Some employees' names and Social Security numbers were accessed, though it's not yet clear what other data, if any, may have been exposed.
Cardholder names, payment card numbers, security codes and expiration dates may have been accessed.
While there's no indication that the passwords were improperly accessed, Amazon says it has reset some passwords out of 'an abundance of caution.'
Still, 41 percent believe security should be more important than business flexibility, a recent survey found.
The point-of-sale systems at 54 of the company's hotels were infected with malware.
The information exposed includes Social Security numbers and birthdates.
But 72 percent of security professionals say their board doesn't treat insider threats as seriously as external threats, a recent survey found.
Both breaches appear to have been the result of coding errors.
Only the utilities and management industries had no reported PHI breaches, according to a recent report.
The tablets have been sold and delivered to over 17,000 customers in more than 150 countries.
The 37 GB cache includes records of calls placed by more than 63,000 inmates.
The average organization experiences 9.3 such threats every month, according to recent research.
A recent study also found that 45 percent of employees receive no cyber security training at all.
While 83 percent said they're either fairly or very confident that they're secure against a data breach, just 49 percent had not experienced one.
The exposed data includes customers' names, email addresses, mailing addresses, order histories and the last four digits of credit card numbers.
Iran's Revolutionary Guard allegedly has an army of hackers trained in Russia.
And 65 percent believe threat intelligence could have prevented or minimized the impact of those breaches, according to a recent survey.
And porn sites are now the top mobile infection vector, according to Blue Coat.
The accounts were accessed using email addresses and passwords acquired elsewhere, according to the company.
At the same time, 61 percent aren't confident in their organization's ability to detect advanced threats, a recent survey found.
The data, which appears to have been stolen in March 2015, includes names, user names, plain text passwords, and email addresses.
69 percent of U.S. women said no teacher or career counselor had ever suggested a cyber security career to them, compared to 55 percent of U.S. men.
The bill passed the Senate by a vote of 74 to 21.
While it used to be necessary to deploy an anti-virus app along with a separate anti-theft app and perhaps an individual app locker, most Android security solutions now include all of that functionality in a single app. This list includes mostly broad-based Android security solutions, along with one dedicated anti-theft app and three password management options.
Hundreds of infected cameras were used to attack an Incapsula client -- and one of those cameras was five minutes away from Incapsula's offices.
- Oct 2015
- Sep 2015
- Aug 2015
- Jul 2015
- Jun 2015
- May 2015
- Apr 2015
- Mar 2015
- Feb 2015
- Jan 2015
- Dec 2014
- Nov 2014
- Oct 2014
- Sep 2014
- Aug 2014
- Jul 2014
- Jun 2014
- May 2014
- Apr 2014
- Mar 2014
- Feb 2014
- Jan 2014
- Dec 2013
- Nov 2013
- Oct 2013
- Sep 2013
- Aug 2013
- Jul 2013
- Jun 2013
- May 2013
- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Nov 2011
- Aug 2011
- Jun 2011
- Mar 2011
- Dec 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Apr 2006
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?