Advertisement
 
IT Disaster Recovery
Subscribe to IT Disaster Recovery

The Lead

Cars Could Become Targets for Hackers

November 25, 2014 9:51 am | by Associated Press | News | Comments

Automakers are betting heavily that consumers will want not just the maps and music playlists of today but also Internet-enabled vehicles that stream movies and the turn dictation into email. The federal government wants to require cars to send each other electronic messages warning of dangers on the road.  In these and other connections, hackers see opportunity.

Home Depot Reports Profit Increase, But Can't Account for All Possible Losses from Breach

November 21, 2014 9:59 am | by Associated Press | News | Comments

Home Depot's third-quarter profit rose 14 percent, suggesting that a huge data breach announced...

Polish Electoral Commission Targeted by Hackers

November 19, 2014 2:07 pm | by Associated Press | News | Comments

 Computer hackers have attacked the website of...

Questions You Need to Answer Before Adopting a Hybrid Cloud for Your Enterprise

November 18, 2014 10:29 am | by Rentsys Recovery Services | Blogs | Comments

Hybrid clouds are making it possible for...

View Sample

FREE Email Newsletter

Weekly news and features for business continuity professionals

Hack Causes State Department to Shut Down Entire E-Mail System

November 17, 2014 3:16 pm | by Associated Press | News | Comments

The State Department has taken the unprecedented step of shutting down its entire unclassified email system as technicians repair possible damage from a suspected hacker attack.  A senior department official said "activity of concern" was detected in the system around the same time as a previously reported incident that targeted the White House computer network.

Up to 70 Percent Of Cyber Attacks Start Internally

November 14, 2014 10:40 am | by Eric Sorensen, Coordinator of Multimedia Development | Videos | Comments

Jeff Reinke and Bridget Bergin of Manufacturing.net discuss cyber attacks and how an overwhelming number of those attacks start internally.  Topics covered include fog computing, security within a network’s infrastructure, and the open source nature of IoT.

Large Banks to Pay Nearly $3.4 Billion in Fines

November 13, 2014 3:46 pm | by Associated Press | News | Comments

Citigroup, JPMorgan Chase, Royal Bank of Scotland, HSBC Bank and UBS agreed to settlements totaling almost $3.4 billion with the U.S. Commodity Futures Trading Commission, U.K. Financial Conduct Authority and Swiss Financial Market Supervisory Authority. The British regulator said Barclays remains under investigation.

Advertisement

Hackers Breach Computer Systems at National Weather Service

November 13, 2014 2:58 pm | by Associated Press | News | Comments

Hackers from China were able to breach government computer systems at the agency that oversees the National Weather Service, according to the chairman of a Congressional subcommittee that oversees the National Oceanic and Atmospheric Agency's budget.

Cyber Security a Serious Focus for Tibet Activists

November 13, 2014 10:21 am | by Associated Press | News | Comments

Buffeted by persistent cyberattacks, Tibetan monks are giving new meaning to their ancient creed: Detach from attachments.  The Internet safety slogan, one of several messages championed by digital security group Tibet Action Institute, is an example of how human rights defenders are seeking creative ways to protect activists from electronic espionage.

Inside the Mind of a Hacker: Jeremy Hammond

November 11, 2014 9:06 am | by Associated Press | News | Comments

A hacktivist for more than a decade, Hammond, 29, was arrested in 2012 after penetrating the U.S.-based security think tank Stratfor, whose clients include the U.S. Department of Homeland Security and the Defense Department.  He'd been working with a subgroup of the loose-knit hacking movement "Anonymous" when a member of the group enlisted him to help break into Stratfor's systems.

Effort to Protect Sensitive Data Struggling to Keep Pace with Cyberattacks

November 11, 2014 7:51 am | by Associated Press | News | Comments

A $10 billion-a-year effort to protect sensitive government data, from military secrets to Social Security identification numbers, is struggling to keep pace with an increasing number of cyberattacks and is unwittingly being undermined by federal employees and contractors.

'Dark Web' an Increasing Concern for Government, Business

November 10, 2014 4:21 pm | by Associated Press | News | Comments

Welcome to the "dark Web," an increasingly popular corner of the Internet where thousands of computer users from around the globe interact anonymously — and, in many cases, illegally.  The reach and anonymity of these 21st century Internet operations is difficult to penetrate.

Advertisement

Stovepipe: Great for Hats, Not Crisis Communication

November 7, 2014 10:35 am | by John Tempesco | Athoc | Blogs | Comments

John Tempesco, Senior Director of Marketing at AtHoc, Inc, discusses how many organizations "stovepipe" crisis communications, why that is harmful to those organizations and how to create an emergency notification plan that reaches across an entire business. 

New Security Measures in Place for Healthcare.Gov

November 7, 2014 9:22 am | by Associated Press | News | Comments

Officials say HealthCare.gov has gotten cybersecurity upgrades ahead of a Nov. 15 start for the second open enrollment season under President Barack Obama's health care law.  Last year's chaotic debut of the program did not allow time to complete security testing.

British Journalists Admits to Hacking Voicemails

November 7, 2014 8:49 am | by Associated Press | News | Comments

A former journalist with British tabloid the Sunday Mirror has pleaded guilty to hacking into voicemails in pursuit of an exclusive story.  Graham Johnson admitted guilt Thursday and will be sentenced Nov. 27.  The 46-year-old had turned himself in to police after learning of the arrest of colleagues on similar charges.

