Please turn on your JavaScript for this page to function normally.
Data mapping and masking requirements

A new study of 3,765 publicly disclosed breach incidents shows they resulted in financial losses of more than $156 billion. Published by the Digital Forensics Association, the …

Vending machine company breach results in massive credit card data theft

Credit and debit card data of some 40,000 people who visited the Wilderness Resorts water parks in Wisconsin and Tennessee from December 12, 2008 to May 25, 2011 has been …

Facebook tool automates syphoning of user data

A group of security researchers has developed a proof-of-concept Java-based tool that could allow malicious individuals to automatize the syphoning of information from a …

Bogus “last words” Facebook app offer leads to malware

Humans have many impulses and fears, and cyber crooks can be counted on exploiting each and every one of them for achieving their purposes. The latest example of this has been …

Akamai insider pleads guilty to foreign economic espionage

A former Akamai employee has been accused of and has pleaded guilty to having passed on confidential information regarding the company to a man he believed was a Israeli …

Is this the phishing email that caused the RSA breach?

“I forward this file to you for review. Please open and view it,” says simply the email that is thought to have been the means of deploying the backdoor that …

Have you been hacked this month?

I’m assuming the majority of people are sitting smugly reading this thinking “of course I haven’t!’ You do everything you’re supposed to do, …

One click away from digital disaster

61 percent of consumers click on links while online that take them to unexpected places, making them vulnerable to cyberattacks that can lead to identity theft, according to …

WikiLeaks defector destroyed 3,500+ unpublished files

It seems that the long awaited WikiLeaks leak containing documents regarding Bank of America will not be happening in the near or possibly not in any kind of future, since the …

Chinese mobile phone monitoring service found

What do you think cyber crooks do with the information collected from mobile phones by malware? Trend Micro has one of the answers to that question. Its researchers have …

Dropbox for Android security bypass vulnerability

A security issue has been reported in Dropbox for Android, which can be exploited by malicious people to bypass certain security restrictions, according to Tyrone Erasmus of …

Citigroup suffers second data breach in four months

Less than four months after the breach that affected some 200,000 Citigroup customers comes the news that the personal data of 92,000 Citi Cards Japan users has been …

Don't miss

Cybersecurity news