Data Breach

Data Breach | News, how-tos, features, reviews, and videos

backdoor / abstract security circuits, locks and data blocks

gavel / abstract binary lines  >  court judgment / fine / penalty / settlement

The biggest data breach fines, penalties, and settlements so far

Hacks and data thefts, enabled by weak security, cover-ups or avoidable mistakes have cost these companies a total of nearly $1.3 billion and counting.

Targeting user behavior.

Accellion file-sharing breach claims more Australian victims

Regulators, key agencies counting the cost as cybercriminals flaunt stolen data.

cso security hacker breach shadowy figure with briefcase by jordidelgado getty images 2400x1600px

Australian data breaches could lead to $86 billion in fines if prosecuted

As OAIC reports 539 more breaches during 2020, penalties put a price on their psychological harm.

human weak link cybersecurity primary

Supply chain attacks show why you should be wary of third-party providers

The weak link in your enterprise security might lie with partners and suppliers. Here’s how to understand and mitigate that risk.

lock circuit board bullet hole computer security breach

The 15 biggest data breaches of the 21st century

Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.

A network of linked question marks.

6 board of directors security concerns every CISO should be prepared to address

The COVID pandemic and spike in cybercriminal activity has raised interest in security among corporate boards. These are the concerns and questions CISOs say they are now hearing from them.

cso security hack breach water leak gettyimages 466029458 by firmafotografen 2400x1600px

The road to a data breach is paved with good intentions

Australian travel agent’s woes are a reminder that privacy policies don’t automatically let you share customer data, even for well-intentioned efforts.

cyber attack alert / data breach

FireEye breach explained: How worried should you be?

The theft of red team tools, allegedly by Russia's Cozy Bear group, poses only a small threat to other organizations. The real lesson: Anyone can be hacked.

Dark net warning sign against black and yellow warning stripes in the background.

What is the dark web? How to access it and what you'll find

The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.

forensics threat hunter cyber security thumbprint

Tips to prep for digital forensics on Windows networks

Know what data you need to collect and how you will collect it before a security incident occurs on your Windows network.

frustrated defeated discouraged upset mistake failure karina carvalho 87593 unsplash

University of Tasmania breach a tough lesson in cloud misconfiguration errors

Human error back in the spotlight after Office 365 permissions lapse.

digital identity / authentication

People key as updated Australian cyber strategy targets ‘existential threats’

In the era of COVID-19 work-at-home, fostering individual responsibility over security is as important as government capabilities and industry collaboration.

Digitization of United States currency  >   Digital transactions

What is the cost of a data breach?

Data breach costs can be ongoing for years, a new study finds. Here's the breakdown of costs and advice on how to minimize them.

An australian iconic road sign with kangaroo showing a long road with bright blue sky

Threat intelligence puts on an Australian accent

Details of local breaches are being collated to inform a better cybersecurity response.

CCTV security cameras gather data during traffic surveillance.

Lessons learned from the ANPR data leak that shook Britain

The recent ANPR data leak raised questions regarding privacy versus data security with public surveillance systems. How do private and public organizations maintain transparency while protecting personal data?

data breach predictions

Australian government faces epidemic of breaches

Despite improvements, agencies are still struggling to lock down security practices — and a string of breaches highlights the consequences.

Australia  >  National flag

How the Australian government is helping you fight data breaches

To help battle hackers, it has developed the Notifiable Data Breaches (NDB) scheme, is revising its cyber security strategy, and funding security education in universities.

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall

Rowhammer memory attacks close in on the real world

This theoretical security problem is becoming all too real. Expect to see a major Rowhammer security exploit within the next year as attackers tap GPUs, FPGAs and more to accelerate the process. Here's how to protect yourself.

Load More
You Might Also Like