to unknowingly expose your company's stored data through, say, a file-sharing network or a misplaced laptop.
By Mary Brandel | 10 February, 2009 09:12
A new report warns that the cost from lost productivity at work related to the new NFL season could add up to US$10.5 billion. And there we were, thinking the biggest waste of time at work came from fielding an endless stream of IT industry reports?
By Network World staff | 16 September, 2008 09:53
Whitepapers about data breach
Eight breaches in 2013 provided a painful reminder that cybercrime remains prevalent. This year’s report once again covers the wide-ranging threat landscape, with data collected and analysed by security experts, while calling out seven areas that deserve special attention.
UXC Connect’s Jesmond Psaila says that DevOps can do for IT operations what Agile did for software development. This paper demonstrates how, by combining both approaches, you can significantly improve operational efficiency and time-to-market. • Marketing and development teams want to constantly change or increase functionality, while IT operations teams want to keep the environment as stable as possible • Agile software development and virtualisation have not solved the time-to-value problem faced by marketing and IT operations teams • Recent movements in DevOps aim to address and redefine a more agile service management platform, while new tools have vastly improved functionality to configure and automate common processes
- FTSenior Media TraderNSW
- FTDigital Media PlannerNSW
- FTMachine Learning | JAVA | San Fran based global Company | SydneyNSW
- FTCampaign Managers| RTB / Programmatic | Expression of InterestNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTDigital Account Manager X 3 | Display + Video advertisingNSW
- CCL2 Technical Support Engineer - RightFax/MessagingVIC
- FTChief Information OfficerNSW
Having an identity and access management solution is a must. Businesses cannot operate without them. However, this paper asks - are you sure the user credentials are being used by the correct individual? · Most organizations work hard to ensure compliance with corporate security policy but that doesn’t necessarily mean they’re protected · Managing identities is essential—but it can also lead to a false sense of security · Do the credentials and the behaviour make business sense? If you can’t interpret activity in the context of identity, you may be at risk
- Bill shock measures extended to all telcos
- Warrantless requests for customer data dominate in Telstra Transparency Report
- Eftpos' online play moves closer with Coles trial
- Honda Australia uses automation to accelerate PC patching
- Smart city apps to alleviate Melbourne’s infrastructure problems
- Senate backs ads for Bureau of Meteorology site
- NZ’s AO Cloud to expand into two Australian data centres
- SuperPartners uses virtualization to conduct systems testing
- As tablet growth slows, Apple may face a year-long iPad sales contraction
- Backoff malware infections are more widespread than thought
- IBM Watson cooks up some new dishes
- Apple will keep pushing for a sales ban on Samsung products
- Facebook testing mobile searches for old posts
- US appeals court denies Oracle request to restore $1.3 billion judgment against SAP
- Scientists create one robot brain to rule them all