That's an 897 percent increase over the previous year, according to Redspin.
And exploits rose by almost 40 percent, according to a recent Bromium report.
Millions of accounts were accessed with username and password combinations stolen in unrelated breaches.
Over 68,000 people are affected.
And 37 percent don't have enough highly-skilled staff, a recent survey found.
Although the bank says it 'successfully defended against the attack,' personal banking services were inaccessible for several hours.
The unencrypted drives held names, addresses, birthdates, Social Security numbers, member ID numbers and health information.
And 80 percent said that kind of uncertainty presents a high or very high risk to that data, a recent survey found.
And 39 percent have suffered a data breach or failed a compliance audit due to security issues in the past year alone, a recent survey found.
1,400 university employees' W-2 tax forms were accessed.
For U.S. businesses, the average cost of spear phishing was $1.8 million over the last 12 months alone, a recent survey found.
Only 31 percent are confident in their ability to detect those attacks, a recent survey found.
A stolen laptop and a breach at a third-party vendor caused the data breaches.
Credit and debit card information was taken from hotel restaurants, spas, golf shops, parking, front desks and sales offices.
The company says an undisclosed number of customers' tax returns 'may have been opened or printed.'
Almost 60,000 patients' protected health information may have been exposed as a result of three incidents.
Mobile password manager app continues to expand user base, thanks to new carrier partnerships.
And 83 percent support requiring companies to notify customers within 30 days of the discovery of a breach, according to a recent ISACA survey.
Only 4 percent plan to decrease security spending over the same time period, a recent survey found.
Linode has reset all user passwords, and Time Warner Cable says as many as 320,000 customers' email passwords may have been stolen.
The group, New World Hacking, claims the DDoS attack exceeded 600 Gbps.
66 percent already use authentication methods beyond passwords, a recent survey found.
Still, only 69 percent know what people do with their company's critical value data after accessing it, a recent survey found.
'My immediate reaction was disbelief,' researcher Chris Vickery said.
It's not yet clear how many of the company's 627 properties worldwide are affected.
186,261 minors are affected, according to Sanrio.
The hackers probed the system but didn't take control of it, the Wall Street Journal reports.
And 50 percent worry that their company will suffer a data breach during the holidays, a recent survey found.
It's not yet clear which of the company's more than 500 properties may be affected.
It's not yet clear whether the person arrested was the same one who notified Motherboard about the breach.
Still, 71 percent of IT pros expect their organizations to be more secure in 2016, a recent survey found.
And 61 percent of global IT security pros think their CEOs don't know enough about cyber security, a recent survey found.
Still, only 5 percent of organizations take active steps to protect credentials, a recent study found.
64 Percent of Consumers Would Stop Doing Business With a Company That Suffered a Financial Data Breach
49 percent said the same of breaches in which personal information was stolen, a recent survey found.
The data potentially exposed includes full contact information, passwords, birthdates, and credit card data.
And almost half believe their company is vulnerable to insider threats, a recent survey found.
Security innovator Georgia Weidman discusses what her new startup is doing to help enterprise mobile security.
And over a quarter have no idea if those workers have ever accessed and/or sent data they shouldn't have, a recent survey found.
And 43 percent worry about account hijacking after migrating to the cloud, a recent survey found.
Almost two-thirds do the same for personal accounts, a recent survey found.
The 'intrusive and pervasive' attack dates back at least three months, the ABC reports.
From cloud services to the Internet of Things, the targets are shifting.
Still, 32 percent use their mobile devices to send work-related emails, a recent study found.
4,833,678 parents and 227,622 children are affected.
Some employees' names and Social Security numbers were accessed, though it's not yet clear what other data, if any, may have been exposed.
Cardholder names, payment card numbers, security codes and expiration dates may have been accessed.
While there's no indication that the passwords were improperly accessed, Amazon says it has reset some passwords out of 'an abundance of caution.'
Still, 41 percent believe security should be more important than business flexibility, a recent survey found.
Bluebox's approach goes beyond providing just a security wrapper for mobile applications.
The point-of-sale systems at 54 of the company's hotels were infected with malware.
The information exposed includes Social Security numbers and birthdates.
But 72 percent of security professionals say their board doesn't treat insider threats as seriously as external threats, a recent survey found.
Both breaches appear to have been the result of coding errors.
Docker aims to improve container security with application scanning, user namespaces and other capabilities.
Only the utilities and management industries had no reported PHI breaches, according to a recent report.
The tablets have been sold and delivered to over 17,000 customers in more than 150 countries.
