The Data Breach Blog
A software error at Trustmark Mutual Holding Company resulted in emails containing personal information being sent to the wrong insurance carrier clients.
An employee of a Meritus Medical Center vendor may have accessed patient information outside of their normal job duties.
Thousands of customers are being notified that malware on the Tactical Assault Gear website may have compromised their personal information.
California-based Bank of Manhattan Mortgage Lending is notifying customers of a potential unauthorized disclosure or use of their information.
COA Network, Inc. detected a pattern of irregular activity affecting its computer systems, putting customer payment card numbers and other information at risk.
Payment card information associated with orders placed on the website between March 26 and June 5 may have been compromised.
A UC Irvine Medical Center employee accessed patient records without a job-related purpose between June 2011 and March.
Customers may have been affected if they placed or attempted to place an order at the Intimacy website between December 2014 and April.
Unauthorized access was gained to three databases containing data from old employment, discount plan, and patient financing applications.
The personal health information, including Social Security numbers and medical conditions, might have been compromised in a cyber attack in May on Medical Information Engineering.
Connecting the Dots
Glenn Greenwald's new book recounts the human drama of his collaboration with Edward Snowden, the widespread sweeping up of communications and the consequences of the U.S. surveillance state.
Today marks my final day at SC Magazine after more than 7-1/2 years.
Ideas are needed on ways to improve the public's perception of computer security hackers who have no malicious intentions.
An investigative report shows the Obama administration's insider threat program is far more expansive, and troubling, than even critics had thought.
The leaks from NSA whistleblower Edward Snowden reveal a massive global effort by the U.S. government to hack various entities, including civilian targets, actions that could lead to unintended consequences.
The U.S. government is sending a clear message: We won't tolerate secrets coming to light.
Referencing the Boston bombings as terrorism prompted an unprecedented manhunt for the suspects that included a citywide lockdown. What would a similar scene have looked like on the internet?
The security researcher and self-proclaimed internet troll earned 41 months behind bars Monday for his role in using a script to retrieve data on roughly 120,000 Apple iPad users from a public web server.
Whistleblowing organizations like WikiLeaks and accused hacktivists like Hammond are not foreign spies lusting to plunder intellectual property from U.S. corporations and government agencies in order to profit and gain a competitive advantage.
The FBI and DoJ are targeting high-level U.S. officials in hopes of learning who released classified information about Stuxnet to the press. What the government is not doing is publicly explaining why it launched Stuxnet.
Sign up to our newsletters
SC Magazine Articles
- 'MEDJACK' tactic allows cyber criminals to enter healthcare networks undetected
- Samsung devices, including Galaxy S6, vulnerable to remote code execution
- Dridex banking malware spreading through new spam campaign
- U.S., China agree to cybersecurity code of conduct
- Suspicious activity on LastPass network, data compromised
- Former Georgia-Pacific sysadmin charged with damaging protected computers
- Harvard University announces network intrusion, possible data exposure
- Saboteurs leverage RIPv1 for DDoS reflection attacks
- More than 440K new Android malware strains found in Q1, study finds
- Apple releases OS X 10.10.4 and iOS 8.4, numerous bugs addressed