The O2 breach appears to have been caused by password reuse, while the Kimpton breach leveraged point-of-sale malware.
The exposed data includes user names, email addresses, IP addresses, device identifiers, Facebook data, and hashed and salted passwords.
And 50 percent don't audit privileged account activity, a recent survey found.
'Organizations need to take steps to safeguard their data from ransomware attacks,' says Office for Civil Rights director Jocelyn Samuels.
Still, 79 percent of companies lack comprehensive strategies to detect and mitigate such attacks, a recent survey found.
And just 25 percent are completely confident in their ability to handle security incidents, a recent survey found.
The three recent breaches exposed thousands of customers' personal and payment card information.
The attacks appear to have been enabled by the theft of third-party service providers' remote access credentials.
And just 14 percent of SMBs see their ability to mitigate cyber attacks as highly effective, a recent survey found.
And 67 percent of IT professionals have no cyber security certifications, a recent survey found.
Approximately 4,300 patients' names, birthdates and Social Security numbers were exposed.
The cameras, located in 105 countries, delivered as many as 50,000 HTTP requests per second.
Approximately 57 percent of all organizations using Office 365 were hit by the attack.
The stolen records include full names, Social Security numbers, birthdates, mailing addresses and insurance information.
Both attacks leveraged email addresses and password stolen from other sites.
The suit was filed by Veridian Credit Union on behalf of all U.S. financial institutions whose customers were affected by the data breach.
Names, addresses, credit card numbers, expiration dates and CVV codes were accessed.
The program is intended to increase the pool of available talent with cyber security skills.
Hackers breached the DNC's network. and targeted Trump's and Clinton's campaigns along with some Republican PACs.
Departing employees who take sensitive data with them present a huge security threat. Protection begins with data discovery and classification.
And the average organization's users connect 733 third-party cloud apps to the corporate environment, according to a recent report.
And 21 percent are very likely to do so, a recent survey found.
Pen Test Partners researchers were able to disable the car's alarm remotely.
The unencrypted laptop held copies of the medical exam results for all NFL Combine attendees for the past 13 years.
The data, all of it dating back to 2013 or earlier, is being offered for sale online.
- Jun 2016
- May 2016
- Apr 2016
- Mar 2016
- Feb 2016
- Jan 2016
- Dec 2015
- Nov 2015
- Oct 2015
- Sep 2015
- Aug 2015
- Jul 2015
- Jun 2015
- May 2015
- Apr 2015
- Mar 2015
- Feb 2015
- Jan 2015
- Dec 2014
- Nov 2014
- Oct 2014
- Sep 2014
- Aug 2014
- Jul 2014
- Jun 2014
- May 2014
- Apr 2014
- Mar 2014
- Feb 2014
- Jan 2014
- Dec 2013
- Nov 2013
- Oct 2013
- Sep 2013
- Aug 2013
- Jul 2013
- Jun 2013
- May 2013
- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Nov 2011
- Aug 2011
- Jun 2011
- Mar 2011
- Dec 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Apr 2006
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?