Data Breach

Data Breach | News, how-tos, features, reviews, and videos

lock circuit board bullet hole computer security breach
Overall impact of COVID-19

Dark net warning sign against black and yellow warning stripes in the background.

What is the dark web? How to access it and what you'll find

The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.

holiday security have i been pwned

Aussie Troy Hunt drops Have I Been Pwned sale

The Have I Been Pwned data breach alert service will remain independent

healthcare data breach / medical patient privacy security violation

More breaches than ever occurring at Australian companies

Healthcare shamed, email blamed as data breaches increase 17 percent in the second half of 2019

Cybersecurity  >  Attack warning / danger / security threat

What is a cyber attack? Recent examples show disturbing trends

A cyber attack is an attack launched from one or more computers against another computer, multiple computers or networks. Here are some of the major recent cyber attacks and what we can learn from them.

cyber security lock padlock firewall code breach password

The OPM hack explained: Bad security practices meet China's Captain America

How the OPM hack happened, the technical details, and a timeline of the infiltration and response.

Marriott data breach  >  Marriott logo + binary data stream through the fingers of a hacker

Marriott data breach FAQ: How did it happen and what was the impact?

In late 2018, the Marriott hotel chain announced that one of its reservation systems had been compromised, with hundreds of millions of customer records, including credit card and passport numbers, being exfiltrated by the attackers....

Equifax breach  >  Equifax logo amid broken, disrupted binary code

Equifax data breach FAQ: What happened, who was affected, what was the impact?

In 2017, personally identifying data of hundreds of millions of people was stolen from credit reporting agency Equifax. Here's a timeline of what happened, how it happened, and the impact.

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall

Release the monkey! How Infection Monkey tests network security

This free, open source penetration testing tool uses real attacks and real techniques to try and exploit its way into a network.

gavel / abstract binary lines  >  court judgment / fine / penalty / settlement

The biggest data breach fines, penalties and settlements so far

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.45 billion and counting.

exit sign expatriation cloud binary leaving the cloud

7 security incidents that cost CISOs their jobs

Whether or not security executives lose their jobs in the wake of a major incident, security failure should be seen as a learning opportunity.

online shopping cart magecart hackers shopping online

What is Magecart? How this hacker group steals payment card data

Hacking groups that make up Magecart are effective and persistent at stealing customer and payment card data through skimmers. Here's how they work and what you can do to mitigate the risk.

CSO > Phishing attacks that bypass two-factor authentication

Microsoft: these are the most cunning phishing attacks we spotted in 2019

Microsoft saw phishing attacks reach new heights of creativity and sophistication in 2019.

rear view mirror with desert scene in the distance

2019 in review: data breaches, GDPR’s teeth, malicious apps, malvertising and more

As 2019 draws to a close, it is time to reflect on what’s happened in cybersecurity over the past twelve months – and in some cases, what didn’t happen this year.

laptop / networked binary data flows / world map

Data breached in translation

Online language translation software caused a data leak at Statoil. Use these best practices to keep translated information secure.

bank vault bank hacked breach security breach binary numbers by negative space and peshkov getty im

How a bank got hacked

Notorious hacker Phineas Phisher claims to have netted hundreds of thousands of pounds sterling in a 2016 hack of the Cayman National Isle of Man Bank. Here's how he did it and why it's cause for concern.

cso siem visibility gap in security apps legacy eyes crack breach privacy

3 keys to preserving customer relationships in the wake of a data breach

To thrive after a data breach, try talking to your customers during one.

Cybersecurity  >  Internet security threats

Is your MSP an insider threat?

Managed services providers and managed security services providers (MSSPs) are attracting attention from attackers, who see them as a gateway to access their clients' networks. Follow this advice to minimize the risk.

holiday e commerce shopping holiday hacking security breach retail security by rupixen via unsplash

Fighting holiday fraud: 5 ways ecommerce retailers can boost security

Everyone loves online shopping -- especially cybercriminals. If you’re a small or midsize ecommerce retailer you are the biggest target this holiday season, but it’s not too late to protect yourself and your customers.

Load More
You Might Also Like