Network Security 

Australian Government Data Breach Linked to Poor Security Training

Data from an Excel spreadsheet containing 9,250 asylum seekers' personal information was mistakenly embedded in a Word document published online.

HSBC Acknowledges Massive Payment Card Breach

2.7 million Turkish cardholders' names, HSBC account numbers, card numbers and expiration dates were exposed.

Today's Top 5 Malware Threats

To fight malware, security teams must understand it. Here are five especially nasty forms of malware.

U.S. State Department Hacked

In response to the breach, the department's entire unclassified email system was shut down, with duty officers using Gmail accounts to communicate.

IBM Boosts Cloud Data Protection, Compliance

IBM has patented an invention that will help global businesses navigate complex regulatory landscape for cloud data.

Microsoft Buys Aorato to Boost Active Directory Security

Microsoft buys Aorato, the company that earlier this year disclosed a critical vulnerability in Microsoft's security.

Chinese Hackers Breach NOAA

NOAA didn't acknowledge the breach until weeks after the fact, according to the Washington Post.

Darkhotel APT Campaign Targets Traveling Executives

The campaign targets corporate executives via hotel Wi-Fi networks.

Apple Pay: How Secure Is It?

Apple Pay and other emerging mobile payment methods like Google Wallet possess potential security vulnerabilities, yet they are more secure than credit cards.

BrowserStack Hacked via Shellshock

The hacker leveraged his access to send an email to customers claiming the service was shutting down.

Startup Spotlight: Security-as-a-Service Bitglass

While most cloud security startups focus on securing cloud infrastructure, Bitglass protects data traveling between corporate networks and SaaS applications.

U.S. Postal Service Hacked, Over 800,000 Affected

The Washington Post reports that Chinese government hackers are believed to have been responsible for the attack.

Home Depot Breach Also Exposed 53 Million Email Addresses

The company has also acknowleged that the attackers leveraged a third-party vendor's user name and password to access Home Depot's network.

The Internet of Things: 3 Security Requirements

As the Internet of Things proliferates, so too do IoT-based vulnerabilities and attacks. These three tips will help secure your IoT-enabled network.

Researchers Hack Contactless Visa Cards

'With just a mobile phone, we created a PoS terminal that could read a card through a wallet,' says lead researcher Martin Emms.

Capital One Acknowledges Insider Breach

An employee improperly accessed an undisclosed number of customers' names, account numbers and Social Security numbers.

Is Shellshock a Feature, not a Bug?

The Shellshock flaw highlights a major security issue. Software created before mass adoption of the Internet is highly susceptible to today's security risks.

Drupal Acknowledges Major SQL Injection Vulnerability

'You should proceed under the assumption that every Drupal 7 website was compromised,' a security advisory warns.

Hackers Hit Mobile Payment Solution CurrentC

The email addresses of an undisclosed number of participants in CurrentC's pilot program were stolen.

7 Cyber Defense Best Practices for SMBs

With cyber criminals increasingly choosing to target smaller companies, SMBs need to up their security game.

White House Network Hacked

While the unclassified network was breached, officials say there's no indication at this point that any data on the classified network was accessed.

18.5 Million Californians' Personal Data Exposed in 2013

That's an increase of more than 600 percent from 2012, according to state attorney general Kamala Harris.

IBM Boosts Cyber Security Education Efforts

IBM is investing in outreach to universities in a bid to better educate future security professionals.

Survey Finds Enterprises Struggling to Secure Data in the Cloud

Just 19 percent of IT pros are confident they know about all cloud computing applications, platforms or infrastructure in use in their organizations.

Network Virtualization Yields New Approaches to Security

Microsoft and VMware both have extensible network virtualization offerings that make it possible for third-party vendors to integrate their security tools.