Data Breach Definitions, Costs and Security

April 11, 2012 Added by:Fergal Glynn

Companies that suffer a data breach lose more than just confidential information. Their reputation, productivity, and profitability can all be negatively impacted in the aftermath of even a single incident. The organization may face fines, civil or criminal prosecution...

Comments  (0)


Update on the Visa - MasterCard - GPN Breach

April 03, 2012 Added by:Pierluigi Paganini

Global Payments' announced that Track 2 data was stolen, which is used by the bank. Track 1 data generally refers to the information reported on the front of a bank card. So if this information was stolen along with that contained in Track 2, it is possible to clone a card...

Comments  (0)


Visa and MasterCard Alert Banks of Massive Processor Breach

March 30, 2012 Added by:Headlines

"Visa Inc. is aware of a potential data compromise incident at a third party entity... Visa has provided payment card issuers with the affected account numbers so they can take steps to protect consumers through independent fraud monitoring and, if needed, reissuing cards..."

Comments  (0)


Hacker Pleads Guilty to Celebrity Computer Intrusions

March 27, 2012 Added by:Headlines

Chaney admitted he hacked into the e-mail accounts by taking the victims’ e-mail addresses, clicking on the “Forgot your password?” feature, then re-setting the passwords by answering security questions using publicly available information he found on the Internet...

Comments  (0)


Average Cost of a Data Breach $5.5 Million in 2011

March 23, 2012 Added by:Headlines

“Insiders continue to pose a serious threat to the security of their organizations. This is particularly true as the increasing adoption of tablets, smart phones and cloud applications in the workplace means that employees are able to access corporate information anywhere..."

Comments  (0)


Four Convicted for Roles in Massive Identity Theft Ring

March 23, 2012 Added by:Headlines

After a five week trial, four defendants have been convicted for their roles in one of the largest bank fraud and identity theft schemes in California history, with dozens of victims in four states and millions of dollars in losses...

Comments  (0)


Verizon 2011 Data Breach Investigation Report Summary

March 22, 2012 Added by:Headlines

"Mainline cybercriminals continued to automate and streamline their method du jour of high-volume, low-risk attacks against weaker targets. Much less frequent, but arguably more damaging, were continued attacks targeting trade secrets, classified information, and intellectual property..."

Comments  (0)


Fifteen Unsafe Security Practices that Lead to Data Breaches

March 21, 2012 Added by:Kelly Colgan

Database security is an essential element of overall security maturity at enterprise level. Underestimating its value and not dedicating sufficient attention to developing a comprehensive data security plan can, in many instances, lead to data compromise...

Comments  (1)


Millions of US Government Email Addresses for Sale

March 19, 2012 Added by:Pierluigi Paganini

An underground black market is offering 2,462,935 U.S government email addresses and another 2,178,000 U.S military email addresses for sale. The risks are really serious, as this information could be used by hostile government in cyber attacks and cyber espionage activities...

Comments  (0)


It’s Back: March Madness Higher Education Data Breach Brackets

March 12, 2012 Added by:Alexander Rothacker

The method to our ‘Madness’ is simple – based solely on the number of reported records breached in 2011, we put together brackets. For each U.S.-based institution of higher learning that reported a data breach in 2011, we seeded (ranked) them based on number of records affected...

Comments  (0)


PCI: When a Breach is Not a Breach

March 08, 2012 Added by:PCI Guru

The lawsuit points out a disconcerting issue with a cardholder data breach: Any incident investigation initiated by the card brands under the PCI standards is going to focus on PCI compliance and not on whether or not the breach actually occurred...

Comments  (0)


The Changing World of Information Security Compromises

March 08, 2012 Added by:Brent Huston

Hacktivism is an extended threat for infosec. You can be targeted for your partnerships, role in a supply chain, to steal CPU cycles/storage from your systems, or because you have a common vulnerability. There are a myriad of reasons from the criminal to the abstract...

Comments  (0)


The Financial Impact of Breached Protected Health Information

March 07, 2012 Added by:Marjorie Morgan

The ISA and ANSI released a new report titled The Financial Impact of Breached Protected Health Information which explores the reputational, financial, legal, operational, and clinical repercussions of a protected health information breach on an organization...

Comments  (0)


Panda Security Suffers the Wrath of AntiSec

March 07, 2012 Added by:Kevin McAleavey

The defacement also show tremendous amounts of sensitive corporate information including internal accounts, passwords, server and cloud configurations, access information to the antivirus lab's Teamviewer as well as alternate means of accessing their internals via "logmein"...

Comments  (2)


Compliance in the Digital Era: Watch Out for the Third Party

February 24, 2012 Added by:Neira Jones

It is crucial that businesses understand which controls are needed to maintain the security of their information assets and it is therefore crucial that suppliers are assessed against the business regulatory and compliance framework...

Comments  (0)


Lessons from the Nortel Networks Breach

February 16, 2012 Added by:Suzanne Widup

Much is being published about how inappropriate the response to the Nortel incident was, but it demonstrates an important point for companies - how do you know when you’ve done enough? How do you tell when an incident is over, and you should go back to business as usual?

Comments  (0)

Page « < 13 - 14 - 15 - 16 - 17 > »