Data Breach

Data Breach | News, how-tos, features, reviews, and videos

digital identity / authentication
gavel / abstract binary lines  >  court judgment / fine / penalty / settlement

Digitization of United States currency  >   Digital transactions

What is the cost of a data breach?

Data breach costs can be ongoing for years, a new study finds. Here's the breakdown of costs and advice on how to minimize them.

An australian iconic road sign with kangaroo showing a long road with bright blue sky

Threat intelligence puts on an Australian accent

Details of local breaches are being collated to inform a better cybersecurity response.

CCTV security cameras gather data during traffic surveillance.

Lessons learned from the ANPR data leak that shook Britain

The recent ANPR data leak raised questions regarding privacy versus data security with public surveillance systems. How do private and public organizations maintain transparency while protecting personal data?

data breach predictions

Australian government faces epidemic of breaches

Despite improvements, agencies are still struggling to lock down security practices — and a string of breaches highlights the consequences.

Australia  >  National flag

How the Australian government is helping you fight data breaches

To help battle hackers, it has developed the Notifiable Data Breaches (NDB) scheme, is revising its cyber security strategy, and funding security education in universities.

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall

Rowhammer memory attacks close in on the real world

This theoretical security problem is becoming all too real. Expect to see a major Rowhammer security exploit within the next year as attackers tap GPUs, FPGAs and more to accelerate the process. Here's how to protect yourself.

silver platter passwords exposed authentication hacked vulnerable security breach

Austal breach analysis a reminder that Australia can do better on credentials

As cyber criminals capitalise on COVID-19 chaos, CSOs should take time to improve credential hygiene.

A man with an umbrella stands waist-deep in water as rain continues to fall.

5 steps to create a security incident response plan

Creating an incident response plan can seem like a daunting task, but there are ways to break the process down into manageable pieces. (Plus: Video on how to create a pandemic disaster recovery plan.)

lock circuit board bullet hole computer security breach

The 15 biggest data breaches of the 21st century

Data breaches affecting millions of users are far too common. Here are some of the biggest, baddest breaches in recent memory.

Abstract trend lines graphing change and transformation.

Top cybersecurity facts, figures and statistics for 2020

From malware trends to budget shifts, we have the latest figures that quantify the state of the industry.

Dark net warning sign against black and yellow warning stripes in the background.

What is the dark web? How to access it and what you'll find

The dark web is part of the internet that isn't visible to search engines and requires the use of an anonymizing browser called Tor to be accessed.

holiday security have i been pwned

Aussie Troy Hunt drops Have I Been Pwned sale

The Have I Been Pwned data breach alert service will remain independent

healthcare data breach / medical patient privacy security violation

More breaches than ever occurring at Australian companies

Healthcare shamed, email blamed as data breaches increase 17 percent in the second half of 2019

Cybersecurity  >  Attack warning / danger / security threat

What is a cyber attack? Recent examples show disturbing trends

A cyber attack is an attack launched from one or more computers against another computer, multiple computers or networks. Here are some of the major recent cyber attacks and what we can learn from them.

cyber security lock padlock firewall code breach password

The OPM hack explained: Bad security practices meet China's Captain America

How the OPM hack happened, the technical details, and a timeline of the infiltration and response.

Marriott data breach  >  Marriott logo + binary data stream through the fingers of a hacker

Marriott data breach FAQ: How did it happen and what was the impact?

In late 2018, the Marriott hotel chain announced that one of its reservation systems had been compromised, with hundreds of millions of customer records, including credit card and passport numbers, being exfiltrated by the attackers....

Equifax breach  >  Equifax logo amid broken, disrupted binary code

Equifax data breach FAQ: What happened, who was affected, what was the impact?

In 2017, personally identifying data of hundreds of millions of people was stolen from credit reporting agency Equifax. Here's a timeline of what happened, how it happened, and the impact.

CSO > breakthrough / penetration testing / sledgehammer breaking through a binary wall

Release the monkey! How Infection Monkey tests network security

This free, open source penetration testing tool uses real attacks and real techniques to try and exploit its way into a network.

Load More
You Might Also Like