Blog Posts Tagged with "breaches"
March 02, 2011 Added by:PCI Guru
The card brands need to explain to the public the realities of the PCI standards. Particularly the fact that even if the standards are followed, breaches are still going to occur. Those breaches should be smaller and less costly, but they are still going to occur. That is the stark reality...
March 01, 2011 Added by:Headlines
Emails leaked in the HBGary Federal network breach reveal that financial firm Morgan Stanley was also a victim of the highly sophisticated Aurora cyber attacks. "They were hit hard by the real Aurora attacks (not the crap in the news)," read an e-mail by a senior security engineer at HBGary...
February 17, 2011 Added by:Bill Gerneglia
A report by Javelin said the decline in victims and amount of identify fraud, which slid 34 percent from $56 billion to $37 billion, was probably due to the steep drop in reported data breaches, which were down from 604 cases in 2009, with 221 million records exposed, to 404 cases in 2010...
February 08, 2011 Added by:Bill Gerneglia
The average cost of cyber attack declined significantly last year, but survey sponsors said the finding might be misleading. A spokesman for the company that paid for the study said that could be due to organizations reclassifying losses as related to privacy and fraud rather than cyber security...
January 26, 2011 Added by:Robert Siciliano
The talk show pundits buzz that with the release of thousands of additional secret government documents, it leads to the conclusion that there is no way to protect sensitive data. If the government can’t even prevent a Private in the Army from stealing confidential data, what hope is there?
January 20, 2011 Added by:Lindsay Walker
If 2010 was an indicator of the future of security related incidents in the workplace, something needs to change. It seems that, no matter how robust your corporate security program is, there's still no guarantee that information won't get leaked...
January 13, 2011 Added by:Headlines
The breadth and volume of personal data collected by universities, coupled with high turnover and a financially un-savvy population, makes the problem of data loss at these institutions nearly epidemic in nature...
January 10, 2011 Added by:Headlines
The website of the second largest political party in Ireland, Fine Gael, has been breached by hackers associated with the international script-kiddie movement known as Anonymous. Fine Gail's recently launched website was defaced, and the following message was inserted...
January 10, 2011 Added by:Headlines
Other then breaches reported by the media and a few progressive state websites, there is little or no information available on many data breach events.It is clear without a mandatory national reporting requirement that many data breaches will continue to be unreported, or underreported...
January 09, 2011 Added by:Headlines
"Any unauthorised access to the portal will be taken very seriously, and would constitute a breach of employment or dealer agreement and possibly a criminal offence. All passwords have been reset and a review is being undertaken of the training and process as an additional precaution..."
January 08, 2011 Added by:Rafal Los
As we close out another year, and look back at all the data breaches that were enabled through the hundreds of thousands of helpfully vulnerable web applications -it's time to once again ask how we can prevent this in 2011...
January 07, 2011 Added by:Headlines
The insider threat to information security is an ever present and ever growing problem for the private and public sectors. Protecting against sensitive data loss events perpetrated by the very people entrusted with protecting the information is nearly a Sisyphean task...
January 06, 2011 Added by:Headlines
China's biggest online retail website is offering hacked Apple iTunes store accounts for sale. The accounts contain detailed information including credit card numbers of the registered account owners, enabling purchasers of the breached accounts to buy music, movies, games and other products...
January 04, 2011 Added by:Headlines
Breaches happen. Consumers, government and the business community need to stop acting like ostriches with their heads in the sand. Second, the concept of “risk of harm” is not acceptable for determining notification. This is true especially if the company involved is allowed to define risk of harm...
January 04, 2011 Added by:Bozidar Spirovski
There are a lot of companies who do not take this issue seriously. The mindset of managers still needs to be adjusted to present the issue. Because managers speak the language of money, let's make a simple calculation that shows the impact of how much is your laptop worth...
January 04, 2011 Added by:Danny Lieberman
Of course there is an insider threat and of course it is immune to anti-virus and firewalls and of course the US Federal government is way behind the curve on data security – installing host based security which was state of the art 7 years ago...
Mobile Security Processes Could Be Applied t... Johnnie Nix on 05-21-2013
ATM Security (And Really Learning from the P... Johnnie Nix on 05-21-2013
New Study Published on Mobile Malware... Caitlin Rachel on 05-21-2013