P.F. Chang's has issued an update to customers, saying its data breach was the work of a "highly sophisticated" gang, and that forensics experts continue to investigate the full extent of the breach.
From Neiman Marcus to P.F. Chang's, 2014 has shaped up to be the 'Year of the Data Breach.' What lessons can be gleaned from the trenches of breach investigation? Experian's Michael Bruemmer shares tips.
A remote-access attack on a POS vendor may have resulted in the exposure of payment card transactions conducted at at restaurants throughout the northwestern U.S.
The "Energetic Bear," a.k.a. "Dragonfly," hacking campaign targets U.S. and Western European energy firms. While the hackers appear to be backed by Russia, the purpose of their attacks remains unclear.
A breach affecting 163,000 individuals at Butler University in Indianapolis, Ind., offers yet another example of the risks facing educational institutions, which are seen as easy targets by cyber-attackers.
A class action suit against breached restaurant chain P.F. Chang's China Bistro is unlikely to succeed, some security experts say, because proving consumer losses linked to specific merchant data breaches is difficult.
The world may move at Internet speed, but the IT security and risk management challenges organizations face seem to be tackled at a much slower pace. Hard to believe, right?
A credit card breach at six Splash Car Wash locations in Connecticut involved malware that compromised the company's credit card systems. Two security experts offer analysis of the incident.
A Florida law that takes effect July 1 toughens the state's data breach notification statute by, in part, broadening the term "personal information" to include individuals' usernames and e-mail addresses under certain circumstances.
In this week's breach roundup, read about the latest incidents, including the Australian Privacy Commissioner finding several security gaps at an online dating site that led to a significant data breach.
Despite recent high-profile breaches, organizations are not buying cyber-insurance policies at explosive rates. But Gartner's cyber-insurance expert Juergen Weiss says that might not be a bad thing.
Using big data to fight fraud is a challenge for most organizations. Andreas Baumhof of ThreatMetrix explains how context-based authentication combines fraud and security to leverage the use of big data.
Montana state officials have now confirmed that 1.3 million individuals will be notified following a breach at the state's Department of Public Health and Human Services. Find out what information was compromised.
As Keith Alexander tells it, when he led the National Security Agency, he didn't exist. Alexander discovered that 'fact' after he retired on May 21 as director of the NSA and commander of the Cyber Command and began shopping to buy a new home.
Microsoft is offering a new platform that's designed to help cybersecurity analysts and researchers across various industries share security and threat information. Two experts assess the effort.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.