data breach
![eye](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195244/eye-400x200.jpg)
Hackers explain how they “owned” FlexiSpy
How did the hackers that go by the name Decepticons breach stalkerware manufacturer FlexiSpy? According to information purportedly provided by the attackers themselves, it …
![InterContinental](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104530/intercontinental-400x200.jpg)
InterContinental confirms card data breach at over 1,000 locations
InterContinental Hotels Group (IHG) has reported last week that a huge number of their hotels in the US and Puerto Rico have been compromised with payment card …
![Wonga](https://img.helpnetsecurity.com/wp-content/uploads/2017/04/09104552/wonga-400x200.jpg)
270,000 customers affected in UK loan firm Wonga data breach
Personal and financial data of some 270,000 customers of UK payday loan firm Wonga have likely been pilfered in a data breach. The data that was accessed by the attackers …
![Review: Data Breach Preparation and Response](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104626/main-data_breach_preparation-400x200.jpg)
Review: Data Breach Preparation and Response
About the author Kevvie Fowler is a Partner and National Cyber Response Leader for KPMG Canada and has over 19 years of IT security and forensics experience. He is a SANS …
![skull](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112756/money-skull-400x200.jpg)
Number of compromised records up 566% in 2016
The number of records compromised grew a historic 566 percent in 2016 from 600 million to more than 4 billion. These leaked records include data cybercriminals have …
![eye](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195244/eye-400x200.jpg)
1.37 billion data records compromised globally in 2016
Gemalto’s Breach Level Index revealed that 1,792 data breaches led to 1.37 billion data records being compromised worldwide during 2016, an increase of 86% compared to …
![rings](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113023/rings-400x200.jpg)
User info of millions of Wishbone users slurped by hackers
Science Inc., the company behind the popular online poll creation app Wishbone, has suffered a data breach. As a consequence, personal and account information of over 2.2 …
![Laptop](https://img.helpnetsecurity.com/wp-content/uploads/2017/03/09104809/laptop-dark-400x200.jpg)
The impact of highly targeted attacks on modern organizations
In this podcast recorded at RSA Conference 2017, Lance Cottrell, Chief Scientist at Ntrepid, talks about the growing trend of targeted attacks, as well as strategies …
![Yahoo](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110354/yahoo-400x200.jpg)
Yahoo cookie-forging incident affected 32 million accounts
We finally know how many user accounts were affected by last year’s Yahoo cookie-forging incident: 32 million. What happened? “In November and December 2016, we …
![brain](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09110848/brain-hack-400x200.jpg)
CloudPets connected toys can be turned into remote surveillance devices
The CloudPets data breach saga continues, as Spiral Toys finally reported the breach to the California Attorney General’s Office. As a reminder: Leaked data provided to …
![healthcare](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105519/healthcare-400x200.jpg)
The devastating impact of healthcare data breaches
One in four U.S. consumers have had their personal medical information stolen from technology systems, according to Accenture. The findings show that half of those who …
![files](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110451/files-400x200.jpg)
Data breaches becoming more complex, pervasive and damaging
Data breaches are becoming more complex and are no longer confined to just the IT department, but are now affecting every department within an organization. Each breach leaves …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD