Both attacks leveraged email addresses and password stolen from other sites.
The suit was filed by Veridian Credit Union on behalf of all U.S. financial institutions whose customers were affected by the data breach.
Names, addresses, credit card numbers, expiration dates and CVV codes were accessed.
The program is intended to increase the pool of available talent with cyber security skills.
[VIDEO] Former top IBM security exec, Kris Lovejoy, now president of BluVector by Acuity discusses what her new firm's tech is all about.
Hackers breached the DNC's network. and targeted Trump's and Clinton's campaigns along with some Republican PACs.
And the average organization's users connect 733 third-party cloud apps to the corporate environment, according to a recent report.
And 21 percent are very likely to do so, a recent survey found.
Pen Test Partners researchers were able to disable the car's alarm remotely.
The unencrypted laptop held copies of the medical exam results for all NFL Combine attendees for the past 13 years.
The data, all of it dating back to 2013 or earlier, is being offered for sale online.
The same percentage admitted having retained access to sensitive data after leaving a job, a recent survey found.
Far too many unencrypted laptops containing vast amounts of sensitive data are still being left in employees' vehicles.
Phishing Attacks Steal W-2 Info from Milwaukee Bucks, Saint Agnes Medical Center, Rockhurst University
Thousands of employees' tax information may have been stolen.
The potentially exposed data includes names, addresses, Social Security numbers, birthdates, treatment information and health insurance information.
ESET has made a free decryption tool available to those affected.
The stolen database holds 167 million records, of which 117 million include email addresses and passwords.
And 72 percent now share less personal information with companies than they used to, a recent survey found.
The attack is 'part of a wider and highly adaptive campaign targeting banks,' according to SWIFT.
And 45 percent were breached five or more times in the same period of time, a recent survey found.
The exposed data ranges from employee tax information to customer credit card data.
'[O]ur target is the Global Banking Cartel,' the hackers stated.
Just 12 percent think they're less secure, a recent survey found.
The system used to monitor fuel rods at the nuclear plant was infected with several viruses, and the utility was hit by a ransomware attack.
A wide range of data, from login credentials to employee payroll information, was exposed.
And 90 percent of IT professionals believe the influx of IoT devices creates security and privacy issues in the workplace, recent surveys have found.
And 65 percent of companies expect to suffer a breach due to compromised credentials int the future, a recent survey found.
Sixty-two percent ban their mobile workers from using free Wi-Fi hotspots, a recent survey found.
The data exposed includes names, addresses, birthdates, insurance information and Social Security numbers.
And 39 percent haven't been informed of the risks of downloading cloud apps without IT's knowledge, a recent survey found.
Dozens of city employees' personal information was used to file fraudulent tax returns.
The malware has already been used to steal $4 million from banks in the U.S. and Canada.
A former employee mistakenly downloaded 44,000 customers' personal information.
A wide variety of personally identifiable information was accessed in both cases.
Losses from such scams exceeded $2.3 billion between October 2013 and February 2016.
And 36 percent are only updated on a need-to-know basis, a recent survey found.
A recent American Bar Association survey found that one in four law firms with at least 100 attorneys have experienced a breach.
'You can't schedule patients, you can't access records, you can't do anything,' an employee told the Washington Post.
Thousands of employees' W-2 tax forms were accessed by attackers.
The hackers 'modified application settings with little apparent knowledge of how the flow control system worked,' according to a Verizon report.
Despite what Kentucky Methodist Hospital described as an 'internal state of emergency,' none of the hospitals paid the ransoms demanded.
And 32 percent admit sharing passwords with co-workers, a recent survey found.
Names, payment card numbers, expiration dates, CVV codes, mailing addresses, email addresses and more may have been accessed.
Tens of thousands of users may have been infected in a matter of hours.
An additional request for $20 million was halted because the hackers misspelled the word 'foundation.'
New $30 million funding round for security startup Skyport Systems includes participation of Google Ventures.
Six years of sensitive data on TV companies may have been stolen by a former employee.
Names, Social Security numbers, physicians' names, diagnoses, and treatment and insurance information may have been copied and transferred.
The malware was signed with a valid Mac app development certificate.
Fifty-six percent of data accessible on PCs is now also accessible on mobile devices, a recent survey found.
Thousands of employees' personal information was accessed, according to news reports.
And 35 percent don't know or aren't sure what legally constitutes a data breach in their state, a recent survey found.
Famous security expert Bruce Schneier will join IBM as part of Big Blue's acquisition of incident response specialist Resilient Systems.
An undisclosed number of employees' payroll information was accessed.
The MouseJack vulnerability and the security flaws in the LEAF are just the tip of the iceberg, according to a recent Pwnie Express survey.
Security teams will benefit from its service management platform's workflow, automation, orchestration and systems management capabilities, says ServiceNow.
Study of two million devices reveals that more than half are running outdated, vulnerable software.
And 25 percent share work-related passwords, a recent survey found.
And 33 percent have hacked their own or another organization, a recent survey found.
And 11 percent don't even know how many third party vendors they work with, a recent study found.
And 65 percent of information security pros expect to feel more pressure in 2016 than they did last year, a recent survey found.
And 78 percent see their organization as a potential target for a nation-state cyber attack, a recent survey found.
That's an 897 percent increase over the previous year, according to Redspin.
And exploits rose by almost 40 percent, according to a recent Bromium report.
Millions of accounts were accessed with username and password combinations stolen in unrelated breaches.
Over 68,000 people are affected.
And 37 percent don't have enough highly-skilled staff, a recent survey found.
Although the bank says it 'successfully defended against the attack,' personal banking services were inaccessible for several hours.
The unencrypted drives held names, addresses, birthdates, Social Security numbers, member ID numbers and health information.
And 80 percent said that kind of uncertainty presents a high or very high risk to that data, a recent survey found.
And 39 percent have suffered a data breach or failed a compliance audit due to security issues in the past year alone, a recent survey found.
1,400 university employees' W-2 tax forms were accessed.
For U.S. businesses, the average cost of spear phishing was $1.8 million over the last 12 months alone, a recent survey found.
Only 31 percent are confident in their ability to detect those attacks, a recent survey found.
A stolen laptop and a breach at a third-party vendor caused the data breaches.
Credit and debit card information was taken from hotel restaurants, spas, golf shops, parking, front desks and sales offices.
The company says an undisclosed number of customers' tax returns 'may have been opened or printed.'
Almost 60,000 patients' protected health information may have been exposed as a result of three incidents.
Mobile password manager app continues to expand user base, thanks to new carrier partnerships.
And 83 percent support requiring companies to notify customers within 30 days of the discovery of a breach, according to a recent ISACA survey.
Only 4 percent plan to decrease security spending over the same time period, a recent survey found.
Linode has reset all user passwords, and Time Warner Cable says as many as 320,000 customers' email passwords may have been stolen.
The group, New World Hacking, claims the DDoS attack exceeded 600 Gbps.
66 percent already use authentication methods beyond passwords, a recent survey found.
Still, only 69 percent know what people do with their company's critical value data after accessing it, a recent survey found.
'My immediate reaction was disbelief,' researcher Chris Vickery said.
It's not yet clear how many of the company's 627 properties worldwide are affected.
186,261 minors are affected, according to Sanrio.
The hackers probed the system but didn't take control of it, the Wall Street Journal reports.
And 50 percent worry that their company will suffer a data breach during the holidays, a recent survey found.
It's not yet clear which of the company's more than 500 properties may be affected.
It's not yet clear whether the person arrested was the same one who notified Motherboard about the breach.
Still, 71 percent of IT pros expect their organizations to be more secure in 2016, a recent survey found.
And 61 percent of global IT security pros think their CEOs don't know enough about cyber security, a recent survey found.
Still, only 5 percent of organizations take active steps to protect credentials, a recent study found.
64 Percent of Consumers Would Stop Doing Business With a Company That Suffered a Financial Data Breach
49 percent said the same of breaches in which personal information was stolen, a recent survey found.
The data potentially exposed includes full contact information, passwords, birthdates, and credit card data.
And almost half believe their company is vulnerable to insider threats, a recent survey found.
And over a quarter have no idea if those workers have ever accessed and/or sent data they shouldn't have, a recent survey found.
Security innovator Georgia Weidman discusses what her new startup is doing to help enterprise mobile security.
And 43 percent worry about account hijacking after migrating to the cloud, a recent survey found.
Almost two-thirds do the same for personal accounts, a recent survey found.
The 'intrusive and pervasive' attack dates back at least three months, the ABC reports.
From cloud services to the Internet of Things, the targets are shifting.
Still, 32 percent use their mobile devices to send work-related emails, a recent study found.
4,833,678 parents and 227,622 children are affected.
Some employees' names and Social Security numbers were accessed, though it's not yet clear what other data, if any, may have been exposed.
Cardholder names, payment card numbers, security codes and expiration dates may have been accessed.
While there's no indication that the passwords were improperly accessed, Amazon says it has reset some passwords out of 'an abundance of caution.'
Still, 41 percent believe security should be more important than business flexibility, a recent survey found.
Bluebox's approach goes beyond providing just a security wrapper for mobile applications.
The point-of-sale systems at 54 of the company's hotels were infected with malware.
The information exposed includes Social Security numbers and birthdates.
But 72 percent of security professionals say their board doesn't treat insider threats as seriously as external threats, a recent survey found.
Both breaches appear to have been the result of coding errors.
Docker aims to improve container security with application scanning, user namespaces and other capabilities.
Only the utilities and management industries had no reported PHI breaches, according to a recent report.
The tablets have been sold and delivered to over 17,000 customers in more than 150 countries.
The 37 GB cache includes records of calls placed by more than 63,000 inmates.
The average organization experiences 9.3 such threats every month, according to recent research.
Adobe's Flash is still heavily favored as a top attack vector, so you'd better update ASAP.
A recent study also found that 45 percent of employees receive no cyber security training at all.
While 83 percent said they're either fairly or very confident that they're secure against a data breach, just 49 percent had not experienced one.
The exposed data includes customers' names, email addresses, mailing addresses, order histories and the last four digits of credit card numbers.
Iran's Revolutionary Guard allegedly has an army of hackers trained in Russia.
And 65 percent believe threat intelligence could have prevented or minimized the impact of those breaches, according to a recent survey.
And porn sites are now the top mobile infection vector, according to Blue Coat.
The accounts were accessed using email addresses and passwords acquired elsewhere, according to the company.
At the same time, 61 percent aren't confident in their organization's ability to detect advanced threats, a recent survey found.
The data, which appears to have been stolen in March 2015, includes names, user names, plain text passwords, and email addresses.
69 percent of U.S. women said no teacher or career counselor had ever suggested a cyber security career to them, compared to 55 percent of U.S. men.
The bill passed the Senate by a vote of 74 to 21.
Hundreds of infected cameras were used to attack an Incapsula client -- and one of those cameras was five minutes away from Incapsula's offices.
Names, addresses, birthdates, email addresses, phone numbers, TalkTalk account data, and credit card and bank account details may have been accessed.
The amount ultimately paid by Sony could range from $5.5 million to $8 million.
And IT professionals are actually more likely to do so than the average employee, according to an Intermedia survey.
Some companies are also finding their deductibles raised and their coverage limited, Reuters reports.
Trend Micro adds intrusion prevention to its security arsenal with HP TippingPoint acquisition.
The hacker claims to have accessed Brennan's application for top secret security clearance, along with other sensitive data.
The company says it's investigating 'whether there is any truth whatsoever to this report by a competitor news organization.'
Ardit Ferizi is accused of providing ISIL with the personal information of approximately 1,351 U.S. military and government personnel.
The 25 profiles appear to be tied to the Iranian hacker group TG-2889.
Customers who used credit or debit cards at any of the company's locations between September 1, 2015 and September 27, 2015 may be affected.
The hackers appear to have been targeting customer contact information, though in fewer than 3,500 cases, payment card data may also have been stolen.
The same is true of 35 percent of used mobile devices, according to a recent study.
Amazon and Google, two of the biggest cloud players, roll out new services in a bid to help cloud users be safer.
The breach remained undetected for five months, according to the New York Times.
The researchers found that 'an inordinate number of proxy servers' used by the Angler Exploit Kit were on servers belonging to Limestone Networks.
The average cost to resolve a single attack is now more than $1.9 million, according to the Ponemon Institute.
- May 2016
- Apr 2016
- Mar 2016
- Feb 2016
- Jan 2016
- Dec 2015
- Nov 2015
- Oct 2015
- Sep 2015
- Aug 2015
- Jul 2015
- Jun 2015
- May 2015
- Apr 2015
- Mar 2015
- Feb 2015
- Jan 2015
- Dec 2014
- Nov 2014
- Oct 2014
- Sep 2014
- Aug 2014
- Jul 2014
- Jun 2014
- May 2014
- Apr 2014
- Mar 2014
- Feb 2014
- Jan 2014
- Dec 2013
- Nov 2013
- Oct 2013
- Sep 2013
- Aug 2013
- Jul 2013
- Jun 2013
- May 2013
- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
- Mar 2008
- Nov 2007
- Oct 2007
- May 2006
- Apr 2006
- Mar 2006
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 2002
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?