Article archive

Eight hundred data breaches in Scotland over five years

05/01/2014 21:03
There have been more than 800 incidents of data loss by health boards in the last five years, figures have revealed. They include patient notes being found in public places within NHS buildings, documents left in car parks and public transport, and personal information being sent to the wrong...

How to preserve forensic evidence in the golden hour after a breach - By Martin Roots

05/01/2014 10:04
Most IT managers focus on providing their users with a good level of service and support, for example keeping the network up and running and making sure the systems are free from malware. But what should their response be when the boss comes into the office and tells them that one of...

Companies More Vulnerable to Cyber Breaches Around New Year By Sarah Frier and Peter Burrows

05/01/2014 06:29
A string of cyber attacks over the holidays — involving Snapchat Inc., Microsoft Corp.’s Skype and Target Corp. — underscore how companies tend to be more vulnerable to hacking during the end-of-year season. Snapchat saw data for 4.6 million of its users exposed on the Internet on Dec. 31, just...

Cash machines raided with infected USB sticks By Chris Vallance

03/01/2014 22:22
Researchers have revealed how cyber-thieves sliced into cash machines in order to infect them with malware earlier this year. The criminals cut the holes in order to plug in USB drives that installed their code onto the ATMs. Details of the attacks on an unnamed European bank's cash dispensers were...

A Snapchat security breach affects 4.6 million users. Did Snapchat drag its feet on a fix? By Brian Fung

02/01/2014 18:32
Snapchat users are waking up to troubling news: Thanks to a gap in the service's security, the phone numbers and usernames for as many as 4.6 million accounts have been downloaded by a Web site calling itself SnapchatDB.info. The hack appears to be real, affecting at least one member of the...

Cyber Terrorism - Lloyds

02/01/2014 18:18
Industrial facilities from nuclear plants to dams are increasingly coming under attack from cyber terrorists bent on causing physical damage and disruption from behind their computer terminals. But with the insurance market yet to plug the gap between cyber and physical terrorism risk, the Lloyd’s...

Viewing Where the Internet Goes By John Markoff

02/01/2014 18:09
Will 2014 be the year that the Internet is reined in? When Edward J. Snowden, the disaffected National Security Agency contract employee, purloined tens of thousands of classified documentsfrom computers around the world, his actions — and their still-reverberating consequences — heightened...

Briar Group confirms it was source behind Seaport data breach By Ashley Troutman

02/01/2014 13:05
BOSTON (MyFoxBoston.com) -- After an investigation, the Briar Group, which runs eight restaurants and bars in the city, learned that their systems were infiltrated causing the data breach that affected hundreds who visited the Seaport area of Boston in November. Although the investigation remains...

Target Could Be Liable for $3.6 Billion from Security Breach - By Kevin Parrish

01/01/2014 11:55
This is just the beginning. Target said on Friday that it is actively partnering with the United States Secret Service and the Department of Justice on the ongoing investigation into the malware that affected Target’s point-of-sale system in U.S. stores. The company can’t say anything further,...

Stolen TARGET Credit Cards and the Black Market: How the Digital Underground works By Ken Westin

29/12/2013 07:19
With the Target data breach, many are wondering how criminals can profit from the use of the stolen credit cards. The card holders themselves will not be responsible for any of the charges, so how is it that criminals are able to make money from stolen credit cards? I have been involved with...
Items: 901 - 910 of 924
<< 89 | 90 | 91 | 92 | 93 >>