Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

no flash

DDoS Attacks Take Down RBS, Ulster Bank, and Natwest Online Systems

Customers of the RBS group of banks were unable to access their online accounts due to a 50 minute DDoS attack


073115 italian police

Italian police shutter Dark Web marketplace

Italian police have shut down a Dark Web marketplace offering illegal goods ranging from child pornography to forged luncheon vouchers, and seized 11,000 bitcoin wallets worth about 1 million euros, authorities said Friday.

Screenshot of Hacking Team website after it was allegedly breached

Former Hacking Team developer reportedly in contact with a terrorist group

Disgruntled employees deny planning to sell an antidote to the company's surveillance software

patient records

Personal health information in the wrong hands can be painful

Personal Health Information is much more detailed, and much more permanent, than credit card data. That's one of the reasons it is so attractive to cyber criminals. The other reason is that it is relatively easy to get.

European Central Bank Hacked

The European Central Bank was victim of a cyber attack resulting in the personal details of approximately 20,000 people being exposed and held to ransom

hacked hacker breach security

Hacker steals Bitdefender customer log-in credentials, attempts blackmail

The hacker exploited a vulnerability in an outdated software component to extract information from a single server

neiman marcus exterior

Neiman Marcus case a reminder to check your cyber coverage

In a decision that should send major corporations to double-check their cyberinsurance, a federal appeals court ruled Monday that retail customers could go ahead and file a class-action lawsuit against Neiman Marcus in the wake of...

bank cloud

Banks balance security and workflow when encrypting in the cloud

When financial institutions store data in the cloud, they use different kinds of encryption depending on security and workflow requirements, according to a new report from CipherCloud.

fb servers

7 essential SQL Server security tips

How to protect your database from SQL injection, data theft, rogue users, and well-meaning meddlers without tying your environment in knots

united airlines

OPM, Anthem hackers reportedly also breached United Airlines

Flight manifests including passenger information and destinations were stolen, report claims

Windows 10 action center

How to get the most out of Windows 10 enterprise security features

Although the return of the Start menu and putting the focus back on the desktop are moves calculated to help Windows 10 appeal to business users, the security improvements may be a more strategic reason for considering an upgrade. But...

japan location

Researchers improve de-anonymization attacks for websites hiding on Tor

Attackers controlling entry nodes on the Tor network could find the location of hidden services or unmask users visiting them

data breach map intro leak bucket water

Why does SQL Injection still exist?

After having spent the last two weeks in Asia I find myself sitting in a hotel room in Tokyo pondering something. I delivered a few talks in Singapore and in Manila and was struck by the fact that we’re still talking about SQL...

fb servers

7 essential SQL Server security tips

How to protect your database from SQL injection, data theft, rogue users, and well-meaning meddlers without tying your environment in knots

011215 president barack obama

Groups urge Obama to oppose cyberthreat sharing bills

U.S. President Barack Obama should oppose legislation intended to let businesses share cyberthreat information with each other and with government agencies because the bill would allow the sharing of too much personal information, a...

google hits misses google logo

Google: Lock up your Compute Engine data with your own encryption keys

Google will now let enterprise customers of one of its Cloud Platform services lock up their data with their own encryption keys, in case they're concerned about the company snooping on their corporate information.

abstract rack of servers datacenter networking hardware

Xen patches new virtual-machine escape vulnerability

A new vulnerability in emulation code used by the Xen virtualization software can allow attackers to bypass the critical security barrier between virtual machines and the host operating systems they run on.

darkode seized page

Darkode cybercrime forum might be making a comeback

The former administrator of Darkode, the online cybercrime forum that was recently shut down by law enforcement agencies, is preparing to bring it back, with better security and privacy for its members.

us surveillance spy ts

NSA will lose access to 'historical' phone surveillance data Nov. 29

After Nov. 29, data requests must be made on an as-needed basis to the FISA Court

Load More