Please turn on your JavaScript for this page to function normally.
More of Hacking Team’s capabilities and questionable actions revealed

The Hacking Team data leak has shown us with whom the company does business with, and their employees’ and management’s unguarded opinions about various …

Naked pictures or financial info? Users would rather thieves stole the former

Every day it seems information security is ruling the headlines, Americans are (perhaps understandably) feeling insecure about the security of their financial information. In …

Never underestimate the impact of a data breach

The growth of cyber-crime and the impact of successful attacks on an organization’s bottom-line should not be underestimated; it is anticipated that data breaches will …

Reactions to the Hacking Team breach

Hacking Team, the (in)famous Italian company that provides offensive intrusion and surveillance software to governments, intelligence and law enforcement agencies around the …

Hacking Team hacked, 400GB+ of company documents and emails leaked

Hacking Team, the (in)famous Italian company that provides offensive intrusion and surveillance software to governments, intelligence and law enforcement agencies around the …

Plex forums hacked: IPs, private messages, encrypted passwords compromised

Users of Plex’s forums are being forced to change their password in wake of a breach that resulted in the compromise of some of their private information, including …

You’ve been breached, now what?

Everybody tends to think that hackers will never ever target them or their company/organization until a breach occurs. This article concentrate on post-incident actions and …

Harvard University suffers IT security breach

Discovered on June 19, the intrusion was first spotted on the Faculty of Arts and Sciences and Central Administration information technology networks, but a subsequent …

US OPM takes vulnerable background investigation portal offline

The US Office of Personnel Management announced on Monday that it has temporarily suspended the E-QIP (Electronic Questionnaires for Investigations Processing) system, a …

4 in 10 midsize businesses have experienced a data breach

Most midsize business leaders view a data breach among their top risks and a majority consider IT security ‘very important’ when selecting a supplier. They have good reason to …

How companies can regain consumer trust after a data breach

Americans have strong feelings about data breach notification, with 84 percent stating that the best way a company can regain their trust after a breach occurs is to notify …

Energy security pros: More competent, or just naive?

Energy security professionals are extremely confident in their ability to detect a cyberattack on critical systems, with 86 percent stating they could detect a breach in less …

Don't miss

Cybersecurity news