Access control, Data loss, Editorial
December 21, 2016
Via: Russel EdwardsYahoo breaches have become similar to Adobe Flash patches – one seems to hear about them endlessly. The company strives to explain and investigate. Yet there is even more to add to the damage report as time goes by. On […]
December 20, 2016
Via: WiredBy now it’s hard to keep track of which companies have been hacked and which haven’t. Remember the FourSquare hack? What about Adobe? Even breaches that were high-profile at the time are fading into obscurity as bigger and scarier ones […]
December 2, 2016
Via: Threat PostAndroid malware called Gooligan is being blamed for 1 million breached Google accounts. The malware is still active, according Check Point Software Technologies, and is responsible for an additional 13,000 new breaches of Android devices daily. “We believe that it […]
June 3, 2016
Via: We Live SecurityThe Internet Crime Complaint Center (IC3) has issued a public service announcement warning people about online fraudsters, who are attempting to exploit a recent spate of data breaches that have only just come to light. This includes historic security incidents […]
March 1, 2016
Via: Dark ReadingPirates used hacked information from a global shipping company’s servers to target and capture cargo ships on the high seas, and a water utility’s valves and ducts were hijacked: these are some of the more dramatic scenarios representing cases Verizon’s […]
Cyber-crime, Data loss, Editorial
December 30, 2015
Via: Russel EdwardsThis year has seen some major cyber-security breach cases that brought to the general attention the fact that nobody is generically safe. From private companies to government agencies, cyber-attacks threaten all entities that handle sensitive data. Taking into consideration the […]
September 28, 2015
Via: hackerAt the beginning of the year, Forbes mentioned a trend of growing #ddos #attacks all over the world. During this year, many security companies have announced a significant increase of DDoS attacks, highlighting growth of their diversity, complexity and quantity. […]
September 16, 2015
Via: data-lossMost reports on data theft events concentrate on how the bad guys got into the organization, what failed to stop them, and what information was taken. I often think about how the information was taken out, or exfiltrated, and who […]
September 9, 2015
Via: hacker#gemalto revealed that in the first six months of this year a total of 888 data #breaches occurred, compromising 246 million records worldwide. Compared to the first half of 2014, data breaches increased by 10% while the number of compromised […]
June 18, 2015
Via: cyber-crimeSince the monumental data breaches at the Office of Personnel Management (OPM) were first announced, a variety of reactions have come from legislators, but now the loudest among them are the calls for agency Director Katherine Archuleta to resign. The […]
June 13, 2015
Via: cyber-crimeHackers tied to China may have accessed private security clearance information in what is being seen as a separate hack of the Office of Personnel Management (OPM) from the one that the agency revealed last week. They are believed to […]
March 25, 2015
Via: network-securityMost CIOs are on top of their game when it comes to securing networks, encrypting sensitive data and keeping private customer information safe – chances are, you’re one of those. But there’s a glaring #security flaw you may have overlooked: […]
April 30, 2024
April 11, 2024
April 30, 2024