Saying more must be done to stop data breaches affecting consumers, President Barack Obama announced a government plan to tighten security for the debit cards that transmit federal benefits like Social Security to millions of Americans.
After an avalanche of data breaches, South Korea's national identity card system has been raided...
A New Mexico woman is suing a hospital and its parent company after hackers accessed personal information belonging to her and more than 4 million other patients. Attorneys for Briana Brito said they were seeking class-action status for the lawsuit.
It's not just big businesses like JPMorgan Chase, Target and Home Depot that get hacked. Small companies suffer from intrusions into their computer systems, too. The costs associated with computer and website attacks can run well into the thousands and even millions of dollars for a small company.
After a federal prosecutor told a judge that he expects to produce 4 terabytes, or 4 trillion bytes, of data as they make their case against a Russian man charged with hacking into U.S. businesses, the judge said Roman Seleznev will need better access to his lawyers than speaking to them through a glass wall.
A federal judge on Wednesday sentenced a former campaign manager for Gov. Susana Martinez to nine months in prison followed by three years of supervised release for charges related to the theft of the governor's email.
A huge cyber attack against JPMorgan Chase & Co. this summer compromised customer information for about 76 million households and 7 million small businesses. JPMorgan Chase said that names, addresses, phone numbers and email addresses were stolen from the company's servers, but only customers who use the websites Chase.com and JPMorganOnline and the apps ChaseMobile and JPMorgan Mobile were affected
Technology is a critical part of business continuity planning and many of the challenges the BC community faces when it comes to that technology are very similar. In such a connected world, business continuity professionals need to be aware of any number of technology disruptions, as well as new products to help in planning.
Some lenders are preparing to reissue credit or debit cards to customers to head off possible losses following the breach of customer data at Home Depot. Capital One Financial and JPMorgan Chase & Co. said they are preparing to assign new cards to accountholders due to the data theft at the home-improvement retailer.
Jimmy John's sandwich chain said that it believes customers' credit card data was stolen from 216 of its shops between June and September. The Champaign, Illinois-based chain said in a news release that stores in 37 states across the United States were affected. It did not say how many customers are affected.
Data breaches at retailers aren't going away but there are ways consumers can protect themselves from future heists of their payment card information. The Department of Homeland Security Department warned last month that more than 1,000 retailers could have malware in their cash-register computers and offered ways for consumers to protect themselves.
A Spanish judge charged nine people with fraud Sunday for allegedly participating in the theft of $45 million after a massive hacking of a bank's card payments system. Judge Eloy Velasco of Spain's National Court said the suspects include seven Romanians and two Spaniards, who allegedly fraudulently extracted money from ATMs.
Chris Schin, Vice President of Products for Zetta.net, discusses storage capacity, how it is increasing and the difficulty that causes when backing up data. He discusses using cloud-based storage as a way to alleviate the ever-increasing amount of data most companies are faced with.
China's military hacked into computer networks of civilian transportation companies hired by the Pentagon at least nine times, breaking into computers aboard a commercial ship, targeting logistics companies and uploading malicious software onto an airline's computers, Senate investigators said.
HealthCare.gov, the health insurance website serving more than 5 million Americans, has significant security flaws that put users' personal information at risk, nonpartisan congressional investigators have concluded. The Government Accountability Office said the Obama administration must resolve more than 20 specific security issues.
Results of the Unitrends and Continuity Insights Data Governance Survey show that resilience professionals are in agreement on why they have programs and what they are attempting to achieve through business continuity plans. Topics covered include mertrics, standards and the Cloud.
Justice Department officials are seeking a tougher law to combat overseas credit card trafficking, an increasingly lucrative crime that crosses national boundaries. Authorities say the current statute is too weak because it allows people in other countries to avoid prosecution if they stay outside the United States when buying and selling the data and don't pass their illicit business through the U.S.
The federal Office of Personnel Management plans to terminate its massive contracts with USIS, the major security clearance contractor targeted last month by a cyberattack, agency, congressional and company officials say. The computer network intrusion compromised the personal files of as many as 25,000 government workers.
The boundary between the online and physical worlds got blurry last week when Sony's PlayStation Network was disabled by an online attack, while simultaneously an American Airlines passenger jet carrying a Sony executive was diverted due to a bomb threat on Twitter. Experts say that's a wakeup call for a world still coming to grips with cybersecurity: What goes down online can be equally if not more disruptive in the real world.
Atlanta-based home Depot is working with both banks and law enforcement to investigate "unusual activity" that would point to a hack. Hackers have broken security walls for many retailers in recent months, including Target, grocery store chain Supervalu, P.F. Chang's and the thrift store operations of Goodwill.
Ken Simpson discusses the importance of the "cyber supply chain" in preparing for cyber threats and how business continuity and logistics can go hand-in-hand for organizations looking to prevent such threats. He also discusses sharing the critical cyber threats with senior management.
The grocery chain Supervalu said Friday that it may have suffered a data breach at stores in as many as five states. Hackers accessed a network that processes store transactions. Account numbers, expiration dates, cardholders' names and other information may have been stolen, the company said.
Dr. Bill Highleyman, Managing Editor of the Availability Digest, will be presenting a paper on Distributed Denial of Service (DDoS) attacks at the Continuity Insight’s Regional Business Continuity Conference to be held at the Wyndham Hotel in New York City on October 7 and 8, 2014.
For many organizations, the project-based accounting approach, in which departments “buy” datacenter utilization based on specific project needs, is getting out of hand for both IT and the business units it serves. Virtualization should have made project-based IT simple and cost-effective. Instead, the four vCPU minimum required by Microsoft’s SQL Server licensing means history is repeating itself.
Patented seed allegedly stolen from U.S. seed corn companies as part of what prosecutors say was a conspiracy involving seven employees of a Chinese agriculture biotechnology company to steal trade secrets could be worth as much as $500 million, federal prosecutors said last week.
An international law enforcement operation has struck a major blow against the gang behind Shylock, one of the world’s most dangerous financial Trojans. The takedown, which was led by the UK National Crime Agency, resulted in the seizure of a command and control (C&C) servers, in addition to domains that Shylock uses for communication between infected computers.
Nearly 23 million private records of New Yorkers have been exposed in data security breaches reported by more than 3,000 businesses, nonprofits and governments over the past eight years. Deliberate hacking was responsible for 40 percent of the 5,000 incidents.
- Page 1