Breaches

69dafe8b58066478aea48f3d0f384820

The Citigroup Breach and Tips for Secure Online Banking

June 13, 2011 Added by:Headlines

The Citigroup breach is considered one of the very few successful hacks against a major banks systems, and underscores the need for continued vigilance by financial institutions and their clients where security best practices are concerned...

Comments  (0)

49afa3a1bba5280af6c4bf2fb5ea7669

Citigroup: Housekeeping Isn’t Glamorous - Only Critical

June 12, 2011 Added by:Mike Meikle

Development for online banking software is handled offshore, which can be a challenge when it comes to infusing the application with information security best practices from the foundation up. As to what Citigroup could have done better, it depends on how the breach was perpetrated...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Seventy-Seven Percent of Organizations Lost Data

June 09, 2011 Added by:Headlines

“With hundreds of data loss incidents every year – both reported and unreported – it’s no surprise the issues with governance, risk and compliance are being magnified. Data security in a modern day world means more than deploying a set of technologies to overcome these challenges..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

LulzSec Hackers Hit FBI Affiliate InfraGard

June 06, 2011 Added by:Headlines

LulzSec, the hacker collective who recently claimed responsibility for attacks against Sony and PBS, hacked networks belonging to the Atlanta chapter of the FBI affiliate InfraGard and defaced the organization's website, as well as exposing the group's email database...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Believe It or Not: Hackers Hit Sony Networks Again

June 03, 2011 Added by:Headlines

"SonyPictures.com was owned by a very simple SQL injection, one of the most primitive and common vulnerabilities... From a single injection, we accessed EVERYTHING. Why do you put such faith in a company that allows itself to become open to these simple attacks?"

Comments  (0)

69dafe8b58066478aea48f3d0f384820

RSA SecurID Breach Spreads to L3 and Northrop

June 02, 2011 Added by:Headlines

"We're seeing are targeted attacks against the defense industry. The RSA attack was very sophisticated, probably executed by people who had plans for what to do with the keys. Think about the data that those companies have. They have our nation's military technology secrets..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Sony Rep to Testify for Congress About Network Breach

June 01, 2011 Added by:Headlines

"We do not know who was responsible for the intrusion; nor do we know precisely the amount of information that was taken... These gaps in what we know are not for lack of trying by experts, but rather an unfortunate testament to the skill of those who perpetrated the attacks..."

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Five Issues With Obama’s Breach Notification Policy

May 31, 2011 Added by:Kelly Colgan

The proposed bill is nothing more than an outdated, bandwagon approach that creates more red tape for businesses, weakens state law, and overprotects small- to medium-sized companies that suffer data breaches. Bottom line: It offers little, meaningful help to the consumer...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Bank of America's $10 Million Dollar Breach Loss

May 25, 2011 Added by:Headlines

"It's a huge issue for all types of consumer information that is stored, and it's being heavily targeted by all kinds of breaches. Organized crime either had an employee planted or reached out to an employee and got them in on the hack. We're seeing this more and more..."

Comments  (0)

53692ae1a8e713373b8a487ce89ee3e2

Affected by the PSN Breach? Here’s What to Do Next...

May 24, 2011 Added by:Tom Eston

Sony has not confirmed or denied that credit card data was stolen; however, as a customer you should take the following precautions when using a PS3 or any game console, including XBOX Live and Nintendo’s Wii and DS systems...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Sony Networks Hit Twice More By Hackers

May 23, 2011 Added by:Headlines

"It is nearly impossible to run a totally secure Web presence, especially when you are the size of Sony. As long as it is popular within the hacker community to expose Sony's flaws, we are likely to continue seeing successful attacks against them..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hacker Offers Insight On Sony PSN Breach

May 19, 2011 Added by:Headlines

"The depths they went indicates that this hack wasn't arbitrary... It seems likely to me that Sony got attacked through its web services first, such as the blog, and it opened up the doors to the rest of Sony's servers..."

Comments  (0)

4c1c5119b03285e3f64bd83a8f9dfeec

LastPass Demonstrates Impeccable Crisis Handling

May 17, 2011 Added by:Ben Kepes

The actions of LastPass have been exemplary – the actual loss in this instance was either non-existent or negligible. Many larger companies would have simply brushed this under the table and perhaps introduced some new security measures under the cloak of a version update...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

ITRC: Hackers are Winning the Battle of the Breach

May 12, 2011 Added by:Headlines

Unfortunately, it is still difficult to ascertain the true cause of many breaches due to entities publicly stating “the information was stolen” or “due to theft.” Additionally, nearly half of breached entities did not publicly report the number of potentially exposed records...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Sony Knew It Was Running Obsolete Server Software

May 06, 2011 Added by:Headlines

"If Dr. Spafford's assessment is accurate, it's inexcusable that Sony not only ran obsolete software on servers containing confidential data, but also that the company continued to do so after this information was publicly disclosed..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Simon Cowell's X Factor Entrant Database Hacked

May 05, 2011 Added by:Headlines

The exposed data includes potential contestant's names, email addresses, contact information, dates of birth, and their gender. Adding to the potential controversy over the breach is the knowledge that a significant number of applicants are as young as 12 years old...

Comments  (0)

Page « < 13 - 14 - 15 - 16 - 17 > »