data breach
![AdultFriendFinder](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105829/adultfriendfinder-400x200.jpg)
Compromised: 339 million AdultFriendFinder users
Friend Finder Networks, the company that operates sites like Adultfriendfinder.com (“World’s largest sex & swinger community”), and Cams.com …
![Tesco Bank](https://img.helpnetsecurity.com/wp-content/uploads/2016/11/09105857/tesco_bank-400x200.jpg)
Tesco Bank hack shows that attackers continue to follow easy money
What happens when nearly 9,000 accounts at a financial institution experience fraudulent activity and clients have nearly £2.5 million stolen? People notice. The bank notices …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09112909/user-400x200.jpg)
Most employees violate policies designed to prevent data breaches
Companies are increasing technology investments to protect against external data breaches, but employees pose a bigger threat than hackers, according to CEB. To mitigate the …
![strategy](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111027/strategy-400x200.jpg)
Best practices for enterprises to effectively combat cybercrime
Employee training and cyber awareness, combined with a solid defense strategy and best-in-class cybersecurity tools and software, are essential to reducing the risks of data …
![Weebly](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110137/weebly-400x200.jpg)
43+ million users affected by confirmed Weebly breach
Weebly, a popular web-hosting service featuring a drag-and-drop website builder, has been breached, and email addresses/usernames, IP addresses and encrypted passwords for …
![mobile payment](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110344/mobile_payment-400x200.jpg)
Most would stop using digital payments if breached
88% of respondents to a survey conducted by Wakefield Research would stop using digital payments if they personally fell victim to cybercriminal activities as a result of a …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/08/09111038/cloud-400x200.jpg)
A closer look at data breach preparedness
While most organizations have a data breach preparedness plan in place, executives are not updating or practicing the plan regularly and lack confidence in its effectiveness, …
![Yahoo](https://img.helpnetsecurity.com/wp-content/uploads/2016/10/09110354/yahoo-400x200.jpg)
Yahoo security breach highlights the importance of personal protection
The recent breach at Yahoo has proved once again that, regardless of a company’s size and expertise, security is always an issue. In the wake of the incident which left …
![Yahoo](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110440/yahoo-400x200.jpg)
Yahoo breach was not state-sponsored, researchers claim
The massive 2014 Yahoo breach isn’t the work of state-sponsored hackers as the company has claimed to believe, say researchers from identity protection and threat …
![Eyes](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112400/laptop-eyes-technology-computer-400x200.jpg)
Repercussions of the massive Yahoo breach
Yahoo has announced on Thursday that they have suffered a breach and that account information of at least half a billion users has been exfiltrated from the company’s …
![MoDaCo](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110554/modaco-400x200.jpg)
880,000 users exposed in MoDaCo data breach
Subscribers of UK-based MoDaCo, a forum specialising in smartphone news and reviews, have been unpleasantly surprised by notifications that the site and their account have …
![user](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195157/user-400x200.jpg)
Identity and personal data theft account for 64% of all data breaches
Data breaches increased 15% in the first six months of 2016 compared to the last six months of 2015, according to Gemalto. Worldwide, there were 974 reported data breaches and …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD