Criminals stole personal information from tens of millions of Americans in data breaches this past year. Of those affected, one in three may become victims of identity theft. Americans are mostly at the mercy of companies to keep their sensitive details safe. But there are steps businesses and individuals can take to protect themselves against the financial, legal and emotional impact of identity theft — and most of them are free.
Researchers say they have a wealth of clues — but...
North Korea released a statement Sunday that clearly relished a cyberattack on Sony Pictures,...
Some cybersecurity experts say it is unlikely North Korea was behind the cyberattack that crippled Sony Pictures' computers and possibly leaked unreleased movies online. Speculation has been rampant that the hard-line communist state sponsored last week's hack in anger over the new Sony movie "The Interview," in which Seth Rogen and James Franco play television journalists assigned by the CIA to assassinate North Korean leader Kim Jong Un.
Tim Mathews, Executive Director of Enterprise Resiliency for Educational Testing Service, discusses the impact the cloud could have on your BC/DR program, the risks it brings and why having an exit strategy in case data needs to be moved again is critical.
The FBI has confirmed it is investigating a recent hacking attack at Sony Pictures Entertainment, which caused major internal computer problems at the film studio last week. Sony's corporate email and other internal systems were knocked offline, according to reports.
Computer hackers have attacked the website of Poland's electoral commission, which is still unable to publish full returns from local elections because of an unrelated computer glitch, officials said Wednesday. The State Electoral Commission said while the website hacking incident didn't add further difficulties to the vote counting process, it ordered its officials to change their passwords.
Hybrid clouds are making it possible for enterprises to take advantage of the mobility and convenience of managing some resources via the public cloud without sacrificing the security of managing critical applications and sensitive data within an on-premise private cloud. If you’re considering joining the ranks of hybrid cloud adopters, take the time to ask yourself some key questions to decide if hybrid cloud is right for you.
The State Department has taken the unprecedented step of shutting down its entire unclassified email system as technicians repair possible damage from a suspected hacker attack. A senior department official said "activity of concern" was detected in the system around the same time as a previously reported incident that targeted the White House computer network.
Jeff Reinke and Bridget Bergin of Manufacturing.net discuss cyber attacks and how an overwhelming number of those attacks start internally. Topics covered include fog computing, security within a network’s infrastructure, and the open source nature of IoT.
Hackers from China were able to breach government computer systems at the agency that oversees the National Weather Service, according to the chairman of a Congressional subcommittee that oversees the National Oceanic and Atmospheric Agency's budget.
A hacktivist for more than a decade, Hammond, 29, was arrested in 2012 after penetrating the U.S.-based security think tank Stratfor, whose clients include the U.S. Department of Homeland Security and the Defense Department. He'd been working with a subgroup of the loose-knit hacking movement "Anonymous" when a member of the group enlisted him to help break into Stratfor's systems.
A $10 billion-a-year effort to protect sensitive government data, from military secrets to Social Security identification numbers, is struggling to keep pace with an increasing number of cyberattacks and is unwittingly being undermined by federal employees and contractors.
Officials say HealthCare.gov has gotten cybersecurity upgrades ahead of a Nov. 15 start for the second open enrollment season under President Barack Obama's health care law. Last year's chaotic debut of the program did not allow time to complete security testing.
The Dutch government has approved the extradition to the United States of a Russian citizen accused of participating in a hacking ring that penetrated computer networks of more than a dozen corporations and stole at least 160 million credit and debit card numbers.
Michael Chaly and Michael Dunn of Lootok discuss how data breaches, even those at other organizations, can effect your company. They discuss how cyber crime has a "ripple effect" and how effective business continuity planning can prevent attacks.
Continuity Insights and Dell hosted their webinar, “Dealing with Disasters at Dell,” which discussed lessons learned and disaster recovery at the computer company, on Thursday, Oct. 30. The free webinar is available here for those who were unable to attend.
A Danish court has sentenced the Swedish founder of file-sharing site The Pirate Bay to 3½ years in prison after he was found guilty of hacking into a private company handling sensitive information for Danish authorities, including social security numbers, driver's license numbers and police records of sought-after people in Europe.
Dr. Bill Highleyman, Managing Editor of Availability Digest, discusses Distributed Denial of Service (DDoS) attacks, including botnets, various attack strategies and how they can impact an organization. This is part two ina a two part series on DDoS attacks.
An Estonian national who pleaded guilty to orchestrating a 2008 cyberattack on a credit card processing company that enabled hackers to steal $9.4 million from ATMs around the world was sentenced to 11 years in prison and ordered to repay most of the money, prosecutors said.
Dr. Bill Highleyman, Managing Editor of Availability Digest, discusses Distributed Denial of Service (DDoS) attacks, including botnets, various attack strategies and how they can impact an organization. This is part one of a two part series on DDoS attacks.
Data breaches, both large and small, are of great concern to business continuity professionals today. This year saw several high profile businesses have their data – and their customer’s data – compromised by information leaks. Here are the top five data breaches we have seen so far in 2014.
Apple has posted a new security warning for users of its iCloud online storage service amid reports of a concerted effort to steal passwords and other data from people who use the popular service in China. The company suggested users should verify they are connecting to a legitimate iCloud server by using the security features built into Safari and other browsers such as Firefox and Google's Chrome.
Saying more must be done to stop data breaches affecting consumers, President Barack Obama announced a government plan to tighten security for the debit cards that transmit federal benefits like Social Security to millions of Americans.
A Massachusetts man who was part of an international cybercrime ring that the government says hacked into the computers of more than a dozen financial institutions and the U.S. military's payroll service was sentenced Friday to 2½ years in prison.
After an avalanche of data breaches, South Korea's national identity card system has been raided so thoroughly by thieves that the government says it might have to issue new ID numbers to every citizen over 17 at a possible cost of billions of dollars.
Sears Holdings Corp. said Friday that a data breach at its Kmart stores that started last month may have compromised some customers' credit and debit cards. The data theft at Kmart is the latest in a string of hacks at big retailers including Target, Supervalu and Home Depot.
It's not just big businesses like JPMorgan Chase, Target and Home Depot that get hacked. Small companies suffer from intrusions into their computer systems, too. The costs associated with computer and website attacks can run well into the thousands and even millions of dollars for a small company.
- Page 1