Network Security 

UPS Store Acknowledges Credit Card Breach

Customer names, mailing addresses, email addresses and payment card information may have been accessed at 51 stores in 24 states.

Nuclear Regulatory Commission Hacked Three Times

At least two of the attacks were launched from overseas.

Big Data Overwhelms Security Teams

Experts say increased automation and better analytics will help security teams overwhelmed by Big Data.

Chinese Hackers Breach Community Health Systems, 4.5 Million Affected

The hackers stole about 4.5 patients' names, addresses, birthdates, phone numbers and Social Security numbers.

Supervalu Admits Massive Supermarket Credit Card Breach

Potentially affected stores include Acme Markets, Cub Foods, Farm Fresh, Horbacher's, Jewel-Osco, Shaw's, Shop 'n Save, Shoppers and Star Markets.

Startup Spotlight: CloudPassage's Software-defined Security

As the software-defined data center becomes more common, enterprises are seeking security solutions that are abstracted from the underlying infrastructure.

Security Research and the Law: What You Need to Know

Security researchers must navigate a minefield of U.S. laws and statutes, such as the Computer Fraud and Abuse Act.

Bank Faces Lawsuit Over $327,000 in Losses from Cyber Attack

Hackers stole the funds from TEC Industrial in 55 separate ACH drafts on May 10, 2012.

Password Manager LastPass Suffers Outage

A data center outage left the popular password management service inaccessible for several hours.

Computer Thefts Expose Over 45,000 Patients' Personal Data

Unencrypted computers containing the data were stolen from three different medical facilities.

Hackers Stole 2 Million Customer Records Per Day in Q2 2014

More than 175 million customers records were stolen in the second quarter of the year, according to SafeNet.

Breach at USIS Exposes Government Employees' Data

The company says the breach 'has all the markings of a state-sponsored attack.'

Cancer Clinic Employee Charged with Theft of Patient Data

More than 2,000 current and former patients may be affected.

Yahoo CISO Details Challenge of Security at Scale

Security vendors focus on banks not Web-scale companies, says Yahoo CISO Alex Stamos.

Gambling Site Acknowledges Four-Year-Old Data Breach

649,055 customers' names, user names, mailing addresses, email addresses, phone numbers and birthdates were exposed.

CyberVor Breach Exposes 1.2 Billion User Names, Passwords

A Russian gang of fewer than a dozen hackers has collected more than 4.5 billion user records from over 400,000 websites and FTP sites.

Using Military Strategy to Fight Cyber Battles

What does the Library of Sparta have to do with modern IT security? Military strategies are increasingly common in cybersecurity – and with good reason.

Buy All the Cybersecurity Vulnerabilities: Black Hat Keynote

Black Hat keynote speaker Dan Geer has some radical ideas to reshape modern security, including a suggestion that the United States purchase security vulnerabilities and make them public.

Mozilla Exposes 4,000 Passwords by Mistake

A data sanitization process failed for 30 days, exposing 76,000 email addresses and 4,000 encrypted passwords.

SaaS Security Risks: It's the Users, Stupid

Black Hat workshop to discuss security concerns of software-as-a-service applications. Not surprisingly, uninformed users pose some of the biggest risks.

Dude, How Secure Is My Connected Car?

With connected cars becoming more common, experts say vehicle manufacturers should adopt security best practices used by mobile device makers.

US-CERT Warns of New Backoff Malware

The malware appears to have been responsible for several recent high-profile breaches, including those at Target, Neiman Marcus and Goodwill.

Chinese Hackers Hit Canada's National Research Council

The NRC says it'll take a year to develop a new secure IT infrastructure.

How to Minimize Enterprise File Sharing Risks

File sharing and sync (FSS) services like Dropbox can expose sensitive corporate data. Luckily, there are enterprise-grade FSS alternatives.

Tor Hacked

'Users who operated or accessed hidden services from early February through July 4 should assume they were affected,' says the project's co-founder.