Data Breach

Data Breach news, analysis, research, how-to, opinion, and video.

cloud security lock
fbis most wanted cybercriminals

hacker

Digital signature service DocuSign hacked and email addresses stolen

Digital signature service DocuSign said Monday that an unnamed third-party had got access to email addresses of its users after hacking into its systems.

medical records laptop doctor

Ransomware makes healthcare wannacry

The NHS ordeal is a wakeup call to healthcare administrators as to what needs to be done to make sure patients and their data are safe. Find out what advice vendors provide.

kaboom wanna cry

What to do about WannaCry if you’re infected or if you’re not

Tips on protecting computers against WannaCry and remediating ones already infected.

0 attack

How to counteract another ‘Dyn-like’ attack

Jim Hurley, a Distinguished Analyst at technology research and advisory firm ISG, shares his insights on what enterprises using cloud-based as-a-services can do to work with their providers and reduce risks to their business from...

firewall hole

Third parties leave your network open to attacks

With the Target example as the high-water mark, enterprises need to worry about the lack of security on a third parties’ part. How do you tighten things up?

0 intro strikeout baseball

How to strike ransomware out

Carbonite created this list of 10 important ransomware prevention tips and best practices.

data protection

Google echoes Amazon's assurance on EU data protection compliance

Google has joined Amazon Web Services in promising customers of its cloud services that it will be compliant with new European Union data protection rules due to take effect next year.

one thousand dollars

Report: Average ransomware demand now over $1,000

The average amount of a ransomware demand has increased from $294 in 2015 to $1,077 last year, according to a new report by Symantec.

clock and calendar montage
Infographic

April 2017: The month in hacks and breaches

Hacked emergency alarms, DDoS attack down under, extortion, and garden variety data losses and privacy breaches mark the month of April.

Cybersecurity threats that keep the banks up at night

People are often asking financial services firms what is keeping them up at night, and fraud and cyber security increasingly top the list, but what are the specific threats they have to contend with?

thinkstockphotos vault safe bank door

Human weakness enabling financial cybercrime

Cybercrime costs $3 trillion worldwide. One reason, a Boston police detective told a Boston banking audience, is because they make it too easy.

5 small business security

SMBs continue to be a target of cybercriminals

Believing that their security program is good enough means there's a good chance they’ll be breached. Here are some lessons from the bigs guys for the SMBs.

black man phone cafe upset

Users have little confidence their company can protect their mobile device

A survey sponsored by Check Point found that 64 percent of respondents are doubtful that their organization can prevent a mobile cyberattack. What can be done to combat that?

20151028 verizon logo innovation center 100624637 orig

Cyberespionage, ransomware big gainers in new Verizon breach report

Verizon released its tenth annual breach report this morning, and cyberespionage and ransomware were the big gainers in 2016. Cyberspionage accounted for 21 percent of cases analyzed, up from 13 percent last year, and was the most...

img 20170424 170357 01

Hipchat resets user passwords after possible breach

HipChat has reset all its users' passwords after what it called a security incident that may have exposed their names, email addresses and hashed password information.

medical records laptop doctor

Healthcare records for sale on Dark Web

A clinic in Baltimore is just one example of a healthcare provider having its records stolen, only to find them on the Dark Web for less than one cent per record.

cyber research find

The destruction of United’s brand highlights the role of employees in cyber defense

We recently saw the reputation of United Airlines destroyed in just 24 seconds. Yet the video of a man being beaten and dragged off his flight highlights a more serious information security risk.

What prevents breaches: process, technology or people? One answer is PC, and one is right.

Many experts say that people are more important than process in the IT security world. That is politically correct, as opposed to actually correct.

Load More