Blog Posts Tagged with "breaches"

Fc152e73692bc3c934d248f639d9e963

Breaches: If They Want You, They Will Get You

March 02, 2011 Added by:PCI Guru

The card brands need to explain to the public the realities of the PCI standards. Particularly the fact that even if the standards are followed, breaches are still going to occur. Those breaches should be smaller and less costly, but they are still going to occur. That is the stark reality...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Leaked Emails Reveal Morgan Stanley Hit in Aurora Attacks

March 01, 2011 Added by:Headlines

Emails leaked in the HBGary Federal network breach reveal that financial firm Morgan Stanley was also a victim of the highly sophisticated Aurora cyber attacks. "They were hit hard by the real Aurora attacks (not the crap in the news)," read an e-mail by a senior security engineer at HBGary...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Identity Fraud Cases and Costs Plummeted Last Year

February 17, 2011 Added by:Bill Gerneglia

A report by Javelin said the decline in victims and amount of identify fraud, which slid 34 percent from $56 billion to $37 billion, was probably due to the steep drop in reported data breaches, which were down from 604 cases in 2009, with 221 million records exposed, to 404 cases in 2010...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Cyber Attacks Less Costly, More Common?

February 08, 2011 Added by:Bill Gerneglia

The average cost of cyber attack declined significantly last year, but survey sponsors said the finding might be misleading. A spokesman for the company that paid for the study said that could be due to organizations reclassifying losses as related to privacy and fraud rather than cyber security...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Putting an End to Data Breaches as We Know Them

January 26, 2011 Added by:Robert Siciliano

The talk show pundits buzz that with the release of thousands of additional secret government documents, it leads to the conclusion that there is no way to protect sensitive data. If the government can’t even prevent a Private in the Army from stealing confidential data, what hope is there?

Comments  (21)

0c4ca84ec3f3f2d57194f8e0cbd5ba85

Case Management for Security Incident Investigators

January 20, 2011 Added by:Lindsay Walker

If 2010 was an indicator of the future of security related incidents in the workplace, something needs to change. It seems that, no matter how robust your corporate security program is, there's still no guarantee that information won't get leaked...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Universities Hammered by Data Breaches

January 13, 2011 Added by:Headlines

The breadth and volume of personal data collected by universities, coupled with high turnover and a financially un-savvy population, makes the problem of data loss at these institutions nearly epidemic in nature...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Anonymous Hacks Into Fine Gael Website

January 10, 2011 Added by:Headlines

The website of the second largest political party in Ireland, Fine Gael, has been breached by hackers associated with the international script-kiddie movement known as Anonymous. Fine Gail's recently launched website was defaced, and the following message was inserted...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

US Military and Government Exposures Down in 2010

January 10, 2011 Added by:Headlines

Other then breaches reported by the media and a few progressive state websites, there is little or no information available on many data breach events.It is clear without a mandatory national reporting requirement that many data breaches will continue to be unreported, or underreported...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Vodafone Investigating Database Breach Allegations

January 09, 2011 Added by:Headlines

"Any unauthorised access to the portal will be taken very seriously, and would constitute a breach of employment or dealer agreement and possibly a criminal offence. All passwords have been reset and a review is being undertaken of the training and process as an additional precaution..."

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Vulnerabilities - Who REALLY Cares?

January 08, 2011 Added by:Rafal Los

As we close out another year, and look back at all the data breaches that were enabled through the hundreds of thousands of helpfully vulnerable web applications -it's time to once again ask how we can prevent this in 2011...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Top Ten Breaches By Infamous Insiders

January 07, 2011 Added by:Headlines

The insider threat to information security is an ever present and ever growing problem for the private and public sectors. Protecting against sensitive data loss events perpetrated by the very people entrusted with protecting the information is nearly a Sisyphean task...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hacked Apple iTunes Accounts Offered for Sale

January 06, 2011 Added by:Headlines

China's biggest online retail website is offering hacked Apple iTunes store accounts for sale. The accounts contain detailed information including credit card numbers of the registered account owners, enabling purchasers of the breached accounts to buy music, movies, games and other products...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Identity Theft Resource Center 2010 Breach Report

January 04, 2011 Added by:Headlines

Breaches happen. Consumers, government and the business community need to stop acting like ostriches with their heads in the sand. Second, the concept of “risk of harm” is not acceptable for determining notification. This is true especially if the company involved is allowed to define risk of harm...

Comments  (0)

E973b16363b3de77b360563237df7e32

The Value of a Stolen Corporate Laptop

January 04, 2011 Added by:Bozidar Spirovski

There are a lot of companies who do not take this issue seriously. The mindset of managers still needs to be adjusted to present the issue. Because managers speak the language of money, let's make a simple calculation that shows the impact of how much is your laptop worth...

Comments  (2)

959779642e6e758563e80b5d83150a9f

WikiLeaks Breach – Trusted Insiders Not Hackers

January 04, 2011 Added by:Danny Lieberman

Of course there is an insider threat and of course it is immune to anti-virus and firewalls and of course the US Federal government is way behind the curve on data security – installing host based security which was state of the art 7 years ago...

Comments  (0)

Page « < 10 - 11 - 12 - 13 - 14 > »