On Friday, the popular coupon site announced that hackers breached its servers.
An organization made up of millions of technology professional members has blamed a major data exposure on a process glitch with its proxy provider.
Debate: In light of recent breaches, passwords remain a useful method for authentication.
Considering the endless march of breaches, it may be time to scrap the belief that adequate passwords -- or even passphrases -- can prevent hackers from breaking into corporate environments. Instead, security pros should focus their efforts on gaining visibility into their networks.
The latest password breach involves Gamigo, which has lost an estimated 8.2 million email address and password combinations, including three million in the United States.
SC Magazine executive editor, Dan Kaplan, sits with James Lyne, director of technology and strategy at Sophos, to discuss password security in today's threat landscape.
A live exploit is making the rounds that takes advantage of a bug in Java, which has already been patched, but hasn't yet made its way to Mac OS X users.
Imagine a mobile device falling into the wrong hands - resulting in the draining of bank accounts co-opting of identities.
A military dating website, which a band of hackers claimed this week to successfully infiltrate to pillage members' personal information, was not actually hacked, according to its administrator.
Sony's PlayStation Network again has been hit by hackers, but the limited damage that resulted could point to strides being made by the electronics giant.
An Apple operating system flaw could allow any user to obtain stored password hash data through an openly readable directory.
However good your password is, your privacy still depends on rational implementation by the service provider.
Only thieves and idiots ask for your password.
What might a hacker do with the Sony PlayStation Network database?
Password selection usually involves compromise, but even a short password can be reasonably strong and still memorable.
Sign up to our newsletters
SC Magazine Articles
- Don't dismiss internal data breaches as minor - they aren't!
- Firm finds link between Regin spy tool and QWERTY keylogger
- Insider threats changing security spending, report says
- New attack uses ransomware to drop trojans and keyloggers
- Size and frequency of DDoS attacks increasing, annual report shows