Millions affected by Scottrade brokerage breach that dates back two years
Missouri-based retail brokerage firm Scottrade has suffered a breach nearly two years ago, but they are only notifying their customers about it now, because they only found …
Car hacking via compromised car diagnostic tools
Car hacking is a topic that has received considerable attention from security researchers in the last year or so, and the general public and (hopefully) lawmakers are finally …
Is your board ready for a security incident?
Businesses suffered nearly 43 million known security incidents in 2014. This increased 48% compared with 2013 and equals some 117,000 attacks daily. And still, many boards and …
Prevention is the best cure for identity theft
In 2014, 85 percent of people took steps to prevent identity theft, according to ARAG, a provider of legal insurance. Checking credit reports, shredding documents with …
The changing role of the risk manager
71% of risk managers say their overall level of influence is greater now than it was three years ago according to a survey of 500 companies in EMEA conducted for ACE European …
Week in review: The evolution of the CISO, a simple Gatekeeper bypass, and Stagefright 2.0
Here’s an overview of some of last week’s most interesting news and articles:Leaked Hacking Team emails show Saudi Arabia wanted to buy the companyEmails stolen in …
Advertising malware affects non-jailbroken iOS devices
“YiSpecter is infecting iOS devices belonging to Chinese and Taiwanese users, and is the first piece of malware that successfully targets both jailbroken and …
Personal info of 15 million T-Mobile USA customers stolen in Experian breach
Personal information of some 15 million T-Mobile US customers and applicants has been stolen by hackers who managed to breach several Experian servers. The credit agency …
Exposing fraud behavior patterns associated with compromised identities
Timeliness of detection and diversity of data sources are critical factors in countering attempts to compromise consumer identities, according to ID:A Labs.Understanding fraud …
With unprotected keys and certificates, businesses lose customers
Unprotected and poorly managed keys and certificates result in a loss of customers, costly outages, failed audits, and security breaches, according to The Ponemon Institute …
Employee use of cloud services puts business data at risk
UK companies are placing themselves at risk of cyberattacks and data breaches as a result of rampant use of cloud storage services and unclear or non-existent corporate …
Unsurprisingly, companies are not protecting personal information
According to a global survey of privacy and risk professionals, more than half of the 780 respondents say consumers should not feel confident that companies are adequately …
Featured news
Resources
Don't miss
- March 2025 Patch Tuesday forecast: A return to normalcy
- Hetty: Open-source HTTP toolkit for security research
- How to safely dispose of old tech without leaving a security risk
- Who’s in your digital house? The truth about third-party access
- Can AI-powered gamified simulations help cybersecurity teams keep up?