Data Breach

Data Breach | News, how-tos, features, reviews, and videos

google logo black

RIP Google Plus: Shutdown announced after API bug exposes 500,000 users' details

The end is near for Google Plus -- August 2019 -- after an API bug exposed 500,000 users’ details and Google chose not to disclose the breach for six months.

medical records 155235444

Gwinnett Medical Center investigating possible data breach

After being contacted by Salted Hash about a possible data breach, Gwinnett Medical Center, a not-for-profit network of healthcare providers in Gwinnett County, Georgia, has confirmed they're investigating what the healthcare provider...

Facebook / privacy / security / breach / wide-eyed fear

Facebook: 30 million accounts impacted by security flaw (updated)

On Friday, Facebook’s VP of product management Guy Rosen, coordinating with a Facebook post by founder Mark Zuckerberg, said the company discovered someone had abused access tokens for 50 million users on Tuesday afternoon.

12 incident response life preserver survival disaster recovery

6 steps for building a robust incident response plan

While a lot of energy is put it into avoiding security breaches, it’s not always possible. A solid incident response plan can restrict damage, reduce recovery time and limit the associated costs.

flag of the united states department of state

State Department confirms breach of unclassified email system

The U.S. State Department confirmed it suffered a data breach of its unclassified email system. It says less than 1% of employees were affected.

risk assessment - safety analysis - security audit

Wanted: Data breach risk ratings, because not all breaches are equal

We need a system for data breaches that rates the real risk associated with the compromised data.

intro data breach circuit board technology security

What is the cost of a data breach?

These are the factors that determine the cost of a breach, along with advice for minimizing their impact.

stolen credit card

In the new ecommerce fraud landscape, every vertical is now at risk

Fraudsters are not just targeting small merchants or inexpensive items anymore – virtually any vertical or product can be a worthwhile target for online fraud, and the losses could cause irreversible damage to a retailer’s bottom...

Exclamation point on screen warning alert caution stop

Ways to improve your security team’s response time

Every second counts when it comes to incident response. With proper staffing, a streamlined procedure and the right tools in place, responding to threats can be a far less daunting task.

security breach egg reveal locks binary code hacked

3 reasons companies fail to assess the scope of a data breach

Best advice: Understand your data, have proper event logging in place, and test your incident response plan. (You do have one, don’t you?)

cockroach bug binary2

Do you need a vulnerability disclosure program? The feds say yes

The FTC and DOJ are pushing companies to provide a means for good-faith security researchers to report bugs and put effective processes in place to act on those reports.

Dictionary definition of language under a magnifying lens.

The new definition for threat prediction

Security is hard enough without inaccurate understandings of your team setting unrealistic expectations for success. Security teams need to demystify the concept of “threat prediction” by addressing three common misunderstandings and...

vulnerable virus breach hacked cyber attack

Reddit discloses hack, says SMS intercept allowed attackers to skirt 2FA protections

Reddit, one of the largest websites on the internet, announced on Wednesday that someone was able to compromise staff accounts at their cloud and source code hosting providers, leaving backups, source code, and various logs exposed.

cloud security data breach crime accessible

Unsecured server exposes 157 GB of highly sensitive data from Tesla, Toyota and more

A publicly accessible server belonging to Level One Robotics and Controls exposed 157 GB of highly sensitive data from hundreds of companies, including Tesla, Toyota and Ford.

face superimposed on keyboard privacy hacker

Is privacy even possible in this Golden Age of Data Breaches?

Privacy seems like a pipe dream when everyone’s data seems vulnerable. Do we just give up on it though?

mobile security / unlocked data connections

8 steps to secure unmanaged devices in the enterprise

As more and more exploitable endpoints find their way onto our networks we need to act to secure them. This article will highlight practical strategies to help you secure IoT, mobile and other devices that require attention.

sad angry unhappy frustrated hands holding sign andre hunter 350301 unsplash

Lack of confidence in data security can cost you more than you think

The majority of companies don’t understand the value of their data, because they aren’t taking the necessary steps to study the information they are gathering from customers.

3 blockchain

5 ways to hack blockchain in the enterprise

Experts warn of blockchain security risks in non-cryptocurrency use cases.

red padlock cybersecurity threat ransomeware

10 ways to prevent, detect and recover from ransomware and zeroday threats

As ransomware runs rife the threat of extortion and disruption looms large. Find out what practical steps you can take to prevent ransomware from gaining a foothold and to detect it when your defenses fail.

nycrr cybersecurity gavel regulation compliance law nyc statue of liberty

Duty of care: Why (and how) law firms should up their security game

Lawyers have been slow to adopt modern technology — and even slower to respond to security threats. That may be changing.

Load More