LinkedIn has confirmed that a breach of its network compromised hashed passwords associated with accounts. Security experts speculate that e-mail addresses also could be vulnerable.
Which Internet security threats pose the greatest risks to organizations in 2012 and beyond? Symantec has just released its Internet Security Threat Report, which reveals some surprising trends.
Cyber spies in China are suspected of launching an attack against a NATO senior military commander, U.S. Admiral James Stavridis, using a Facebook scam to gather information about Stavridis from his friends and colleagues, according to U.K. newspaper reports.
Chinese police have detained four people and punished eight after the personal information of 6 million users was leaked following a data breach of the China Software Developer Network, the country's largest programmers' website.
Enforcement and class actions are what the year 2011 will be remembered for in privacy. So, how can pros prepare for the inevitability of a litigious and increased-enforcement environment?
A wave of security breaches serves as a catalyst for all types of organizations to assess the need for cyber insurance. Here's the story of one institution that saw the threat and took out a $10 million policy.
What fraud and security issues does Paul Smocer, the new president of BITS, see as being top concerns in the coming year? Mobile payments, social media, and a strong need for institutions and organizations to comply with existing guidance top the list.
As the Bank of America website outage proved, "Assuming it's an attack or breach is now the default response," says ID theft expert Neal O'Farrell. So, how can organizations change that perception?
Social media, mobility and cloud computing are new areas of risk for organizations, and risk managers need to go back to the fundamentals of understanding the information they are protecting, says Robert Stroud, ISACA's international vice president.
A new (ISC)2 information security workforce survey projects the doubling of federal government IT security staffs from 27,000 employees today to more than 61,000 by 2015. What's behind this growth?
Fraud attempts will escalate, not diminish, as new threats and channels blossom in 2011. Growth in mobile banking and the use of social networks are expected to pose new security challenges, experts say.
WikiLeaks founder Julian Assange has become akin to a "cyber messiah," Hemu Nigam says. And Assange's followers have proven: "If you turn your back on our messiah, we are going to take you down."
Hemu Nigam says WikiLeaks founder Julian Assange has become akin to a "cyber messiah" And Assange's followers have proven: "If you turn your back on our messiah, we are going to take you down."
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.