www.fgks.org »
Address
:
[go:
up one dir
,
main page
]
Include Form
Remove Scripts
Accept Cookies
Show Images
Show Referer
Rotate13
Base64
Strip Meta
Strip Title
Session Cookies
Mobile Version
Subscribe
Contact Us
About Us
Advertising
Editorial
SC UK
SC Aus/NZ
Home
News
Features
Opinions
Congress News & Opinions
Products
Sectors
News Bytes
Canada News
Newsletters
Videos
Products
Group Tests
First Looks
Products
About Reviews
Blogs
The News Team Blog
The Data Breach Blog
The SC Magazine Awards Blog
Buyers Guide
Whitepapers
Jobs
Events
SCWC 24/7
SC Awards U.S.
Editorial Webcasts
Vendor Webcasts
SC World Congress NYC
SC Congress Canada
Podcasts
SC Awards Canada
Subscribe
Newsletters
Subscribe to SC
Archive
SC World Congress
Archive
Topic Center:
Financial Services
Health Care
Retail
Government
SC Awards
SC Canada
SC Scholars
Cybercrime Corner
RSS
|
Login
|
Register
Data Breaches
Gawker breach prompts LinkedIn, Yahoo password resets
Angela Moscaritolo
December 16, 2010
The recent theft of approximately 1.3 million account details from the servers of Gawker has prompted password resets at a number of popular websites.
Hundreds of thousands affected in latest Ohio State breach
Angela Moscaritolo
December 16, 2010
The Ohio State University (OSU) has notified hundreds of thousands of students and faculty members that their personal information was compromised by hackers who broke into a campus server.
Twitter spam campaign linked to Gawker breach
Angela Moscaritolo
December 13, 2010
A massive spam campaign that has rapidly spread on Twitter has been linked to a recent security breach of online media company Gawker Media.
Colorado county files mistakenly posted online
Angela Moscaritolo
December 07, 2010
More than 20 years worth of personal and investigative Sheriff's Department records from Mesa County, Colo. were inadvertently posted online, where they remained for several months.
Bad medicine: Can poor data security result in death?
Charles Jeter, ESET cybercrime investigator November 29, 2010
Medical records could become compromised during transmission, on the patient's computer, or at any number of multiple points of storage.
Distributed breaches increase this year
Angela Moscaritolo
November 10, 2010
A breach rivaling Heartland Payment Systems may not have occurred in 2010, but that doesn't mean organizations still aren't getting hit hard.
Breaches cost health care industry $6 billion annually
Angela Moscaritolo
November 09, 2010
Despite facing stricter privacy and security regulations, hospitals still are struggling to protect patient information, and breaches cost the health care industry $6 billion annually, according to a new study.
University of Hawaii suffers second breach this year
Angela Moscaritolo
October 29, 2010
The sensitive information of tens of thousands of former University of Hawaii students was inadvertently posted online, where it remained for nearly a year before being removed.
Costs and causes of data-loss incidents to be discussed
Greg Masters
October 20, 2010
Todd Thibodeaux, president and CEO of CompTIA, will present research from a recent study, which looks at causes and costs involved with IT security breaches.
Former Pennsylvania CISO to share challenges, tips
Greg Masters
October 20, 2010
Bob Maley, former CISO of the state of Pennsylvania, will address data protection strategies at the upcoming SC World Congress.
Personal data on Tamil refugees exposed
Danny Bradbury
October 08, 2010
A computer containing the names of Tamil refugees has been stolen from the offices of the Canadian Tamil Congress.
Geek squad vs. mod squad: Should use policy become a federal beef?
Charles Jeter, ESET cybercrime investigator September 16, 2010
Should violations of corporate computer use policy be a federal crime, asks Charles Jeter, ESET cybercrime investigator.
Data on thousands of NYC college students on stolen laptop
Angela Moscaritolo
September 07, 2010
The personal information belonging to thousands of New York college students was stored on a computer that was stolen.
Delaware retirees' personal information posted on state website
Angela Moscaritolo
August 31, 2010
The personal information of Delaware state retirees was included in a request for proposal that made its way onto the state's website for five days before it was discovered and removed.
New Zeus botnet steals 60 GB of sensitive data
Angela Moscaritolo
August 02, 2010
A new, difficult-to-dismantle Zeus botnet is responsible for stealing more than 60 gigabytes of personal data from the 55,000 compromised computers under its control, researchers at AVG said Monday.
Up the Digital River without a paddle
Charles Jeter July 12, 2010
An alleged breach in Digital River's data stream brings to light the harsh world of improperly conducted security updates as well as complex cyber-ethical legal issues.
Protecting databases: Interview with Thom VanHorn, vice president of marketing for Application Security Inc.
Angela Moscaritolo
June 24, 2010
SC Magazine's Angela Moscaritolo learns from Application Security Inc.'s Thom VanHorn of the latest trends around database security. A majority of the attacks come from insiders, but external attacks are quite prevalent as well. For example, government databases undergo constant "probing" from adversaries.
