Data Security

Data Security news, information, and how-to advice

low tech threats
sony pictures studio tour

Holding masses of data, cyber criminals face new hurdles to cashing out

Hackers are looking for new ways to get higher margins on stolen data

Abstract chart data.

Moving past the illusion of data democracy

Americans want the power to dictate exactly how our personal data is collected and used, but pervasive data gathering and analytical techniques are rendering true data democracy obsolete.

Be scared: The Sony-style hack is no rare event

Only the wanton destructiveness of the Sony attack made it an outlier; the scale was not uncommon. Maybe the bad publicity will be a wake-up call

internet things

5 ways to prepare for Internet of things security threats

Excitement over IoT benefits may soon give way to concern over the uncertain security outlook.

balloons in sky

The 5 worst big data privacy risks (and how to guard against them)

There are enormous benefits from big data analytics, but also massive potential for exposure. Here's how to protect yourself and your employees

Destructive malware that hit Sony Pictures similar to other data wiping programs

Researchers find similarities between Trojan program used against Sony Pictures and others used in South Korea and Saudi Arabia

prison jail cells law penitentiary security

How to lose customers with excessive security

If your service or product security works like a prison, don't be surprised when users and customers go elsewhere

Mistakes

10 security mistakes that will get you fired

From killing critical business systems to ignoring a critical security event, these colossal slip-ups will get your career in deep water quick

healthcare cio

Device loss, not hacking, poses greatest risk to health care data

California DOJ report on data breaches shows most losses in health care revolve around stolen devices, due to weak use of encryption

home depot

Home Depot says 53 million email addresses compromised during breach

In addition to 56 million payment cards, 53 million email addresses are added to the list of compromised data

money phone

Trouble is brewing in mobile payments

Now that big-box retailers have stuck their fat fingers into mobile payments, can the next major credit card breach be far behind?

Hackers

Unlikely hero emerges amid dark times for privacy, security

In a world awash with cyber crime and corporate doublespeak, recent FCC actions are a small cause to celebrate

Cyber espionage group launches sophisticated phishing attacks against Outlook Web App users

Pawn Storm attacks target military agencies, embassies, defense contractors, and media organizations, Trend Micro says

ransom note

Ransomware takes malware from bad to worse

To thwart attacks like CryptLocker, you need a multipronged defense; new technology doesn't hurt either

Dropbox dismisses claims of hack affecting 7 million accounts

Credentials leaked by an alleged hacker online were likely stolen from other services, the online storage company says

Data center security in the cloud.

5 techniques for securing your enterprise data

The pros and cons of new techniques and tools, such as cloud access security brokers, adaptive access control and pervasive sandboxing

androidusb primary

The BadUSB exploit is deadly, but few may be hit

It's a case of good news/bad news with the BadUSB firmware exploit

Critical Bugzilla vulnerability could give hackers access to undisclosed software flaws

Software projects that use the Bugzilla bug tracking software should deploy the latest patches immediately, security researchers said

Load More