The 37 GB cache includes records of calls placed by more than 63,000 inmates.
The average organization experiences 9.3 such threats every month, according to recent research.
A recent study also found that 45 percent of employees receive no cyber security training at all.
Adobe's Flash is still heavily favored as a top attack vector, so you'd better update ASAP.
While 83 percent said they're either fairly or very confident that they're secure against a data breach, just 49 percent had not experienced one.
The exposed data includes customers' names, email addresses, mailing addresses, order histories and the last four digits of credit card numbers.
Iran's Revolutionary Guard allegedly has an army of hackers trained in Russia.
And 65 percent believe threat intelligence could have prevented or minimized the impact of those breaches, according to a recent survey.
And porn sites are now the top mobile infection vector, according to Blue Coat.
The accounts were accessed using email addresses and passwords acquired elsewhere, according to the company.
At the same time, 61 percent aren't confident in their organization's ability to detect advanced threats, a recent survey found.
The data, which appears to have been stolen in March 2015, includes names, user names, plain text passwords, and email addresses.
69 percent of U.S. women said no teacher or career counselor had ever suggested a cyber security career to them, compared to 55 percent of U.S. men.
The bill passed the Senate by a vote of 74 to 21.
Hundreds of infected cameras were used to attack an Incapsula client -- and one of those cameras was five minutes away from Incapsula's offices.
Names, addresses, birthdates, email addresses, phone numbers, TalkTalk account data, and credit card and bank account details may have been accessed.
The amount ultimately paid by Sony could range from $5.5 million to $8 million.
And IT professionals are actually more likely to do so than the average employee, according to an Intermedia survey.
Trend Micro adds intrusion prevention to its security arsenal with HP TippingPoint acquisition.
Some companies are also finding their deductibles raised and their coverage limited, Reuters reports.
The hacker claims to have accessed Brennan's application for top secret security clearance, along with other sensitive data.
The company says it's investigating 'whether there is any truth whatsoever to this report by a competitor news organization.'
Ardit Ferizi is accused of providing ISIL with the personal information of approximately 1,351 U.S. military and government personnel.
The 25 profiles appear to be tied to the Iranian hacker group TG-2889.
Customers who used credit or debit cards at any of the company's locations between September 1, 2015 and September 27, 2015 may be affected.
The hackers appear to have been targeting customer contact information, though in fewer than 3,500 cases, payment card data may also have been stolen.
The same is true of 35 percent of used mobile devices, according to a recent study.
Amazon and Google, two of the biggest cloud players, roll out new services in a bid to help cloud users be safer.
The breach remained undetected for five months, according to the New York Times.
The researchers found that 'an inordinate number of proxy servers' used by the Angler Exploit Kit were on servers belonging to Limestone Networks.
The average cost to resolve a single attack is now more than $1.9 million, according to the Ponemon Institute.
Approximately 4.6 million customers are affected.
Names, addresses and birthdates were exposed, along with encrypted Social Security numbers, and/or driver's license or passport numbers.
Fully 80 percent of organizations have experienced file data leakage incidents, according to an Enterprise Management Associates survey.
'These devices are getting owned repeatedly,' security researcher Mark Collao said.
Customers who used credit or debit cards at the Trump International Hotel & Tower Las Vegas between May 19, 2014 and June 2, 2015 may be affected.
It's not yet clear which locations may be affected by the breach, which could date back as far as November 2014.
And 28 percent of enterprises do nothing at all about mobile security, a recent Bitglass survey found.
But 42 percent have used mobile payments this year regardless of the risks, a recent ISACA survey found.
The new disclosure is a result of the government's ongoing effort to determine what data was impacted by the breach.
'This may put you at risk for identity theft,' Molina Healthcare told those affected.
Splunk Enterprise Security 4.0 and Splunk User Behavior Analytics debut.
The malware is capable of launching phishing attacks and stealing data from the user's clipboard.
The information potentially exposed includes names, birthdates, Social Security numbers and treatment information.
Google's Certificate Transparency effort saves the day in case of improperly issued EV-SSL certificate.
'The defense system worked, even though it was not easy,' Vladimir Putin's press secretary said.
Target spokeswoman Molly Snyder said the company is 'disappointed' in the ruling.
The scheme, which caused more than $300 million in losses, is the largest ever prosecuted in the United States.
Patient data was potentially exposed by insider breaches and phishing attacks.
The unencrypted device held names, addresses, account numbers and sort codes.
The DOE reported 1,131 cyber attacks between 2010 and 2014, 159 of them successful.
In Excellus BlueCross BlueShield's case, the breach dates back to December 23, 2013.
Still, 16 percent of organizations said they're unable to tell in real time if their systems are compromised.
A single password reused from another site provided the attacker with privileged access.
As a result of technical glitches and human error, hundreds of contact details were shared by mistake.
Data on the unencrypted laptop included patient names, medical record numbers and health information.
"I find it impossible to believe that in this day and age this can happen," one patient said.
It's the 'largest known Apple account theft caused by malware,' according to Palo Alto Networks researchers.
The decision was made 'in mutual agreement with the company,' according to a statement.
458 names, addresses, email addresses, phone numbers and flight dates were exposed.
A hard drive, computer and thumb drive -- none of them encrypted -- exposed over 9,000 patients' personal information.
'It is not only appropriate, but critical, that the FTC has the ability to take action,' said FTC chairwoman Edith Ramirez.
According to Cyphort Labs, the number of malvertising attacks carried out by hackers increased by 325 percent in the past year.
Both the Illinois Department of Corrections and the Colorado Office of Information Technology recently released personal information by mistake.
The names, addresses and credit card information of approximately 93,000 customers may have been exposed.
The leaked data includes 36 million customer records, listing names, addresses, user names, passwords and the last four digits of credit card numbers.
The new number is more than three times the estimate the IRS had given in May.
'They forgot to add that we conjure all this up during steamy banya sessions, after parking the bears we ride outside,' Eugene Kaspersky wrote.
70 percent of U.S. adults think it's riskier to trust a company with their Social Security number than to carry their Social Security card with them.
UCSD researchers were able to both activate and disable the car's brakes and control the car's windshield wipers, all via SMS.
The group is alleged to have earned over $100 million by stealing and trading on corporate earnings announcements before they were made public.
As many as 2.4 million customers' names, addresses, birthdates and bank information may have been exposed.
The same hackers who hit Anthem, United Airlines and the Office of Personnel Management may have added American and Sabre to the list.
FBI agent explains how law enforcement worked with security vendors to bring down a major botnet operation.
Massive amounts of data were stolen in a short period of time, according to news reports.
The FDA is urging health care facilities to switch to alternative infusion systems 'as soon as possible.'
Remote diagnostic tools from OEMs that are supposed to help Android users, could instead be used to hurt them.
Usernames and passwords were exposed in plain text.
Google's Android security chief discusses Stagefright and more in Black Hat address.
Malicious ads were found to be redirecting victims to the Angler Exploit Kit, according to Malwarebytes researchers.
Only 25 percent think CISOs should be part of an organization's leadership team, according to a recent survey.
The data potentially exposed includes names, birthdates, Social Security numbers, lab results, medical conditions and health insurance information.
Fresh off a $24 million funding round, security startup debuts ZFlow technology to connect the dots of security incidents.
70 percent of U.S. IT and IT security practitioners say more security incidents are caused by uninentional mistakes than by malicious acts.
Over 300 employees' names, email addresses and hashed passwords were published online.
The hackers say the attacks were launched to protest the TTIP and TPP, and to retaliate for the shooting of James Daniel McIntyre by Candian police.
While Flash exploits are up, Java is going the other way, according to Cisco's MidYear Security Report.
The recall was issued in response to a recent demonstration showing that a Jeep Cherokee can be hacked remotely via the Uconnect system.
The five allegedly used the stolen data to promote a pump-and-dump stock scheme.
A breach at Staples subsidiary PNI Digital Media has impacted photo processing sites for major vendors across the U.S. and the U.K.
The hackers are threatening to release all of the stolen data if the site isn't shut down.
The data potentially stolen includes names, birthdates, Social Security numbers and medical information.
- Jan 2016
- Dec 2015
- Nov 2015
- Oct 2015
- Sep 2015
- Aug 2015
- Jul 2015
- Jun 2015
- May 2015
- Apr 2015
- Mar 2015
- Feb 2015
- Jan 2015
- Dec 2014
- Nov 2014
- Oct 2014
- Sep 2014
- Aug 2014
- Jul 2014
- Jun 2014
- May 2014
- Apr 2014
- Mar 2014
- Feb 2014
- Jan 2014
- Dec 2013
- Nov 2013
- Oct 2013
- Sep 2013
- Aug 2013
- Jul 2013
- Jun 2013
- May 2013
- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
- Mar 2008
- Nov 2007
- Oct 2007
- May 2006
- Apr 2006
- Mar 2006
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 2002
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?