Data Breach

Data Breach news, analysis, research, how-to, opinion, and video.

insider threats
hacker hacked threat

mature man peeking through window blinds 200136043 001

SOURCE Boston: Confronting the insider threat

The insider threat remains – it is hard to detect malicious employees when security tools are designed to block and catch outsiders. But technology that tracks employees’ online and network behavior can set off alarms when it strays...

malware infection cyberattack

SOURCE 2016: It's behavior, not names, that gives attackers away

Zero days get some interesting names. But a seminar at SOURCE Boston 2016 argued that names don’t matter – it’s the behavior of attackers is what will eventually give them away.

1 linkedin

A hacker is selling 167 million LinkedIn user records

A hacker is trying to sell a database dump containing account records for 167 million LinkedIn users.

cyber security

4 big plans to fix internet security

Internet security is in crisis. These four proposals offer tangible solutions -- including one scheme to change the Internet's workings from top to bottom

hospital corridor

Criminals taking a bigger bite of health breaches

The percentage of health care data breaches due to criminals has risen from 20 to 50 percent since 2010, but health care organizations are failing on defense, according to a new study. On average, the percentage of health care...

security hacker

That massive reported 'data breach' was just hype, Mail.ru says

Hold Security made quite a splash in the security world on Wednesday when it claimed to have recovered 272 million stolen email credentials from a much larger trove, but on Friday the email provider most strongly affected called the...

boxer fighter punch

10 companies that can help you fight phishing

According to the most recent Verizon data breach report, a phishing email is often the first phase of an attack

01 intro

Who is a target for ransomware?

The targets of ransomware change according to victim awareness and willingness to pay. Some adversaries may even widen their delivery vector to encompass multiple demographics to account for market shifts. Here’s a look at their...

Gmail Google Mail

A Russian hacker gave away millions of email credentials for social media votes

Tens of millions of stolen credentials for Gmail, Microsoft and Yahoo email accounts are being shared online by a young Russian hacker known as "the Collector" as part of a supposed larger trove of 1.17 billion records.

insurance

What is cyber insurance and why you need it

Cyber insurance can't protect your organization from cybercrime, but it can keep your business on stable financial footing should a significant security event occur.

Panama papers

Panama Papers leak explained: What you need to know about the Mossack Fonseca hack

Offshore tax shelters may pay, but scrimping on security doesn't.

ransomware key 500 1

The expanding landscape of exploit kits

Angler, Magnitude, and Nuclear are a few of the most commonly used exploit kits criminals are using to deliver a variety of payloads from botnets to ransomware.

slack icon

Developers leak Slack access tokens on GitHub, putting sensitive business data at risk

Developers from hundreds of companies have included access tokens for their Slack accounts in public projects on GitHub, putting their teams' internal chats and other data at risk.

hollywood presbyterian

Should hospitals pay up when it comes to ransomware?

Has the recent wave of ransomware attacks aimed at hospitals been a wakeup call for the healthcare industry? Or is this latest security plague just part of the new normal?

data breach hacker

How to keep your small business safe from data breaches and hacks

Ecommerce and security experts provide 10 tips for preventing breaches and hacks and keeping customer data safe.

breach title

Enterprises fall behind on protecting against phishing, detecting breaches

The ninth annual Verizon Data Breach Report contains bad news on multiple fronts, including click-through rates on phishing messages, how long it takes companies to detect breaches, and even whether companies spot the breaches at all....

phishing cyber theft hacked scam

Phishing emails leverage unique subject lines, Office docs

Phishing emails continued to evolve last year, with Microsoft Office documents and unique subject lines used to get past enterprise filters.

Man trying to sleep in the middle of the night

4 tech nightmares keeping IT leaders up at night

What’s keeping CIOs awake at night? From data breaches to social engineering, there’s plenty to keep tech types tossing and turning.

Load More