Data Security

Data Security news, information, and how-to advice

free advice cyclists outdoors people
011215 president barack obama

Glitch in OS X search can expose private details of Apple Mail users

Performing a Spotlight search opens email previews that load external images, even when the Mail client is asked not to do this

Apple blocks tool that brute-forces iCloud passwords

The tool allowed attackers to try a large number of passwords for Apple ID accounts

cyber security lock glow data

4 positive predictions for security in 2015

Sick of the constant drumbeat of data breaches and destructive exploits? There's no magic bullet, but these four measures may help in the coming year

low tech threats

3 low-tech threats that lead to high-profile breaches

It seems like almost daily that we find a new front-page article about a sophisticated data breach. But, more often than not, data breaches are initiated by low tech means. Here are three common low-tech attack vectors, and...

sony pictures studio tour

Sony admits employees' personal data may have been compromised by breach

Weeks later, Sony Pictures is telling employees what they already know about the scope of data that was compromised by attackers

Holding masses of data, cyber criminals face new hurdles to cashing out

Hackers are looking for new ways to get higher margins on stolen data

Be scared: The Sony-style hack is no rare event

Only the wanton destructiveness of the Sony attack made it an outlier; the scale was not uncommon. Maybe the bad publicity will be a wake-up call

Abstract chart data.

Moving past the illusion of data democracy

Americans want the power to dictate exactly how our personal data is collected and used, but pervasive data gathering and analytical techniques are rendering true data democracy obsolete.

internet things

5 ways to prepare for Internet of things security threats

Excitement over IoT benefits may soon give way to concern over the uncertain security outlook.

balloons in sky celebration party

The 5 worst big data privacy risks (and how to guard against them)

There are enormous benefits from big data analytics, but also massive potential for exposure. Here's how to protect yourself and your employees

Destructive malware that hit Sony Pictures similar to other data wiping programs

Researchers find similarities between Trojan program used against Sony Pictures and others used in South Korea and Saudi Arabia

prison jail cells law penitentiary security

How to lose customers with excessive security

If your service or product security works like a prison, don't be surprised when users and customers go elsewhere

Mistakes

10 security mistakes that will get you fired

From killing critical business systems to ignoring a critical security event, these colossal slip-ups will get your career in deep water quick

healthcare cio

Device loss, not hacking, poses greatest risk to health care data

California DOJ report on data breaches shows most losses in health care revolve around stolen devices, due to weak use of encryption

home depot

Home Depot says 53 million email addresses compromised during breach

In addition to 56 million payment cards, 53 million email addresses are added to the list of compromised data

money smartphone cash mobile dollars

Trouble is brewing in mobile payments

Now that big-box retailers have stuck their fat fingers into mobile payments, can the next major credit card breach be far behind?

Hackers

Unlikely hero emerges amid dark times for privacy, security

In a world awash with cyber crime and corporate doublespeak, recent FCC actions are a small cause to celebrate

Cyber espionage group launches sophisticated phishing attacks against Outlook Web App users

Pawn Storm attacks target military agencies, embassies, defense contractors, and media organizations, Trend Micro says

Load More