Advertisement
 
Data Recovery
Subscribe to Data Recovery

The Lead

Businesses, Individuals Can Take Precautions Against Identity Theft

December 16, 2014 9:33 am | by Associated Press | News | Comments

Criminals stole personal information from tens of millions of Americans in data breaches this past year. Of those affected, one in three may become victims of identity theft.  Americans are mostly at the mercy of companies to keep their sensitive details safe. But there are steps businesses and individuals can take to protect themselves against the financial, legal and emotional impact of identity theft — and most of them are free.

For Data Breach Victims, Recovery a Difficult Road

December 15, 2014 3:43 pm | by Associated Press | News | Comments

 The Target hack during last year's Black...

Researchers Still Searching for Identity of Hackers

December 11, 2014 4:04 pm | by Associated Press | News | Comments

Researchers say they have a wealth of clues — but...

North Korea Denies Role in Sony Hack

December 8, 2014 3:09 pm | by Associated Press | News | Comments

North Korea released a statement Sunday that clearly relished a cyberattack on Sony Pictures,...

View Sample

FREE Email Newsletter

Weekly news and features for business continuity professionals

Attack on PlayStation Network Appears to be Unrelated to Sony Pictures Hack

December 8, 2014 1:39 pm | by Associated Press | News | Comments

Sony's online PlayStation store was inaccessible to users for part of Monday in the latest possible cyberattack on the electronics and entertainment company.  Sony Computer Entertainment in Tokyo said Monday the problem lasted two hours but has been fixed globally. It said the cause is under investigation, but there is no sign of any material being stolen.

Video: The Resilient Technology Collaborative

December 5, 2014 11:32 am | by CI Staff | Videos | Comments

Fred Bowne, Managing Principal at Aristata and and Director of the Resilient Technology Collaborative, discusses the goals of the RTC and how they hope to help business continuity professionals solve shared tech challenges from across the industry.

Experts Say It is 'Unlikely' That North Korea Perpetrated Sony Hack

December 5, 2014 10:12 am | by Associated Press | News | Comments

Some cybersecurity experts say it is unlikely North Korea was behind the cyberattack that crippled Sony Pictures' computers and possibly leaked unreleased movies online.  Speculation has been rampant that the hard-line communist state sponsored last week's hack in anger over the new Sony movie "The Interview," in which Seth Rogen and James Franco play television journalists assigned by the CIA to assassinate North Korean leader Kim Jong Un.

Advertisement

Chinese Nationals Arrested in Kenya had Equipment to Hack Government Servers

December 5, 2014 9:15 am | by Associated Press | News | Comments

Police in Kenya are consulting technical experts to determine if 77 Chinese nationals arrested with advanced communications equipment in several houses in an upscale Nairobi neighborhood were committing espionage, an official said.  The Chinese were arrested since the weekend with equipment that Kenya's Daily Nation newspaper said was capable of hacking into government servers.

Video: Understanding the Implications of the Cloud in Your BC and DR Program

December 2, 2014 10:51 am | by CI Staff | Videos | Comments

Tim Mathews, Executive Director of Enterprise Resiliency for Educational Testing Service, discusses the impact the cloud could have on your BC/DR program, the risks it brings and why having an exit strategy in case data needs to be moved again is critical. 

Speaker's Soapbox: David Lindstedt of Readiness Analytics

December 2, 2014 10:48 am | by Joe Shust, Editor | Articles | Comments

David Lindstedt of Readiness Analytics will host an interactive session called "Measuring Preparedness and Predicting Recoverability: A Hands-on Workshop."  This session will introduce attendees to a proven measurement and metrics model and allow them to try it out right away.  The model focuses on measuring resources, procedures and competencies to determine how prepared your organization is. 

Internal Systems at Sony Brought Down by Hack

December 2, 2014 9:04 am | by Associated Press | News | Comments

The FBI has confirmed it is investigating a recent hacking attack at Sony Pictures Entertainment, which caused major internal computer problems at the film studio last week.  Sony's corporate email and other internal systems were knocked offline, according to reports.

'Anonymous' Hacks Florida City's Websites

December 2, 2014 8:34 am | by Associated Press | News | Comments

At least two of Fort Lauderdale's official websites were down temporarily after threats from the hacker group Anonymous over the city's ban on feeding the homeless.  The sites FortLauderdale.gov and FLPD.gov were offline for several hours Monday but back up later that evening.

Advertisement

Home Depot Reports Profit Increase, But Can't Account for All Possible Losses from Breach

November 21, 2014 9:59 am | by Associated Press | News | Comments

Home Depot's third-quarter profit rose 14 percent, suggesting that a huge data breach announced exactly two months ago has not shaken the faith of its customers.  The nation's biggest home improvement retailer stuck to its outlook for all of 2014, but said that it could not account for all possible losses from a data breach it revealed in September that affected 56 million debit and credit cards.

Hack Causes State Department to Shut Down Entire E-Mail System

November 17, 2014 3:16 pm | by Associated Press | News | Comments

The State Department has taken the unprecedented step of shutting down its entire unclassified email system as technicians repair possible damage from a suspected hacker attack.  A senior department official said "activity of concern" was detected in the system around the same time as a previously reported incident that targeted the White House computer network.

Up to 70 Percent Of Cyber Attacks Start Internally

November 14, 2014 10:40 am | by Eric Sorensen, Coordinator of Multimedia Development | Videos | Comments

Jeff Reinke and Bridget Bergin of Manufacturing.net discuss cyber attacks and how an overwhelming number of those attacks start internally.  Topics covered include fog computing, security within a network’s infrastructure, and the open source nature of IoT.

