The Data Breach Blog
Two archive backup hard drives containing ISMA group health and life insurance databases were stolen while being transported to an offsite storage facility.
Louisiana-based home health and hospice care company Amedisys is unable to locate 142 encrypted laptops and computers that were assigned to former team members.
Several employees with Indiana-based St. Mary's Health had their usernames and passwords compromised, and the email accounts contained personal information on roughly 4,400 individuals.
The health system was notified by a third party billing vendor that one of its employees had their username and password compromised in an attack.
An Advantage Dental computer was infected with malware, and an intruder gained access to a database containing personal information.
Malicious software was installed on the computer systems used to process credit card transactions at a Bistro Burger location on Mission Street in San Francisco.
A breach impacting the University of Chicago's Biological Sciences Division (BSD) database has exposed the personal information belonging to current and former employees, in addition to students.
The New York-based bank is notifying an undisclosed number of customers that their personal information was on a laptop that was stolen from an employee.
A Piedmont Advantage Credit Union laptop containing personal information cannot be located.
Bulk Reef Supply is notifying an undisclosed number of customers that their personal data could be at risk.
Connecting the Dots
Glenn Greenwald's new book recounts the human drama of his collaboration with Edward Snowden, the widespread sweeping up of communications and the consequences of the U.S. surveillance state.
Today marks my final day at SC Magazine after more than 7-1/2 years.
Ideas are needed on ways to improve the public's perception of computer security hackers who have no malicious intentions.
An investigative report shows the Obama administration's insider threat program is far more expansive, and troubling, than even critics had thought.
The leaks from NSA whistleblower Edward Snowden reveal a massive global effort by the U.S. government to hack various entities, including civilian targets, actions that could lead to unintended consequences.
The U.S. government is sending a clear message: We won't tolerate secrets coming to light.
Referencing the Boston bombings as terrorism prompted an unprecedented manhunt for the suspects that included a citywide lockdown. What would a similar scene have looked like on the internet?
The security researcher and self-proclaimed internet troll earned 41 months behind bars Monday for his role in using a script to retrieve data on roughly 120,000 Apple iPad users from a public web server.
Whistleblowing organizations like WikiLeaks and accused hacktivists like Hammond are not foreign spies lusting to plunder intellectual property from U.S. corporations and government agencies in order to profit and gain a competitive advantage.
The FBI and DoJ are targeting high-level U.S. officials in hopes of learning who released classified information about Stuxnet to the press. What the government is not doing is publicly explaining why it launched Stuxnet.
Sign up to our newsletters
SC Magazine Articles
- Popular adult website XTube compromised, delivers malware
- Android vulnerability leaves apps open to malicious overwriting
- One in three of the top million websites are 'risky,' researchers find
- Orgs predict $53M risk, on average, from crypto key, digital cert attacks
- Hanjuan Exploit Kit leveraged in malvertising campaign
- Report: 71 percent of orgs were successfully attacked in 2014
- Self-deleting malware targets home routers to gather information
- 'PoSeidon' point-of-sale malware targets payment card information
- Amedisys notifies nearly 7,000 individuals of potential breach
- Report: More than 15,000 vulnerabilities in nearly 4,000 applications reported in 2014
- IBM will invest $3 billion in new IoT unit
- Infostealer Laziok targets energy companies
- 30 percent of practitioners say they would pay cyber extortionists to retrieve their data
- The best defense is a good offense: The importance of securing your endpoints
- British Airways says rewards accounts hacked, locked down