Dropbox says its security has come a long way since 2012, when attackers stole 69 million login credentials. Its systems are now designed to resist and counter a breach to minimize impact on users.
Does the theory of cognitive dissonance also apply to our digital behavior? You know it's bad for you, but you do it anyway. Although major breaches continue to make headlines, we have not changed how we protect our digital life.
Download this infographic to know more.
The breach of porn site Brazzers - which allows users to swap fantasies in online forums - begs the question of how many users employed throwaway usernames and passwords. Some 1,446 U.S. military and 41 U.S. government email addresses were found in the data dump.
To the annals of super-bad historical mega breaches that no one knew about, add two new entries: Dropbox and Last.fm. Hackers reportedly stole tens of millions of usernames and passwords from each in 2012.
Passwords' days are numbered as businesses attempt to deliver a better user experience to their online customers, as well as apply better identity management practices, says CA's Paul Briault.
Due to the increase in security breaches over the past few years, you know that legacy approaches to data center security are not adequate. Micro-segmentation could be the answer - but what does it really mean and how do you do it? Read this solution overview to find out.
Biometric authentication has emerged as one of the more convenient methods of authentication, particularly with the increasing ubiquity of mobile devices with a variety of high quality sensors. Financial institutions can realize cost savings and improved customer experience by deploying biometric authentication. This...
KBA and simple password authentication are antiquated in the age of the data breach.
With rapid global growth in online and mobile banking - and the rise of worldwide real-time payments - financial institutions are implementing innovative authentication methods aimed at improving customer experience while securing...
As the PCI Council turns 10, this year, Indian banks say compliance with the PCI Data Security Standard remains a priority, in spite of the market's push for more cardless payments.
In the wake of recent SWIFT-related interbank payment heists, more banks are monitoring transactions for anomalous behavior in an attempt to catch fraud in real time, says Andrew Davies, a fraud prevention expert at core banking services provider Fiserv.
Until we get to a stage where we can guarantee the confidentiality of static identity reference data, such as names, addresses, emails and favorite cat colors, we must move away from relying on knowledge-based authentication.
Truly massive amounts of this information are stolen on a regular basis, proving we are...
A short chat with the alleged seller of the LinkedIn and MySpace data begs more questions about how the services were compromised and if there are more large breaches to come.
The FBI is warning U.S. businesses to beware of business email compromise scams focused not just on creating fraudulent wire transfers, but also stealing personally identifiable information. Experts, however, are criticizing the FBI's alert as being too little, too late.
As insider channels increasingly become the vector through which attackers gain unauthorized access to data, organizations must look at context-aware security to understand user behavior and prevent data leak, says Naveen Gurusiddaiah of Micro Focus.
With rampant password, patch management and data missteps, it can feel like information security déjà vu all over again as security professionals fight so many of the same battles as 10 or 20 years ago, says white hat hacker Cris Thomas, a.k.a. "Space Rogue."
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.