With mega breaches springing up one after another, many industry players have registered both disbelief and awe at the sheer numbers of individual credentials stolen.
Thousands of hospital patients in at least three states may have had their personal information compromised after MML data breach.
Roughly 3,300 patients have been notified that their personal information was included in a spreadsheet that was improperly emailed to an unauthorized recipient.
Adult FriendFinder website owner FriendFinder Networks Inc. announced that it was aware of and investigating a potential data security issue.
A federal judge recently denied banks' motion to block the settlement, but now the deal has been nixed for different reasons.
House lawmakers might have had some of their personal data compromised in the confirmed CareFirst BlueCross BlueShield data breach earlier this week.
A Nigerian man was sentenced to three years in prison for his role in a phishing scheme targeting U.S. government employees.
An Ohio student is under investigation for hacking into a school district server and sharing the information of at least one other student.
Hackers might have accessed and posted the information of up to 4 millions AdultFriendFinder users.
In a Wednesday blog post the FTC explained the process it follows to investigate security breaches and said it looks favorably on companies that cooperate in law enforcement investigations.
Shortly after completing its acquisition, Telstra learned that an unauthorized third party gained access to the corporate IT network of Pacnet.
Information could have been accessed by attackers who gained limited, unauthorized access to a single CareFirst database in June 2014.
External threat actors are using innovation and automation to stay ahead of traditional security defenses.
Claims that researcher Chris Roberts actually, briefly, commandeered a plane in flight after hacking its entertainment systems may be up for debate; contentions that the aircraft may be vulnerable are not.
The Ohio-based health care provider is notifying nearly 1,000 patients that three computers in its Cardiac Cath Lab were infected with malware.
Penn State University is notifying roughly 18,500 individuals and research partners that their personal information may have been compromised.
After experiencing a similar incident in 2014, Sally Beauty announced Thursday that an illegal intrusion into its payment card systems has occurred.
AlienVault surveyed 1,107 attendees of the RSA Conference 2015 in San Francisco and found that nine percent would keep quiet if nobody knew about a breach.
Juniper Research revealed the findings in a report on "The Future of Cybercrime and Security."
Certain customers experienced unauthorized charges to their credit cards in November and December 2014.
In the ruling, the judge shared his concerns about the fairness of the settlement terms, however.
Half of respondents in a survey indicated they are at least somewhat confident in the security of emerging payment systems.
Michigan-based FireKeepers Casino Hotel is investigating a potential security incident involving its point-of-sale systems.
Testimony by a former Tiversa investigator calls into question the truthfulness of information sent to the FTC about a LabMD breach.
You see it every day in the media, blog posts and industry marketing; "It isn't a question of if, but when." This defeatist attitude is settling over the industry like Death's own shawl.
An annual health care study found that criminal attacks replaced device theft and loss as the leading cause of breaches.
The malware targeted individual merchant locations and not Harbortouch, and Harbortouch's own network was not affected.
If not exactly delivering an indictment, the number of high profile breaches over the last year—which show no sign of letting up in the near term—have left security pros in some organizations questioning the security of cloud.
Attackers are more sophisticated than they've ever been. They're targeting our intellectual property, sensitive customer information, user information and much more. The network is not the target—it's the endpoint where that data resides.
Unauthorized access was gained to the electronic mailbox of a sales manager, and personal information may have been compromised.
Sign up to our newsletters
SC Magazine Articles
- Long list of devices believed to be affected by NetUSB vulnerability
- Scammers target oil companies with sneaky attack
- CareFirst BlueCross BlueShield breached, more than one million individuals notified
- Study: Employees acknowledge risky security behavior, continue to engage in it
- Hack of airplane systems described in FBI docs raises security questions
- Hackers exploit Starbucks auto-reload feature to steal from customers
- Study: Nearly all SAP systems remain unpatched and vulnerable to attacks
- Former Nuclear Regulatory Commission employee arrested for alleged spear phishing campaign
- Millions of WordPress websites vulnerable to XSS bug
- FireEye first cybersecurity firm awarded DHS SAFETY Act certification
- Thousands of Bellevue Hospital Center patients notified of data breach
- Study: 86 percent of websites contain at least one 'serious' vulnerability
- Investigation ongoing in reported multimillion member Adult FriendFinder breach
- Report: $19M breach settlement between MasterCard, Target terminated
- FTC gives thumbs up to companies that cooperate during breach probes