Data Breach

Data Breach news, analysis, research, how-to, opinion, and video.

pexels photo
fallen tree

vtech innotab 3

Data breach of toy maker VTech leaked photos of children, parents

The data breach of Hong Kong-based toy manufacturer VTech appears to have also included photos of children and parents, adding to what could be one of the worst leaks of the year.

Hackers target toy maker VTech, make off with customer data

Hackers made their way into VTech's Learning Lodge app store customer database, according to the company. As many as 4.8 million parents—and 200,000 kids–may have been affected.

dido harding ceo of talktalk

Police arrest blackmail suspect in TalkTalk data breach case

Police believe they may have found the person who tried to blackmail the CEO of TalkTalk, the U.K. telecommunications company that was the target of a data breach.

black friday

Retailers targeted by sophisticated ModPOS malware

The ModPOS malware has already hit multiple national retailers and compromised millions of cards, according to new research released this morning, but there are likely to be more infections still out there since this particular...

1 communications

What security leaders need to know about breach communication

Leigh Nakanishi shares the approach security leaders need to prepare for their turn to communicate and coordinate during a breach

honesty box

CISOs learn 5 tough lessons about conveying security risks

Honesty can still be the best policy, but there are some precautionary measures to take.


Exploit kit activity up 75 percent in third quarter 2015

In a sign of the increasing professionalization of the space, exploit kit activity increased 75 percent in the third quarter of this year compared to the same period last year, based on DNS activity, according to the latest edition of...

cyber security lock secure security

How to crowdsource your way to better security

Synack, a company founded by former NSA analysts, attempts to leverage the best of man and machine approaches to provide enterprise cybersecurity protection.

sloppy security 2

Organizations sloppy about securing privileged accounts

While most companies have processes in place for managing administrative and other privileged accounts -- the sorts of credentials frequently used in high-profile data breaches for the past several years -- most do a poor job of...

Siegfried Rasthofer Steven Arzt Black Hat Europe 2015

Millions of sensitive records exposed by mobile apps leaking back-end credentials

Thousands of mobile applications use cloud-based, back-end services in an insecure way, allowing anyone to access millions of sensitive records created by users, according to a recent study.

jpmorgan signage

Three indicted in JPMorgan hacking case

On Tuesday, Manhattan US Attorney Preet Bharara's office unsealed an indictment against three individuals charged with hacking several financial institutions, financial news publishers, and other companies.

cyber insurance

Need for cyber-insurance heats up, but the market remains immature

CIOs are scrambling to purchase cyber-insurance, but the need may be outpacing a market that continues to evolve in the face of significant cyberattacks.

hardware security embedded circuit board integrated controller

EMC, hospital to pay $90,000 over stolen laptop with medical data

EMC and Hartford Hospital have agreed to pay US$90,000 to Connecticut in connection with the loss in 2012 of an unencrypted laptop containing patient information of 8,883 residents of the state, according to the state's attorney...

FCC building in Washington

Cox to pay $595,000 for Lizard Squad data breach

Cox Communications has agreed to pay US$595,000 and submit to seven years of computer security compliance monitoring by the Federal Communications Commission to settle an investigation into whether the cable TV and Internet operator...

digital pearl harbor

Hostile nations have breached U.S. infrastructure. But don’t panic

U.S. industrial control systems were built for reliability, not cyber security, since their designers didn’t expect them to be networked or connected to the Internet. Now that they are, they are an attractive and relatively easy...

cybersecurity boards

9 of 10 directors support regulator action on cybersecurity

In a study released this morning, nine out of 10 corporate board members said that regulators should hold businesses liable for breaches if they haven't taken reasonable steps to secure customer data.

rudisearltalk 2

How Verizon analyzes security-breach data with R

Verizon researchers receive incident data from contributing organizations, which means numerous categories also have subcategories. Importing and analyzing all that with Excel was problematic.

dido harding

TalkTalk breach investigation leads to fourth arrest

As the company scales back its estimate of the number of customers affected, the police dragnet is spreading -- and Members of Parliament are now taking a close interest in the case.

Load More