Information security in loss figures
We surveyed almost 5,000 business decision-makers willing to share their thoughts on cybersecurity and their firms’ attitudes about cyberthreats.
34 articles
We surveyed almost 5,000 business decision-makers willing to share their thoughts on cybersecurity and their firms’ attitudes about cyberthreats.
A webinar on potential damage and the main risks associated with cloud breaches.
What is the cost of an incident that affects corporate data? Which threats are the most expensive? Learn that and more from our latest research.
Equifax had a data breach impacting 143 million Americans. What’s next?
Considering the modern threat landscape, the healthcare industry should pay more attention to cybersecurity
i-Dressup, a community for teenage girls, is actively leaking passwords in plain text.
If the rumours are true, 40 million Apple iCloud accounts have been hacked.
Millions of user logins for Tumblr and MySpace stolen, up for sale.
Spotify users’ account data once again found its way onto Pastebin. Change your password.
With Christmas less than a week away, it seems fitting that Hello Kitty is latest site geared at kids that has been hacked.
Devices that have functions of special importance, or that contain top-secret information, are not usually connected to the Internet. However, going offline is not the ultimate protection.
New allegations against the NSA claim the group hacked into the network of the world’s largest SIM card provider, stealing encryption keys to millions of devices.
The top privacy data leaks in 2014 include: data breaches at Target and Home Depot, hacks of JP Morgan and Barclays banks, and leaks at Orange and Dropbox.
A massive provider of insurance for bond investments misconfigured one of its servers and accidentally made a variety of sensitive payment information indexable.
Having your business bank account hijacked by cybercriminals could bankrupt your company, but that type of breach isn’t really what law enforcement cares about. They are concerned with only one thing: how well you protect certain information.
There have long been rumors in the InfoSec community that in the wake of recent revelations, foreign institutions embraced old-school means of keeping their secrets safe. Namely, once again embracing the typewriter. This is actually like betting on horse carriages at the dawn of the auto industry – sort of denying the future.
The Apple iCloud nude celebrity photo fiasco underscores the uncomfortable reality that even the savvy among us aren’t totally sure about what goes on and into “the Cloud.”
PoS malware is a long-standing problem which caught the public’s attention only recently. It came out with a loud bang: The repercussions of Target’s drastic data breach are still around.