Security budgets stable or increasing at financial firms
Angela Moscaritolo
June 18, 2010
Drivers such as compliance and insider threats are helping to keep information security budgets at financial institutions alive and well, according to a new study.
FTC working on new privacy guidelines
Angela Moscaritolo
April 28, 2010
By the end of the summer, the FTC hopes to release a set of "guiding principles" outlining how businesses should handle certain privacy issues.
Pennsylvania CISO out of a job following RSA Conference appearance
Dan Kaplan
March 11, 2010
Bob Maley, the former CISO of Pennsylvania, may have been fired because of remarks he made about a recent breach affecting the state.
Solid state: A new state data breach regulation
Greg Masters
March 01, 2010
A new privacy regulation in Massachusetts evokes anxiety for many, but getting in line may prove to be no big deal, reports Greg Masters.
Is increased government regulation the answer to increased privacy protection?
Glen Kosaka, director of marketing, Trend Micro February 25, 2010
Data breaches involving privacy information continue to increase despite the costs, embarrassment and negative publicity associated with them.
FTC notifies 100 organizations about P2P leaks
Angela Moscaritolo
February 22, 2010
The Federal Trade Commission announced Monday it alerted nearly 100 companies, both small and large, that their sensitive data was leaked on file-sharing networks.
Valdosta State University server improperly accessed
Angela Moscaritolo
February 22, 2010
The IT department recently discovered that a school server containing personal information of students and faculty was accessed by an individual without authorization.
Sensitive laptops stolen from Fla. health insurance provider
Angela Moscaritolo
February 11, 2010
The theft of two company laptops from Florida- based health insurance provider, AvMed Health Plans, may have exposed the personal information of current and former subscribers and their dependents.
Hackers accesses Iowa Racing and Gaming Commission database
Angela Moscaritolo
February 03, 2010
Hackers, believed to be from China, gained access to an Iowa government database, which contained the personal information of current and former employees of Iowa's casino and racing industries.
Laptop containing UCSF medical school patient information stolen
Angela Moscaritolo
February 01, 2010
A laptop containing sensitive patient information was recently stolen from an employee of the University of California San Francisco (UCSF) School of Medicine.
Data breaches cost organizations $204 per record in 2009
Angela Moscaritolo
January 25, 2010
A new Ponemon Institute study found that the number of data breaches caused by malicious attacks and botnets doubled last year, compared to 2008.
Thief steals 57 hard drives from BlueCross BlueShield of Tennessee
Angela Moscaritolo
January 22, 2010
Stolen computer hard drives belonging to BlueCross BlueShield of Tennessee contained sensitive member information.
Stolen external drive contained Kaiser Permanente patient info
Angela Moscaritolo
January 13, 2010
An external drive, containing the personal information of thousands of Kaiser Permanente Northern California patents, was recently stolen from an employee's car.
Latest News
Fixes for two Windows flaws coming from Microsoft
WikiLeaks-prompted assessments due this month
Who will be to blame for the loss of a cyberwar?
Hired guns: Cyberwarfare and cyber-mercs
Learning from Assange
Microsoft advises of zero-day flaw in its Graphics Engine
DHS zeroing in on Vietnamese-based fraud ring
Dell to acquire SecureWorks
Microsoft upset over Google researcher's tool release
Innovate to survive
Most Popular
Most Emailed
Most Recent
Microsoft upset over Google researcher's tool release
DHS zeroing in on Vietnamese-based fraud ring
Microsoft advises of zero-day flaw in its Graphics Engine
Current events
Data Breach Survey: Getting the bosses on board
Company news: Weafer joins McAfee; IBM, AVG make acquisitions
Dell to acquire SecureWorks
Invincea browser protection
Learning from Assange
The dotted lines of health care
Red Flags Rule will not apply to certain professions
More Mac malware common on 2011 prediction lists
Honda warns customers of email database breach
Microsoft upset over Google researcher's tool release
Innovate to survive
Zeus botnet targeting Macy's, Nordstrom account holders
Pro-WikiLeaks hackers target MasterCard, PayPal
Learning from Assange
M&A; changing the IT landscape
NYC bus tour company's database hacked of credit card info
Fixes for two Windows flaws coming from Microsoft
WikiLeaks-prompted assessments due this month
Who will be to blame for the loss of a cyberwar?
Hired guns: Cyberwarfare and cyber-mercs
Learning from Assange
Microsoft advises of zero-day flaw in its Graphics Engine
DHS zeroing in on Vietnamese-based fraud ring
Dell to acquire SecureWorks
Microsoft upset over Google researcher's tool release
Innovate to survive
Popular Topics
Amplification
Apple Threats
Bandwidth
Biometrics
Botnet
Botnets
Breaches & Exposures
Browser Flaws
Browsers And Security
Cloud Computing
Cloud-Based Services
Consumer Threats
Content Distribution Network
Cyberwarfare
Data Leakage Prevention
Insider Threat
Mergers & Acquisitions
Patch Management
Retail
Spam
Vulnerabilities & Flaws
Vulnerability Management
Wikileaks
Windows
Worms
Sponsored Links