Approximately 4.6 million customers are affected.
Names, addresses and birthdates were exposed, along with encrypted Social Security numbers, and/or driver's license or passport numbers.
Fully 80 percent of organizations have experienced file data leakage incidents, according to an Enterprise Management Associates survey.
'These devices are getting owned repeatedly,' security researcher Mark Collao said.
Customers who used credit or debit cards at the Trump International Hotel & Tower Las Vegas between May 19, 2014 and June 2, 2015 may be affected.
It's not yet clear which locations may be affected by the breach, which could date back as far as November 2014.
With the Apple Watch, as with smartphones before it, security pros need to proactively prepare for the mobile device's entry into the workplace.
And 28 percent of enterprises do nothing at all about mobile security, a recent Bitglass survey found.
But 42 percent have used mobile payments this year regardless of the risks, a recent ISACA survey found.
The new disclosure is a result of the government's ongoing effort to determine what data was impacted by the breach.
'This may put you at risk for identity theft,' Molina Healthcare told those affected.
The malware is capable of launching phishing attacks and stealing data from the user's clipboard.
The information potentially exposed includes names, birthdates, Social Security numbers and treatment information.
'The defense system worked, even though it was not easy,' Vladimir Putin's press secretary said.
Target spokeswoman Molly Snyder said the company is 'disappointed' in the ruling.
The scheme, which caused more than $300 million in losses, is the largest ever prosecuted in the United States.
Patient data was potentially exposed by insider breaches and phishing attacks.
The unencrypted device held names, addresses, account numbers and sort codes.
The DOE reported 1,131 cyber attacks between 2010 and 2014, 159 of them successful.
In Excellus BlueCross BlueShield's case, the breach dates back to December 23, 2013.
Still, 16 percent of organizations said they're unable to tell in real time if their systems are compromised.
A single password reused from another site provided the attacker with privileged access.
As a result of technical glitches and human error, hundreds of contact details were shared by mistake.
Data on the unencrypted laptop included patient names, medical record numbers and health information.
"I find it impossible to believe that in this day and age this can happen," one patient said.
- Sep 2015
- Aug 2015
- Jul 2015
- Jun 2015
- May 2015
- Apr 2015
- Mar 2015
- Feb 2015
- Jan 2015
- Dec 2014
- Nov 2014
- Oct 2014
- Sep 2014
- Aug 2014
- Jul 2014
- Jun 2014
- May 2014
- Apr 2014
- Mar 2014
- Feb 2014
- Jan 2014
- Dec 2013
- Nov 2013
- Oct 2013
- Sep 2013
- Aug 2013
- Jul 2013
- Jun 2013
- May 2013
- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Nov 2011
- Aug 2011
- Jun 2011
- Mar 2011
- Dec 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Apr 2006
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?