October 21, 2011 Added by:Kanguru Solutions
Kanguru Solutions has teamed up with Cyber Data Risk Managers LLC to host a FREE webinar on cyber security and infosec entitled “How to Minimize the Risks of a Data Breach/Cyber Attack.” This free webinar will discuss data security, privacy and measures to take in the event of a data breach...
October 17, 2011 Added by:Headlines
While 2011 may be the year of the breach, the record for overall breach impact is still held by credit card payment processor Heartland Payment Systems with over 130 million accounts affected and costs in the neighborhood of seven billion dollars...
October 14, 2011 Added by:Rafal Los
Getting hacked isn't necessarily Earth shattering anymore. Enterprises need to make their peace with fact that they're going to have to live with data breaches and hacks. The secret to surviving is having a well-formed Enterprise Security Intelligence strategy...
October 12, 2011 Added by:Headlines
Sony Corporation have yet again been breached, compromising 60,000 PlayStation and 33,000 Online Entertainment accounts. The source of the attack is unknown, but reports in indicate that the infiltrators used login credentials from an unnamed third-party to gain access to the systems...
October 10, 2011 Added by:Headlines
"This is by far the largest... identity theft/credit card fraud cases that law enforcement has come across. Credit card fraud and identity theft are two of the fastest growing crimes in the United States, afflicting millions of victims and costing billions..."
October 10, 2011 Added by:Headlines
“Defendants have taken no steps that adequately or effectively protect cardholders against illegal use of the cardholders’ sensitive and extensive financial records since the breach,” the suit states. Officials estimate that $2.7 million was stolen from 3,400 accounts in the attack...
October 04, 2011 Added by:Headlines
"Weaknesses in information security policies and practices at 24 major federal agencies continue to place... sensitive information and information systems at risk... reports of security incidents from federal agencies are on the rise, increasing over 650 percent over the past 5 years..."
September 30, 2011 Added by:Headlines
Rebollo was arrested in 2008 after an investigation revealed that he had downloaded, possessed, and sold consumer information contained in Countrywide databases. Rebollo distributed financial information and contact information pertaining to approximately 2.5 million individuals...
September 27, 2011 Added by:Emmett Jorgensen
With several high profile breaches this year, regulators have proposed data breach notification bills and heavy fines for organizations that fail to keep sensitive information safe. The real concern for organizations that have experienced a data breach, however, is customer confidence...
September 20, 2011 Added by:Headlines
DigiNotar has filed a voluntary bankruptcy petition following a serious breach of security. “We are working to quantify the damages caused by the hacker’s intrusion into DigiNotar’s system and will provide an estimate of the range of losses as soon as possible..."
September 16, 2011 Added by:Robert Siciliano
Big companies and big government get big press when their data is breached. When a big company is hit, those whose accounts have been compromised are often notified. With smaller businesses, however, victims are often in the dark, regardless of the state laws requiring notification...
September 16, 2011 Added by:Headlines
"The FBI is currently investigating over 400 reported cases of corporate account takeovers in which cyber criminals have initiated unauthorized ACH and wire transfers... These cases involve the attempted theft of over $255 million and have resulted in the actual loss of approximately $85 million..."
September 14, 2011 Added by:Headlines
The devil is in the details with these laws. But there are a number of questions here... These companies are already victims in these attacks, so why are we penalizing them after a breach? I think that's because it's easier to issue fines than it is to track down the criminals and go after them..."
September 13, 2011 Added by:Robert Siciliano
With so many different breeds of hackers, each with their own agenda, the media has certainly been more than willing to give them all the attention they could possibly want. Much of it has been sensationalist, but the reality is that we are indeed hemorrhaging information all over the place...
September 07, 2011 Added by:David Navetta
SB 24 requires the inclusion of certain content in data breach notifications, including a description of the incident, the type of information breached, the time of the breach, and toll-free telephone numbers and addresses of the major credit reporting agencies in California...
September 03, 2011 Added by:Robert Siciliano
The computer or other device the scammer used to access Comerica’s website could surely have been traced overseas and flagged for: hiding behind a proxy, device anomalies such as a time zone and browser language mismatch, past history of online scams and identity theft, and the list goes on...
Join the Security Intelligence Network on Li... Leo nardz on 10-23-2014
Q and A with Hacker "srblche srblchez"... chi nguyen on 10-23-2014
How to Log In to Windows Without the Passwor... Justiny Green on 10-23-2014