Russian Hacker to be Extradited to the United States

November 5, 2014 10:37 am | by Associated Press | News | Comments

The Dutch government has approved the extradition to the United States of a Russian citizen accused of participating in a hacking ring that penetrated computer networks of more than a dozen corporations and stole at least 160 million credit and debit card numbers.

Why Someone Else’s Data Breach Affects You

November 4, 2014 11:12 am | by Michael Chaly and Michael Dunn, Lootok | Lootok Ltd. | Blogs | Comments

Michael Chaly and Michael Dunn of Lootok discuss how data breaches, even those at other organizations, can effect your company.  They discuss how cyber crime has a "ripple effect" and how effective business continuity planning can prevent attacks.

Advertisement

Breach Compromises Employee Records, Costs USIS Hundreds of Millions in Lost Contracts

November 4, 2014 11:06 am | by Associated Press | News | Comments

A cyberattack similar to previous hacker intrusions from China penetrated computer networks for months at USIS, the government's leading security clearance contractor, before the company noticed, officials and others familiar with an FBI investigation and related official inquiries said.  

'Dealing With Disasters at Dell' Available On-Demand

October 31, 2014 11:32 am | by Joe Shust, Editor | Dell | Articles | Comments

Continuity Insights and Dell hosted their webinar, “Dealing with Disasters at Dell,” which discussed lessons learned and disaster recovery at the computer company, on Thursday, Oct. 30.   The free webinar is available here for those who were unable to attend. 

'Pirate Bay' Founder Gets Prison Time for Hack

October 31, 2014 9:08 am | by Associated Press | News | Comments

 A Danish court has sentenced the Swedish founder of file-sharing site The Pirate Bay to 3½ years in prison after he was found guilty of hacking into a private company handling sensitive information for Danish authorities, including social security numbers, driver's license numbers and police records of sought-after people in Europe.

Anatomy of a DDoS Attack Part 2: Attack Strategies

October 28, 2014 10:30 am | by Dr. Bill Highleyman, Availability Digest | Blogs | Comments

Dr. Bill Highleyman, Managing Editor of Availability Digest, discusses Distributed Denial of Service (DDoS) attacks, including botnets, various attack strategies and how they can impact an organization.  This is part two ina a two part series on DDoS attacks. 

Phone Companies Face $10 Million Fine After Carelessness Leads to Data Breach

October 28, 2014 9:39 am | by Associated Press | News | Comments

Two phone companies — TerraCom Inc. and YourTel America Inc. — unwittingly posted the Social Security numbers, driver's licenses and other sensitive data of up to 300,000 clients to the Internet, an investigation found, and federal regulators said they plan to fine the companies.

Man Who Enabled Hackers to Steal $9.4 Million Sentenced to 11 Years

October 27, 2014 4:48 pm | by Associated Press | News | Comments

An Estonian national who pleaded guilty to orchestrating a 2008 cyberattack on a credit card processing company that enabled hackers to steal $9.4 million from ATMs around the world was sentenced to 11 years in prison and ordered to repay most of the money, prosecutors said.

'Dealing With Disasters at Dell' Webinar is Thursday, Oct. 30

October 24, 2014 11:05 am | by CI Staff | Dell | Articles | Comments

Dell and Continuity Insights' webinar "Dealing With Disasters at Dell: Lessons Learned and Solutions Found," will take place Thursday, Oct. 30.  The webinar was originally scheduled for Tuesday, Oct. 28.  Those interested in signing up for the free webinar may do so here.

Anatomy of a DDoS Attack Part 1: Botnets

October 24, 2014 10:49 am | by Dr. Bill Highleyman, Availability Digest | Blogs | Comments

Dr. Bill Highleyman, Managing Editor of Availability Digest, discusses Distributed Denial of Service (DDoS) attacks, including botnets, various attack strategies and how they can impact an organization.  This is part one of a two part series on DDoS attacks.

Top Five: 2014 Data Breaches

October 24, 2014 10:26 am | by Joe Shust, Editor | Articles | Comments

Data breaches, both large and small, are of great concern to business continuity professionals today.  This year saw several high profile businesses have their data – and their customer’s data – compromised by information leaks. Here are the top five data breaches we have seen so far in 2014. 

Apple Posts Security Warnings for Chinese Users

October 24, 2014 9:49 am | by Associated Press | News | Comments

 Apple has posted a new security warning for users of its iCloud online storage service amid reports of a concerted effort to steal passwords and other data from people who use the popular service in China.  The company suggested users should verify they are connecting to a legitimate iCloud server by using the security features built into Safari and other browsers such as Firefox and Google's Chrome. 

Obama Announces Security Measures for Government Issued Cards

October 21, 2014 11:00 am | by Associated Press | News | Comments

Saying more must be done to stop data breaches affecting consumers, President Barack Obama announced a government plan to tighten security for the debit cards that transmit federal benefits like Social Security to millions of Americans.   

Member of Cyber Crime Ring Will Serve Prison Time

October 21, 2014 9:42 am | by Associated Press | News | Comments

A Massachusetts man who was part of an international cybercrime ring that the government says hacked into the computers of more than a dozen financial institutions and the U.S. military's payroll service was sentenced Friday to 2½ years in prison.

X
You may login with either your assigned username or your e-mail address.
The password field is case sensitive.
Loading