Data Breach

Data Breach news, analysis, research, how-to, opinion, and video.

screen shot 2017 02 27 at 4.34.08 pm
07 insider

eliminate insider threats 1

Who should be on an insider risk team?

Catching an insider taking confidential information doesn't happen by chance, and policies and procedures must be in place to know what to do when an insider is caught.

security code big data cyberespionage byte

Cloudflare bug exposed passwords, other sensitive data from websites

For months a bug in Cloudflare's content optimization systems exposed sensitive information sent by users to websites including passwords, session cookies, authentication tokens and even private messages.

medical records healthcare medicine file document claim form doctors office hospital 000000399129

Healthcare firms plan to increase security spending

After several high-profile breaches over the past couple of years, the healthcare industry plans to increase its spending on IT security more than other sectors.

img 20160625 202609

A hard drive's LED light can be used to covertly leak data

The seemingly harmless blinking lights on servers and desktop PCs may give away secrets if a hacker can hijack them with malware.

3 bitcoin

Would killing Bitcoin end ransomware?

Bitcoin and ransomware seem to go hand-in-hand, but experts explain that doing away with the cybercurrency would just force cybercriminals to find another anonymous way to extort money.

Self driving truck

Ride along to solve these data breaches

Verizon’s recently released annual breach report that examines some of its cases where the RISK Team was called in to hunt down culprits. The “ride –along edition” of Verizon’s report gets a first-person perspective of the company...

Man looking worn out in mod orange chair with a wad of cash in a mouse trap

Users take the cheese to solve data breaches

Verizon releases its annual breach report that puts the reader in the driver's seat.

ransomware data laptop

Tips for negotiating with cyber extortionists

Whether you are opposed to it or not, enterprises need to have a plan for negotiating with people who take their data hostage.

wallet man money

To pay or not to pay: Too many victims say yes to ransomware

Ransomware’s success rate is so alarming that it is the subject of an all-day “summit” at this week’s RSA conference. Ironically, experts say defending against it is not terribly difficult, and how to do it is widely publicized – it’s...

01 worms

Heartbreaking hacks

Every year hackers take advantage of cupid’s sharp arrow to trip-up unsuspecting online users.

2 not sick

Your personal info might be as sick as you

Moshe Ben-Simon, co-founder and vice president of TrapX Security, runs through how hospitals can shore up your data so that cybercriminals can’t get at it.

bullseye hospital healhcare

Hospital devices left vulnerable, leave patients at risk

A patient lies in a hospital bed waiting for a medical professional to conduct a blood gas analysis. Little does the patient know that his personal information is also undergoing a procedure. The database that stores patient data was...

MySpace becomes every hackers’ space with top breach in 2016, report says

Hackers revived what is largely perceived as a dormant social media site, stealing as many as 427 million customer records in 2016. Forrester reported that there was not another breach even close but it did say that 75 percent of...

clock and calendar montage

January 2017: The month in hacks and breaches

Hackers are off to a quick start in the new year.

controlling privacy

5 shocking new threats to your personal data

The internet and smartphones have come up with five new and surprising ways to steal or expose our personal data. These trends make panic sound like a good idea.

leaked

LeakedSource's shutdown is a blow to amateur hackers

Amateur hackers are alarmed with the apparent demise of LeakedSource, a controversial breach notification site that’s been accused of doing more harm than good.

00 crimeware

A new service for the less techie criminals

Aditya K Sood, PhD, Director of Security and Cloud Threat Labs, Blue Coat Systems, a part of Symantec, details how cybercriminals can obtain sensitive data, like credit card numbers, names and addresses, with just a couple of clicks...

product in use

Password-free security uses voice, user behavior to verify identity

Tired of conventional passwords? So is Nuance Communication, a tech firm that is promoting the human voice as a way to secure user accounts.

Load More