June 13, 2011 Added by:Headlines
"There are still dozens of similar yet still undisclosed breaches that have taken place in the U.S. government and defense domain during the same time frame. My guess is that it is the same set of bad actors who are behind the attacks focused on military, government and economic intelligence...
June 13, 2011 Added by:Headlines
The Citigroup breach is considered one of the very few successful hacks against a major banks systems, and underscores the need for continued vigilance by financial institutions and their clients where security best practices are concerned...
June 12, 2011 Added by:Mike Meikle
Development for online banking software is handled offshore, which can be a challenge when it comes to infusing the application with information security best practices from the foundation up. As to what Citigroup could have done better, it depends on how the breach was perpetrated...
June 09, 2011 Added by:Headlines
“With hundreds of data loss incidents every year – both reported and unreported – it’s no surprise the issues with governance, risk and compliance are being magnified. Data security in a modern day world means more than deploying a set of technologies to overcome these challenges..."
June 06, 2011 Added by:Headlines
LulzSec, the hacker collective who recently claimed responsibility for attacks against Sony and PBS, hacked networks belonging to the Atlanta chapter of the FBI affiliate InfraGard and defaced the organization's website, as well as exposing the group's email database...
June 03, 2011 Added by:Headlines
"SonyPictures.com was owned by a very simple SQL injection, one of the most primitive and common vulnerabilities... From a single injection, we accessed EVERYTHING. Why do you put such faith in a company that allows itself to become open to these simple attacks?"
June 02, 2011 Added by:Headlines
"We're seeing are targeted attacks against the defense industry. The RSA attack was very sophisticated, probably executed by people who had plans for what to do with the keys. Think about the data that those companies have. They have our nation's military technology secrets..."
June 01, 2011 Added by:Headlines
"We do not know who was responsible for the intrusion; nor do we know precisely the amount of information that was taken... These gaps in what we know are not for lack of trying by experts, but rather an unfortunate testament to the skill of those who perpetrated the attacks..."
May 31, 2011 Added by:Kelly Colgan
The proposed bill is nothing more than an outdated, bandwagon approach that creates more red tape for businesses, weakens state law, and overprotects small- to medium-sized companies that suffer data breaches. Bottom line: It offers little, meaningful help to the consumer...
May 25, 2011 Added by:Headlines
"It's a huge issue for all types of consumer information that is stored, and it's being heavily targeted by all kinds of breaches. Organized crime either had an employee planted or reached out to an employee and got them in on the hack. We're seeing this more and more..."
May 24, 2011 Added by:Tom Eston
Sony has not confirmed or denied that credit card data was stolen; however, as a customer you should take the following precautions when using a PS3 or any game console, including XBOX Live and Nintendo’s Wii and DS systems...
May 23, 2011 Added by:Headlines
"It is nearly impossible to run a totally secure Web presence, especially when you are the size of Sony. As long as it is popular within the hacker community to expose Sony's flaws, we are likely to continue seeing successful attacks against them..."
May 19, 2011 Added by:Headlines
"The depths they went indicates that this hack wasn't arbitrary... It seems likely to me that Sony got attacked through its web services first, such as the blog, and it opened up the doors to the rest of Sony's servers..."
May 17, 2011 Added by:Ben Kepes
The actions of LastPass have been exemplary – the actual loss in this instance was either non-existent or negligible. Many larger companies would have simply brushed this under the table and perhaps introduced some new security measures under the cloak of a version update...
May 12, 2011 Added by:Headlines
Unfortunately, it is still difficult to ascertain the true cause of many breaches due to entities publicly stating “the information was stolen” or “due to theft.” Additionally, nearly half of breached entities did not publicly report the number of potentially exposed records...
May 06, 2011 Added by:Headlines
"If Dr. Spafford's assessment is accurate, it's inexcusable that Sony not only ran obsolete software on servers containing confidential data, but also that the company continued to do so after this information was publicly disclosed..."
Join Trend Micro & SecurityWeek in Belle... Shah Alam on 12-06-2013
Looking Beyond "Black Box Testing"... Paul Reed on 12-03-2013
Projectile Dysfunction... ryan mccarthy on 12-01-2013