Advertisement
Top

Tag: Breaches


Access control, Data loss, Editorial

Yahoo breaches – what were the signs?

December 21, 2016

Via: Russel Edwards

Yahoo breaches have become similar to Adobe Flash patches – one seems to hear about them endlessly. The company strives to explain and investigate. Yet there is even more to add to the damage report as time goes by. On […]


Hacker

Inside LeakedSource and Its Database of 3 Billion Hacked Accounts

December 20, 2016

Via: Wired

By now it’s hard to keep track of which companies have been hacked and which haven’t. Remember the FourSquare hack? What about Adobe? Even breaches that were high-profile at the time are fading into obscurity as bigger and scarier ones […]


Malware, Mobile security

Gooligan Malware Breaches 1 Million Google Accounts

December 2, 2016

Via: Threat Post

Android malware called Gooligan is being blamed for 1 million breached Google accounts. The malware is still active, according Check Point Software Technologies, and is responsible for an additional 13,000 new breaches of Android devices daily. “We believe that it […]


Data loss, Hacker

Beware online fraudsters jumping on the back of recent data breaches

June 3, 2016

Via: We Live Security

The Internet Crime Complaint Center (IC3) has issued a public service announcement warning people about online fraudsters, who are attempting to exploit a recent spate of data breaches that have only just come to light. This includes historic security incidents […]


Cyber-crime

Pirates, Ships, And A Hacked CMS: Inside Verizon’s Breach Investigations

March 1, 2016

Via: Dark Reading

Pirates used hacked information from a global shipping company’s servers to target and capture cargo ships on the high seas, and a water utility’s valves and ducts were hijacked: these are some of the more dramatic scenarios representing cases Verizon’s […]


Cyber-crime, Data loss, Editorial

2015’s (cyber) seven – the most notorious data breach examples of the year

December 30, 2015

Via: Russel Edwards

This year has seen some major cyber-security breach cases that brought to the general attention the fact that nobody is generically safe. From private companies to government agencies, cyber-attacks threaten all entities that handle sensitive data. Taking into consideration the […]


Hacker

DDoS attacks: a perfect smoke screen for APTs and silent data breaches

September 28, 2015

Via: hacker

At the beginning of the year, Forbes mentioned a trend of growing #ddos #attacks all over the world. During this year, many security companies have announced a significant increase of DDoS attacks, highlighting growth of their diversity, complexity and quantity. […]


Data loss

How Is Your Data Getting Out?

September 16, 2015

Via: data-loss

Most reports on data theft events concentrate on how the bad guys got into the organization, what failed to stop them, and what information was taken. I often think about how the information was taken out, or exfiltrated, and who […]


Hacker

2015 saw 888 data breaches, 246 million records compromised worldwide

September 9, 2015

Via: hacker

#gemalto revealed that in the first six months of this year a total of 888 data #breaches occurred, compromising 246 million records worldwide. Compared to the first half of 2014, data breaches increased by 10% while the number of compromised […]


Cyber-crime

Obama backs OPM director as agency sends questionable email notifications

June 18, 2015

Via: cyber-crime

Since the monumental data breaches at the Office of Personnel Management (OPM) were first announced, a variety of reactions have come from legislators, but now the loudest among them are the calls for agency Director Katherine Archuleta to resign. The […]


Cyber-crime

Private security clearance info accessed in second OPM breach

June 13, 2015

Via: cyber-crime

Hackers tied to China may have accessed private security clearance information in what is being seen as a separate hack of the Office of Personnel Management (OPM) from the one that the agency revealed last week. They are believed to […]


Network security

Security best practices for users is your first line of defense

March 25, 2015

Via: network-security

Most CIOs are on top of their game when it comes to securing networks, encrypting sensitive data and keeping private customer information safe – chances are, you’re one of those. But there’s a glaring #security flaw you may have overlooked: […]