Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

Expert: Basic Hacks Can Compromise Industrial Control Systems

Industrial control systems for dams, power plants, chemical plants and the like can be hacked with simple phishing attacks followed up by using tools that are easily available through Metasploit, security pros were told at a...


Shellshock flaw could pose risks to payments industry

No problems have been reported yet, but those in the industry should patch if possible

EPIC seeks enforcement action over Arizona data breaches

The Maricopa County Community College District lost more than 2.5 million records in two data breaches

Second cyberattack hits SuperValu grocery stores' payment systems

The Minnesota-based supermarket chain says technology installed after the first attack greatly reduced the severity of the second

Two scenarios that would make OS X vulnerable to the Shellshock bug

Intego has seen some proof-of-concept exploits for OS X using Bash

Credit card breach that hit Jimmy John's is larger than originally thought

An additional 108 restaurants were also affected, said credit-card processor Signature Systems

Dump Your Passwords! 8 Security and Identity Breakthroughs

From electronic pills to digital tattoos, these eight innovations aim to secure systems and identities without us having to remember a password ever again

Girl looking at cloud

The Dangers of Dark Data and How to Minimize Your Exposure

Structured data, like content in a database, is relatively easy to manage. However, confidential or sensitive unstructured information -- log archives and other untagged, non-inventoried data -- presents a real challenge to CIOs....

id thief

9 Tips to Protect Your CRM Data From Malicious Hackers

CRM data offers all sorts of goodies for hackers. Now's the time to step up your protections.

arrest

Apple Outsmarts the Thieves

The Apple Pay approach to mobile payment turns the security conundrum upside down by keeping data out of thief-magnet servers.

pleasepayfirst

We Just Might Put a Dent in Data Breaches

New developments in payment technology could show the way to keep credit card data away from the prying eyes of cyberthieves.

ebay sign

Is eBay Trading Too Much Security for Seller Happiness?

Criminals are exploiting an eBay security weakness that could result in shoppers getting redirected to a malicious webpage that tries to steal bank account information.

BitTorrent opens Bleep peer-to-peer encrypted chat program to public testing

The application is available for Windows, Mac and Android and a supports voice calls and instant messaging

Data Security

Fixing HealthCare.gov Security

While the security weaknesses found in HealthCare.gov by a U.S. government watchdog need to be addressed, they are not unusual for sites as complex as the federal insurance exchange.

Apple turns on iCloud two-step verification after nude selfie scandal

Two-step verification is not mandatory though Apple recommends it

Hackers accessed Goodwill hosting provider for 18 months before card breach

C&K Systems, which provided payment technology to Goodwill, said two other unnamed businesses were also affected

security target

How to Choose the Best Vulnerability Scanning Tool for Your Business

Any shop with Internet access must scan its network and systems regularly for vulnerabilities, but old-fangled tools made this a painful and time-consuming effort. Find out how new and improved vulnerability scanners make life easier...

Hacker manipulating code

Today's Security Hacks Are After More Than Bank Info

Customers cringe every time they hear about a bank, retail or healthcare hack that puts personal or financial data at risk. Today's hackers are after much more that credit card numbers, though -- and most firms are powerless to stop...

'Tiny banker' malware targets US financial institutions

Its source code was leaked in July, which may have broadened its use among cybercriminals

Load More