The Data Breach Blog
An individual who perpetrated fraud against Healthfirst may have stolen information about current and former members from Healthfirst's online portal.
The Division of Aging Services inadvertently emailed their personal data to a contracted provider that was not authorized to view the information.
Atkinson, Andelson, Loya, Ruud & Romo is notifying an undisclosed number of individuals that a laptop computer containing their personal information was stolen.
Information stored on one of Alfa's computer servers at a Tennessee location was inadvertently accessible to the internet.
Malware was installed on computers at the front desks of Evans Hotels properties that could have compromised payment card data.
The third-party vendor responsible for operating payment systems at the Detroit Zoo experienced a POS breach that affected eight other zoos.
The employee was fired for accessing an estimated 3,200 patient medical records outside of their normal job responsibilities.
A software error at Trustmark Mutual Holding Company resulted in emails containing personal information being sent to the wrong insurance carrier clients.
An employee of a Meritus Medical Center vendor may have accessed patient information outside of their normal job duties.
Thousands of customers are being notified that malware on the Tactical Assault Gear website may have compromised their personal information.
Connecting the Dots
Glenn Greenwald's new book recounts the human drama of his collaboration with Edward Snowden, the widespread sweeping up of communications and the consequences of the U.S. surveillance state.
Today marks my final day at SC Magazine after more than 7-1/2 years.
Ideas are needed on ways to improve the public's perception of computer security hackers who have no malicious intentions.
An investigative report shows the Obama administration's insider threat program is far more expansive, and troubling, than even critics had thought.
The leaks from NSA whistleblower Edward Snowden reveal a massive global effort by the U.S. government to hack various entities, including civilian targets, actions that could lead to unintended consequences.
The U.S. government is sending a clear message: We won't tolerate secrets coming to light.
Referencing the Boston bombings as terrorism prompted an unprecedented manhunt for the suspects that included a citywide lockdown. What would a similar scene have looked like on the internet?
The security researcher and self-proclaimed internet troll earned 41 months behind bars Monday for his role in using a script to retrieve data on roughly 120,000 Apple iPad users from a public web server.
Whistleblowing organizations like WikiLeaks and accused hacktivists like Hammond are not foreign spies lusting to plunder intellectual property from U.S. corporations and government agencies in order to profit and gain a competitive advantage.
The FBI and DoJ are targeting high-level U.S. officials in hopes of learning who released classified information about Stuxnet to the press. What the government is not doing is publicly explaining why it launched Stuxnet.
Sign up to our newsletters
SC Magazine Articles
- Zero-day in Fiat Chrysler feature allows remote control of vehicles
- 'GSMem' malware designed to infiltrate air-gapped computers, steal data
- All smartwatches are vulnerable to attack, finds study
- Fake games in Google Play redirect Android users to porn sites
- Apple App Store and iTunes buyers hit by zero-day
- Google Drive influences new phishing campaign
- Researcher finds several vulnerabilities in PHP File Manager
- Survey: Nearly all Americans support and want retaliation for cyberattacks
- 'Black Vine' group breached Anthem, leveraged zero-day bugs in various campaigns
- Data on 5,300 Healthfirst members caught up in fraud scheme