data leak
Cloud-based solutions that protect against zero day attacks
BAE Systems Applied Intelligence announced at Infosecurity Europe 2015 that it is bringing cloud-based cyber security to commercial organisations in Europe for the first time. …
Endpoint Protector gets integration with cloud storage apps
At Infosecurity Europe 2015, CoSoSys announced the development of Endpoint Protector 4 to include new integrations with Dropbox for Business and Box to strengthen data …
Employee credentials of half of European top 500 firms exposed online
Cyber attacks and data breaches very often start with phishing or spear-phishing. Access to good credentials is key – whether it’s for straight emailing or direct …
Hackers stole personal info of over a million of Japanese pensioners
Personal information of some 1.25 million of Japan’s pensioners has been compromised and some of it was leaked following a successful breach of Japan Pension …
How businesses can stem the flow of leaky data
The privacy and security of corporate data is at risk like never before. Not only are businesses faced with an ever-growing variety of security threats, from sophisticated, …
Hacker leaks sensitive info of millions of Adult FriendFinder users
Information of over 3.5 million users of dating site Adult FriendFinder has been stolen and leaked online, and is being used by spammers, scammers and phishers, a Channel 4 …
Company compiles massive marketing database by scraping data dumps
SalesMaple, a recently founded data analytics startup headed by PwnedList founder Steve Thomas, has made available a free database of some 30 million business contacts, which …
Sensitive customer data leaked following mSpy data breach
mSpy, a company that sells “customized and user-friendly mobile and computer monitoring solutions,” has apparently suffered a data breach.They still haven’t …
![WinMagic](https://img.helpnetsecurity.com/wp-content/uploads/2015/04/09194614/winmagic-400x200.png)
SecureDoc Cloud removes security concerns related to cloud file sharing
WinMagic introduced at RSA Conference 2015 security software that encrypts and manages how files are shared via cloud file sharing services such as Dropbox or Box. SecureDoc …
What happens to data after a breach?
Bitglass undertook an experiment geared towards understanding what happens to sensitive data once it has been stolen. In the experiment, stolen data traveled the globe, …
A billion data records leaked in 2014
2014 was the year when “designer vulnerabilities” emerged, when breaches and security incidents were being announced so fast that we struggled to keep up, when old …
Darkleaks: An online black market for selling secrets
Whistleblowers and those individuals that are simply out to make a buck out of any confidential and valuable information, can now offer it for sale on Darkleaks, a …
Featured news
Sponsored
Don't miss
- SYS01 info-stealer pushed via Facebook ads, LinkedIn and YouTube posts
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)