Information sharing is key. The more we share about attacks - vulnerabilities and vectors - the more we will learn about how the attacks are waged, who's behind them and what they're after.
For the third time in a month, a source claiming to be part of the Izz ad-Din al-Qassam Cyber Fighters has granted an interview to discuss the distributed denial of service attacks on U.S. banks.
In this week's breach roundup, read about the latest incidents, including an attack on Nationwide Insurance's computer network and the conviction of a hacker who breached AT&T's servers.
How do we provide mobile applications to our users that fulfill their need for immediate access, but also provide them with assurance that their information is safe? Here are four fundamentals.
What are the key skills and tools forensics pros use in probing a data breach? What can we learn from recent breaches? Rob Lee of SANS Institute walks us through a typical forensics investigation.
In this week's roundup, read about the latest updates, including the theft of an unencrypted NASA laptop and the indictment of two court employees for stealing programming code.
A report released by Gov. Nikki Haley says the hacker obtained the password when an employee of the Department of Revenue opened an e-mail containing malicious computer code.
As missiles and bombs do real damage in Israel and Gaza, a veteran Israeli cybersecurity expert, Amichai Shulman, downplays the significance of the assaults waged against Israeli websites, contending any damage has been minimal.
Webster Bank and Zions have confirmed online outages that resulted from distributed-denial-of-service attacks. But is the hacktivist group Izz ad-Din al-Qassam behind the attacks?
In this week's breach roundup, read about the latest incidents, including Adobe shutting down a user forum following a data compromise and a hospital breach involving missing backup tapes.
NASA is ramping up efforts to encrypt all laptops following the recent theft of one containing sensitive personal information. Find out more about the U.S. space agency's encryption plans.
As seen on YouTube, South Carolina Gov. Nikki Haley, more than any other chief executive, in or out of government, is out front leading the response to a breach of its tax system. It's been an education for the governor as well as South Carolinians.
To know how best to respond to IT and communications failures, incident response pros first must collect information on such incidents, says Marnix Dekker, who co-authored a new report for ENISA.
Leaders at four security technology companies say the recent distributed-denial-of-service attacks against 10 U.S. banks highlight the need for new approaches to preventing and responding to online outages.
In this week's breach roundup, read about the latest incidents, including an employee of HSBC stealing customers' financial information upon resigning from the bank.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.