Breaches

69dafe8b58066478aea48f3d0f384820

DigiNotar Files for Bankruptcy Following Security Lapse

September 20, 2011 Added by:Headlines

DigiNotar has filed a voluntary bankruptcy petition following a serious breach of security. “We are working to quantify the damages caused by the hacker’s intrusion into DigiNotar’s system and will provide an estimate of the range of losses as soon as possible..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

Hackers Targeting Small Businesses

September 16, 2011 Added by:Robert Siciliano

Big companies and big government get big press when their data is breached. When a big company is hit, those whose accounts have been compromised are often notified. With smaller businesses, however, victims are often in the dark, regardless of the state laws requiring notification...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

FBI Investigating Over 400 Corporate Account Takeovers

September 16, 2011 Added by:Headlines

"The FBI is currently investigating over 400 reported cases of corporate account takeovers in which cyber criminals have initiated unauthorized ACH and wire transfers... These cases involve the attempted theft of over $255 million and have resulted in the actual loss of approximately $85 million..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Senator Seeks Punitive Model for Data Security Laws

September 14, 2011 Added by:Headlines

The devil is in the details with these laws. But there are a number of questions here... These companies are already victims in these attacks, so why are we penalizing them after a breach? I think that's because it's easier to issue fines than it is to track down the criminals and go after them..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

How is All This Hacking Affecting My Identity?

September 13, 2011 Added by:Robert Siciliano

With so many different breeds of hackers, each with their own agenda, the media has certainly been more than willing to give them all the attention they could possibly want. Much of it has been sensationalist, but the reality is that we are indeed hemorrhaging information all over the place...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

California Amends Data Breach Law - For Real This Time

September 07, 2011 Added by:David Navetta

SB 24 requires the inclusion of certain content in data breach notifications, including a description of the incident, the type of information breached, the time of the breach, and toll-free telephone numbers and addresses of the major credit reporting agencies in California...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Bad News For Banks: Courts Side With Customers

September 03, 2011 Added by:Robert Siciliano

The computer or other device the scammer used to access Comerica’s website could surely have been traced overseas and flagged for: hiding behind a proxy, device anomalies such as a time zone and browser language mismatch, past history of online scams and identity theft, and the list goes on...

Comments  (1)

972cda1e62b72640cb7ac702714a115f

Universities Account for a Higher Number of Breaches

August 29, 2011 Added by:Kurt Aubuchon

Hospitals are 48 times more likely to show up as breach victims than would be predicted if breaches were distributed evenly among all US firms. Colleges and universities turn up in breach reports about 357 times more often than if distributed evenly. That is a staggering number....

Comments  (1)

69dafe8b58066478aea48f3d0f384820

AntiSec Hackers Release Sensitive VDI Documents

August 19, 2011 Added by:Headlines

AntiSec hackers have made good on their threat to release sensitive emails and documents stolen in an operation against defense contractor VDI, revealing evidence that financial giant Merrill Lynch may have tipped off VDI about S&P plans to downgrade the U.S. government's credit rating...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Top Ten Most Expensive Network Attacks in History

August 18, 2011 Added by:Headlines

Quantifying the cost of a cyber attack is admittedly subjective on some levels given that the scope of the impact may not be readily reportable and collateral damage is difficult to pinpoint, but the author does manage to assemble a viable list of the most devastating network attacks...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Vanguard Defense Industries Hit by AntiSec Hackers

August 16, 2011 Added by:Headlines

The AntiSec hacker collective has breached the email accounts of defense contractor Vanguard Defense Industries. The firm was targeted due to their relationships with law enforcement agencies, and the attackers plan to release several thousand emails and documents that were stolen in the operation...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Congress Wants McAfee Briefing on Operation Shady Rat

August 11, 2011 Added by:Headlines

"If these intrusions can be classified as more 'unsophisticated' and 'opportunistic,' what is the threat of the more 'insidious' intrusions on which McAfee has focused in recent years? How can we effectively prevent or mitigate these more insidious intrusions?"

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Majority of Bankers Say Cyber Crime is Uncontrollable

August 11, 2011 Added by:Headlines

The results of a live poll conducted at its annual North American Insights client conference show fraud and cyber crime continue to be among the most daunting issues that banks are facing today. Bankers believe it is a challenge that they will never be able to get under control...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Don't Lose Customers Over a Data Breach

July 28, 2011 Added by:Javvad Malik

Your competitors are taking advantage of your weakened state and swooping in on your customers, wooing them with offers too good to resist and promising them a life of security they deserve which you could never provide. Is there anything you can do to stem your losses?

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Data Thefts Surge Despite Increased Budgets

July 28, 2011 Added by:Headlines

"We live in a data-driven society and access to sensitive or proprietary data continues to bleed past organizational walls, making it a challenge for IT security teams to protect corporate data. Organizations must be able to proactively identify and mitigate security threats in real time..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Harvard Researcher Arrested for Hacking MIT Network

July 22, 2011 Added by:Headlines

''Stealing is stealing whether you use a computer command or a crowbar, and whether you take documents, data or dollars. It is equally harmful to the victim whether you sell what you have stolen or give it away," said U.S. Attorney Carmen Ortiz...

Comments  (0)

Page « < 10 - 11 - 12 - 13 - 14 > »