Data Breach

Data Breach | News, how-tos, features, reviews, and videos

a hooded figure targets a coding vulnerability
1 darkweb marketplace

alarm ambulance emergency red

Australian emergency warning system hacked, thousands receive alerts

A hacker took control of Australia’s Early Warning Network and sent an alert to thousands that said their personal data is not safe.

ransomware hack

Hacker posts ransom demand on Dublin's Luas tram system site

The website for Dublin’s tram system Luas was hacked, with the hacker threatening to leak the company’s private data if the ransom was not paid within the next five days.

hack hacker hacked

The most interesting and important hacks of 2018

The hacks, exploits and data breaches security researcher need to most pay attention to are those that do something new or suddenly increase in volume.

Facebook / privacy / security / breach / wide-eyed fear

What the recent Facebook exposé can teach security leaders

The biggest social media snafu of the year has lessons for enterprise security professionals.

The 18 biggest data breaches of the 21st century

Security practitioners weigh in on the 18 worst data breaches in recent memory.

Facebook / privacy / security / breach / wide-eyed fear

Facebook let Netflix, Spotify read your private messages

Facebook offered user data to more than 150 companies, ranging from tech and entertainment companies to online retailers, automakers, and even banks.

data breach predictions

13 data breach predictions for 2019

How will the nature and consequences of data breaches change in the coming year? Industry experts weigh in with their predictions.

paper bomb

Sextortion group behind bomb threat spam campaign

The mass-emailed bomb threats, which demanded bitcoin payments, seem to have come from a sextortion group.

stealing a password

Researchers find over 40,000 stolen logins for government portals

A phishing operation led to the theft of more than 40,000 login credentials for government services in 30 countries.

binary code matrix broken / breached / failed / hacked / security risk / threat / vulnerability

Hackers get into National Republican Congressional Committee's email system

The National Republican Congressional Committee's email system was hacked leading up to midterm elections.

marriott breach

US senator proposes jailing execs, fining companies for data breaches

Following the Marriott breach, a U.S. senator proposes jailing senior company executives and levying multi-billion-dollar fines for data breaches.

CSO slideshow - Insider Security Breaches - Two-faced businessman removes his mask in a binary world

7 warning signs of an insider threat

While the security industry often focuses on the nation-state and cyber criminals, often some of the biggest dangers are hiding in plain sight within your own company.

fbi badge gun

Ad fraud botnet 3ve shut down after infecting 1.7 million PCs

An enormous ad fraud botnet, 3ve, was shut down after 1.7 million PCs were infected to falsify 12 billion ads per day.

4 .root cause exploits breach raining data binary psd

Has the word ‘breach’ has outlived its usefulness?

When someone says a data breach has happened, it’s generally understood to mean that attackers have broken into a company and stolen sensitive information. But after a growing number of high-profile privacy gaffes, the definition of...

intro cyber attack maps

What is a cyber attack? Recent examples show disturbing trends

A cyber attack is an attack launched from one or more computers against another computer, multiple computers or networks. Here are some of the major recent cyber attacks and what we can learn from them.

Network World: IoT Hacks [slide-05] > Car Talk > Automotive hacks

The 7 deadly sins of endpoint detection & response

Breaches often take weeks or even months to uncover, but the right strategy combined with strong endpoint detection & response (EDR) tools can make all the difference. We examine seven vital factors to consider.

computer forensics

How to set up a successful digital forensics program

The time to set up a digital forensics program is before you have a breach. Here are the decisions you need to make.

malware attack

Worst malware and threat actors of 2018 so far

Researchers name the worst malware and threat actors of 2018 so far, several vulnerabilities were disclosed, and HSBC Bank reveals it suffered a data breach.

Load More