Data Protection

Data Protection news, analysis, research, how-to, opinion, and video.

Factory reset in Android phones leaves sensitive user data behind

Researchers recovered access credentials, emails, text messages and other sensitive information from wiped Android phones

fitbitbracelettoryburch

Leaked database of Adult Friend Finder still online

Adult Friend Finder was breached more than two months ago, according to a dark Web forum

The exterior of a former Starbucks

What every CSO should be doing now about the Starbucks potential hack

Don’t lose an opportunity to create a great teachable moment.

In desperation, many ransomware victims plead with attackers

TeslaCrypt creators negotiated with victims, earned over $76,000 in two months

14445634744 3d2d72c990 o

Re-thinking doctor-patient communications in the digital age

In recent weeks, the appropriateness of email communication has come under heavy scrutiny as the media revealed that Hillary Clinton exclusively used a personal email account during her tenure as secretary of state. Professor Eric...

Sally Beauty confirms second payment card breach

There's enough evidence to confirm an intrusion, but the scope of the breach is not yet clear

Critical VM escape vulnerability impacts business systems, data centers

The vulnerability, dubbed Venom, affects systems usings the QEMU, Xen and KVM virtualization platforms

Add GitHub dorking to list of security concerns

The Uber-GitHub dispute highlights a common open source risk, but Uber is hardly alone in accidentally uploading sensitive data to GitHub, the world's most popular code hosting site. Security experts say that GitHub's repositories...

inverness shire constabulary mountain rescue off road vehicle

Taking our breach response plan for a test-drive

Our manager upgrades his company’s incident response plan and gets ready to test it with all the people who will need to react should a real breach ever hit.

leaky pipes

10 automated response companies that can help contain a breach

The automated security incident response space is still in its infancy, but several companies are working on the problem of collecting all the security alert data, analyzing it, and triggering automatic remediation processes when...

Companies are falling behind on securing their SAP environments

More than 95 percent of SAP systems are vulnerable, a SAP security firm said

safety first 620x465

SAFETY Act liability shield starts showing cracks

This week, Salted Hash has examined the Department of Homeland Security's (DHS) SAFETY Act, and FireEye's promise to customers that their certification under the act provides them protection from lawsuits or claims alleging that the...

Cybercriminals borrow from APT playbook in attack against PoS vendors

Attackers impersonated point-of-sale system owners in need of technical assistance in a spear-phishing attack targeting PoS vendors

Sally Beauty investigates possible second card breach

It's not known if the latest incident is related to last year's breach, the company said

Microsoft picks security for the enterprise win

The company has revamped its routine for supplying security patches and has unveiled data and system protections

Facebook change will give you control over data sharing with apps

Users can now decide what types of data to share with third party apps

Facebook, under siege, slams European privacy regulators

Facebook has already filed a lawsuit against the Dutch data protection authority over an investigation into its privacy practices

SendGrid resets passwords as investigation reveals deeper breach

An employee account was compromised, which gave access to customers' email lists

Police breaks up cybergang that stole over $15 million from banks

Romanian authorities detained 25 suspected members of an international gang of cyberthieves who hacked into banks and cloned payment cards

Load More