- Malware program targets Hong Kong protesters using Apple devices
- Google triples bug bounty reward range to $15,000
- Security experts scrambling on Shellshock vulnerability as exploits begin
- Shellshock flaw could pose risks to payments industry
- Ex-NSA director Alexander calls for new cybersecurity model
data breach - News, Features, and Slideshows
- EPIC seeks enforcement action over Arizona data breaches
- Up to 750,000 Japan Airlines customers’ details leaked
- Two scenarios that would make OS X vulnerable to the Shellshock bug
data breach in pictures
The "Shellshock" flaw has the potential to pose a risk to the payments industry, but doesn't appear to have caused any problems yet, an official with a consortium run by major credit card companies warned on Tuesday.
A privacy watchdog filed a complaint with the Federal Trade Commission against a community college district in Arizona that lost the personal data of 2.5 million students and employees in two data breaches.
SuperValu, the grocery store operator hit by a cyberattack in June and July, has suffered a second attack on its payment processing system, it said Monday.
Apple's OS X is vulnerable to the Shellshock bug, but it's not that easy for attackers to take advantage of it, according to Intego, which specializes in security software for the operating system.
Signature Systems says the breach of its point-of-sales system that hit 216 Jimmy John's sandwich shops is actually 50 percent larger than originally thought.
The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.
It's so far been another sorry, sorry year in the technology industry, with big name companies, hot startups and individuals making public mea culpas for their assorted dumb, embarrassing and other regrettable actions.
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
Obama's appointment of Vivek Kundra marks an important first step for rectifying the nation's concerns about IT.
IT and business both understand the need to protect regulated customer and business data -- so long as they're in business, analysts say. Here's a look at how some folding businesses are falling short protecting data and the possible liabilities for the IT group and CIO.
Think you can guess the No. 1 threat to the security of your stored data? If you said hackers, or even trouble-making insiders, you'd be wrong. While malicious threats are an ongoing concern, it's your well-meaning employees who are more likely to unknowingly expose your company's stored data through, say, a file-sharing network or a misplaced laptop.
Whitepapers about data breach
Eight breaches in 2013 provided a painful reminder that cybercrime remains prevalent. This year’s report once again covers the wide-ranging threat landscape, with data collected and analysed by security experts, while calling out seven areas that deserve special attention.
- Marketo launches digital marketing research institute; agency partner program
- How CMOs can make big data relevant to the sales team
- CPA Australia outlines 7-step personalisation strategy for digital engagement
- Australian social ad spend to hit $706.3m in five years: Forrester
- Digital advertising dominates in first half of 2014: report