Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

security phishing

CryptoWall held over half-a-million computers hostage, encrypted 5 billion files

The gang behind this dangerous ransomware program has earned US$1 million so far, researchers from Dell SecureWorks said...


security hacker

Why Russian hackers are beating us

Russian hackers like the ones who breached the computer systems of JP Morgan Chase and at least four other banks win because they think strategically like the best chess players, an expert says....

home router

Router malware: Fact or fiction?

Given that malicious software isn't always found locally on the machine itself, Ronald and Dylan Kaplan share how to pinpoint the characteristics of router malware...

binary hard drive

Feds probing possible hacking incident at JP Morgan Chase

On Wednesday, Bloomberg reported that the FBI, the US Secret Service, and even the NSA are investigating an incident alleged to have occurred in mid-August on JP Morgan Chase's (JPMC) network....

Retailers urged to defend against 'Backoff' point-of-sale malware

The PCI Security Standards Council says the Backoff malware is 'a very real threat'...

JPMorgan Chase and other financial institutions hacked

The FBI is investigating reports that JPMorgan Chase and other US banks were breached by attackers. ...

Your expectation of privacy on Facebook is a fantasy

Another day, another person burned by the assumption of privacy on social media...

viking

50 Norwegian oil companies suffer cyber attack

Yesterday 50 Norwegian businesses came under a concerted attack by parties unknown....

Mozilla reports user data leak from Bugzilla project

It's the second database exposure incident reported by the organization in a month...

FBI, Secret Service studying 'scope' of reported bank cyberattacks

The attacks are believed to have affected at least five US financial institutions...

Text chart of PCI chart

Security council blames breaches on poor PCI standard support

“Best practices” guidance from PCI security group says compliance needs to be 365-day-a-year focus....

Java, Flash and Reader still PC admins' biggest security headaches

Better than 2013 but still not good enough...

malware primary 100369041 orig

Spotting Web threats in the confusion of short-lived hostnames

Researchers have found that the vast number Internet hostnames constantly changing for legitimate purposes creates a cover for cybercriminals and weakens the effectiveness of security controls....

Internet of Things

Three security practices that IoT will disrupt

As the field of IoT devices continues to grow, so do the threats to well-established security practices...

New malvertising campaign hit visitors of several high-profile sites

Attackers redirected users to Web-based exploits by pushing malicious advertisements onto popular sites, researchers from Fox-IT said...

CryptoLocker's UK victims escape malware's clutches with backups

No ransoms paid, says Oughtred and Harrison...

cloud on mobile devices

How to explain the cloud to end users

'Nobody understands the cloud,' says a lead character in the summer comedy 'Sex Tape.' The cloud and cloud computing have become an essential part of IT infrastructures -- but could your employees use a Cloud 101 primer? Put another...

skullkey2

Criminals harness Russian nationalism to spread malware

The group behind the Kelihos botnet has launched a new campaign in order to add compromised systems to their collective. However, unlike previous efforts that relied on social engineering and spam, this new initiative simply asks the...

Computer cables connected to a router 84517144

Toss routers with hardcoded passwords, expert says

Sometimes it is best to toss security-challenged technology, and that's the recommendation experts are giving to small businesses using a flawed router from a China-based manufacturer....

Load More