Data Breach

Data Breach news, analysis, research, how-to, opinion, and video.

owasp
screenshot hipchat login

mobile gaming phone woman

R2Games compromised again, over one million accounts exposed

Online gaming company Reality Squared Games (R2Games) has been compromised for the second time in two years, according to records obtained by the for-profit notification service LeakBase. The hacker who shared the data with LeakBase...

medical records laptop doctor

Healthcare records for sale on Dark Web

A clinic in Baltimore is just one example of a healthcare provider having its records stolen, only to find them on the Dark Web for less than one cent per record.

apple fake phishing

Phishing attacks using internationalized domains are hard to block

The latest version of Google Chrome restricts how domain names that use non-Latin characters are displayed in the browser in response to a recently disclosed technique that could allow attackers to create highly credible phishing...

behavior facial expressions emotions

You can steal my identity, but not my behavior

The compromise and misuse of identity is at the core of modern threats and data breaches. This has been documented for years and continues to escalate. As a result, we are rapidly approaching the end of life for password-based...

Hacker in silouhette at laptop

Cybercrime diaries: All the hacks and data breaches in one place

The cybercrime diaries are a series of blogs that provide CIOs, CSOs, CISOs and IT security teams with bulleted datelines and high-level summary commentary on the most noteworthy cybercriminal activity in a quarterly period.

data breach

What prevents breaches: process, technology or people? One answer is PC, and one is right.

Many experts say that people are more important than process in the IT security world. That is politically correct, as opposed to actually correct.

boy slingshot threat

Latest Shadow Brokers exploit dump poses little threat

None of the new alleged NSA exploits leaked by the Shadow Brokers hacking group poses an immediate threat to users.

broken robot

US dismantles Kelihos botnet after Russian hacker's arrest

The arrest last week of a Russian man in Spain was apparently for his role in a massive spam botnet and not related to an ongoing investigation into foreign tampering with last year's U.S. election.

mopping up

Mopping up after your vendor's data breach

Get out the mop. Your vendor has been breached and your constituents are at risk. That’s what 10 states are doing right now as they clean up after America’s JobLink Alliance Technical Support informed the states of Kansas, Alabama,...

hacker hacking cyberthreat theft

Stopping trade secret theft in your organization

Start of four-part series on trade secret theft. Understanding what a trade secret is. Scope of the trade secret theft problem. Role of cyber security in trade secret theft.

keyboard chinese flag china hacker

US trade lobbying group attacked by suspected Chinese hackers

A group of what appears to be Chinese hackers infiltrated a U.S. trade-focused lobbying group as the two countries wrestle with how they treat imports of each other's goods and services.

volitale up down market stocks mixed

Scottrade Bank data breach exposes 20,000 customer records

Scottrade Bank, a subsidiary of Scottrade Financial Services, Inc., recently secured a MSSQL database containing sensitive information on at least 20,000 customers that was inadvertently left exposed to the public. The database itself...

roulette wheel zero

Report: 30% of malware is zero-day, missed by legacy antivirus

At least 30 percent of malware today is new, zero-day malware that is missed by traditional antivirus defenses, according to a new report

north korea statue pyongyang

Banking hackers left a clue that may link them to North Korea

The notorious hackers behind a string of banking heists have left behind a clue that reveals a long-suspected link to North Korea, according to security researchers.

rescue pc
Update

How to rescue your PC from ransomware

Ransomware is a serious headache. Don't negotiate with e-terrorists. Be a hero and rescue your hostage PC.

1 intro

5 ways data classification can prevent an insurance data breach

Spirion CEO Todd Feinman offers examples of how insurance firms can leverage data classification to reduce the risk of data theft and costly compliance violations.

clock and calendar montage

March 2017: The month in hacks and breaches

Voter records, patient data, and CIO hacking tools were among the data stolen last month.

code programming software bugs cybersecurity

Open-source developers targeted in sophisticated malware attack

Developers who publish their code on GitHub have been targeted in an attack campaign that uses a little known but potent cyberespionage malware.

Load More