Paper healthcare records highly vulnerable, yet often overlooked

Paper healthcare records highly vulnerable, yet often overlooked

It isn't just digital healthcare records that are vulnerable. Paper records are regularly compromised -- and they're the easiest for healthcare organizations to protect.

Iran's need to steal intellectual property

Iran's need to steal intellectual property

The indictment of nine Iranians by the DOJ is one in a long string of incursions by Iran to compromise trusted insiders and steal intellectual property.

Former employee visits cloud and steals company data

Former employee visits cloud and steals company data

Shared credentials may have facilitated a former medical center employee's access to the HIPAA data stored in the cloud after his termination.

Vengeance by DDoS: No one is immune

Vengeance by DDoS: No one is immune

The DDoS attack is showing up as one of the tools used to extract vengeance against companies, organizations, and individuals. Companies need a defense plan.

Keep those nuclear secrets secret. No problem, I'll hoard them in my attic

Keep those nuclear secrets secret. No problem, I'll hoard them in my attic

Weldon Marshall recently pled guilty to stealing U.S government secrets associated with the U.S. nuclear weapons systems and keeping them in his Texas home.

U.S. cybersecurity threat risk remains high -- no signs of lessening

U.S. cybersecurity threat risk remains high -- no signs of lessening

The U.S. Director National Intelligence says the public and private sectors in the U.S. are at continual risk and the country should expect cyber attacks from nation state and non-state actors.

When employee access exceeds trust, IP goes missing

When employee access exceeds trust, IP goes missing

Companies may be tempting fate by giving interns deep access to company data, as these two examples of intellectual property theft show.

Cyber espionage: China wants Japanese firms’ intellectual property

Cyber espionage: China wants Japanese firms’ intellectual property

Cyber groups within China are targeting Japanese companies involved in heavy industry and national infrastructure as part of a multifaceted effort to create the Chinese strategic playbook.

Contractor hacks former employer, destroys and corrupts data

Contractor hacks former employer, destroys and corrupts data

Edward Soybel was let go by W. W. Grainger and subsequently hacked his way back into the company to access customer databases to destroy and corrupt the data.

China and Germany in a dust up over cybersecurity

China and Germany in a dust up over cybersecurity

Germany calls out China on their lack of progress on bilateral cybersecurity efforts, while China continues to target German companies for intellectual property theft.

4 Applied Materials executives fleece company and get indicted

U.S. Attorney for Northern California indicted four former executives for stealing intellectual property and trade secrets from Applied Materials.

Espionage: Germany unmasks fake Chinese LinkedIn profiles

Espionage: Germany unmasks fake Chinese LinkedIn profiles

Germany's BfV says Chinese intelligence services targeted more than 10,000 German citizens in a massive social engineering effort that included LinkedIn.

Insider threat — Chemours employee steals trade secrets

Insider threat — Chemours employee steals trade secrets

Chemours' off-boarding process provided the evidence that Jerry Jindong Xu stole trade secrets and intellectual property and tried to monetize the information in China.

Iran targeting international IP for theft and extortion

Iran targeting international IP for theft and extortion

Various Iranian hacker groups are successfully stealing or illegally procuring IP using all the tools in the toolbox to achieve their results.

Paradise Papers: Data leak shines a light on the monies of the elite

Paradise Papers: Data leak shines a light on the monies of the elite

Whether a hack or an insider leak, the 13.4 million records in the Paradise Papers detail the investments of offshore law firms and corporate investment firms.

Twitter employee deleting POTUS account is a lesson for all companies

Twitter employee deleting POTUS account is a lesson for all companies

A trusted insider turned the lights out on Twitter account of President Donald Trump, reminding us all how superuser access can be abused.

Swiss spy confesses, says he acted out of patriotism and profit

Swiss spy confesses, says he acted out of patriotism and profit

The saga of Daniel Moser, acting on behalf of the Swiss FIS to penetrate German tax authorities, comes to a close but not without an interesting twist.

Insider information leads to fraud scheme, arrests and conviction

Insider information leads to fraud scheme, arrests and conviction

Employees at HSBC Bank plc used insider information to their benefit, defrauding a client and generating millions of dollars for themselves.

China goes looking online for government secrets

China goes looking online for government secrets

China’s president painted a picture of openness and diplomacy, but cyber activity that seems to come from the country indicate Chinese hackers pose a threat.

Insider tries to scam Dice after hacking company he sold to Dice

Insider tries to scam Dice after hacking company he sold to Dice

David Kent sold his social network to Dice, created a competing company, hacked the first company to build up the new company, then tried to sell the new company to Dice.

Load More
Top Blog Posts