data theft
Divorce is less stressful than safeguarding confidential data
How are IT managers coping with today’s threat landscape? Are they properly protected against the latest data-stealing malware? And would employees report if they …
Analysis of 250,000 hacker conversations
Imperva released a report analyzing the content and activities of an online hacker forum with nearly 220,000 registered members, although many are dormant. This forum is used …
4 million identity fraud victims in the UK
Identity fraud continues to rise with 4 million victims in UK alone – yet consumers continue to be complacent with their identities. According to research commissioned …
How the German “Federal Trojan” was actually used
After the Chaos Computer Club hackers made public the results of their analysis of a few samples of the so-called “Federal Trojan” and found it capable of more …
When it comes to intrusions, size matters
A survey of enterprise IT managers and network administrators that has been conducted annually since 2005 shows that there has been a gradual increase in smaller enterprises …
WineHQ database breached; Fedora Project forces password change
Following last month’s compromises of the primary repository for the Linux kernel source code and the websites and infrastructure of the Linux Foundation comes the news …
Trojanized Netflix app steals account login credentials
When Netflix released an Android client app earlier this year, it also witnessed the attempts of various app developers who tried to make a pirated copy of it work on other …
Two state-sponsored groups responsible for RSA breach
Two distinct groups were behind the March attack against RSA’s networks, said RSA president Tom Heiser, and they seem to have been directed in their efforts by a single …
Verizon Business data breach investigations report 2011: 8 days a week
What can be learned from the investigation into successful data breaches? What are the latest trends and techniques used by attackers? Get a front row seat at the breach cases …
Best practices for fighting credit card theft
3Delta Systems issued a set of business best practices for protecting customer credit card account information and minimizing corporate exposure to online payment scams. …
HTC Android devices allow almost any app access to private data
It’s bad news all around for users of various HTC Android smartphones, as the private data collected by the logging tools recently introduced by the company is also …
Nearly 5 million military health care files stolen
Sensitive data about nearly 5 million patients has been compromised following the theft of backup tapes from an electronic healthcare app used in the military health system, …
Featured news
Resources
Don't miss
- April 2025 Patch Tuesday forecast: More AI security introduced by Microsoft
- Forward-thinking CISOs are shining a light on shadow IT
- Inside the AI-driven threat landscape
- Ivanti VPN customers targeted via unrecognized RCE vulnerability (CVE-2025-22457)
- Attackers are leveraging Cisco Smart Licensing Utility static admin credentials (CVE-2024-20439)