Hackers Breach Computer Systems at National Weather Service

November 13, 2014 2:58 pm | by Associated Press | News | Comments

Hackers from China were able to breach government computer systems at the agency that oversees the National Weather Service, according to the chairman of a Congressional subcommittee that oversees the National Oceanic and Atmospheric Agency's budget.

Cyber Security a Serious Focus for Tibet Activists

November 13, 2014 10:21 am | by Associated Press | News | Comments

Buffeted by persistent cyberattacks, Tibetan monks are giving new meaning to their ancient creed: Detach from attachments.  The Internet safety slogan, one of several messages championed by digital security group Tibet Action Institute, is an example of how human rights defenders are seeking creative ways to protect activists from electronic espionage.

Advertisement

Inside the Mind of a Hacker: Jeremy Hammond

November 11, 2014 9:06 am | by Associated Press | News | Comments

A hacktivist for more than a decade, Hammond, 29, was arrested in 2012 after penetrating the U.S.-based security think tank Stratfor, whose clients include the U.S. Department of Homeland Security and the Defense Department.  He'd been working with a subgroup of the loose-knit hacking movement "Anonymous" when a member of the group enlisted him to help break into Stratfor's systems.

Effort to Protect Sensitive Data Struggling to Keep Pace with Cyberattacks

November 11, 2014 7:51 am | by Associated Press | News | Comments

A $10 billion-a-year effort to protect sensitive government data, from military secrets to Social Security identification numbers, is struggling to keep pace with an increasing number of cyberattacks and is unwittingly being undermined by federal employees and contractors.

New Security Measures in Place for Healthcare.Gov

November 7, 2014 9:22 am | by Associated Press | News | Comments

Officials say HealthCare.gov has gotten cybersecurity upgrades ahead of a Nov. 15 start for the second open enrollment season under President Barack Obama's health care law.  Last year's chaotic debut of the program did not allow time to complete security testing.

Russian Hacker to be Extradited to the United States

November 5, 2014 10:37 am | by Associated Press | News | Comments

The Dutch government has approved the extradition to the United States of a Russian citizen accused of participating in a hacking ring that penetrated computer networks of more than a dozen corporations and stole at least 160 million credit and debit card numbers.

Why Someone Else’s Data Breach Affects You

November 4, 2014 11:12 am | by Michael Chaly and Michael Dunn, Lootok | Lootok Ltd. | Blogs | Comments

Michael Chaly and Michael Dunn of Lootok discuss how data breaches, even those at other organizations, can effect your company.  They discuss how cyber crime has a "ripple effect" and how effective business continuity planning can prevent attacks.

Breach Compromises Employee Records, Costs USIS Hundreds of Millions in Lost Contracts

November 4, 2014 11:06 am | by Associated Press | News | Comments

A cyberattack similar to previous hacker intrusions from China penetrated computer networks for months at USIS, the government's leading security clearance contractor, before the company noticed, officials and others familiar with an FBI investigation and related official inquiries said.  

'Dealing With Disasters at Dell' Available On-Demand

October 31, 2014 11:32 am | by Joe Shust, Editor | Dell | Articles | Comments

Continuity Insights and Dell hosted their webinar, “Dealing with Disasters at Dell,” which discussed lessons learned and disaster recovery at the computer company, on Thursday, Oct. 30.   The free webinar is available here for those who were unable to attend. 

'Pirate Bay' Founder Gets Prison Time for Hack

October 31, 2014 9:08 am | by Associated Press | News | Comments

 A Danish court has sentenced the Swedish founder of file-sharing site The Pirate Bay to 3½ years in prison after he was found guilty of hacking into a private company handling sensitive information for Danish authorities, including social security numbers, driver's license numbers and police records of sought-after people in Europe.

Anatomy of a DDoS Attack Part 2: Attack Strategies

October 28, 2014 10:30 am | by Dr. Bill Highleyman, Availability Digest | Blogs | Comments

Dr. Bill Highleyman, Managing Editor of Availability Digest, discusses Distributed Denial of Service (DDoS) attacks, including botnets, various attack strategies and how they can impact an organization.  This is part two ina a two part series on DDoS attacks. 

Phone Companies Face $10 Million Fine After Carelessness Leads to Data Breach

October 28, 2014 9:39 am | by Associated Press | News | Comments

Two phone companies — TerraCom Inc. and YourTel America Inc. — unwittingly posted the Social Security numbers, driver's licenses and other sensitive data of up to 300,000 clients to the Internet, an investigation found, and federal regulators said they plan to fine the companies.

Man Who Enabled Hackers to Steal $9.4 Million Sentenced to 11 Years

October 27, 2014 4:48 pm | by Associated Press | News | Comments

An Estonian national who pleaded guilty to orchestrating a 2008 cyberattack on a credit card processing company that enabled hackers to steal $9.4 million from ATMs around the world was sentenced to 11 years in prison and ordered to repay most of the money, prosecutors said.

Top Five: 2014 Data Breaches

October 24, 2014 10:26 am | by Joe Shust, Editor | Articles | Comments

Data breaches, both large and small, are of great concern to business continuity professionals today.  This year saw several high profile businesses have their data – and their customer’s data – compromised by information leaks. Here are the top five data breaches we have seen so far in 2014. 

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading