All customers who paid with a credit or debit card at a Chipotle location between March 24, 2017 and April 18, 2017 may be affected.
40 percent expect their network security spending to increase by 10 to 20 percent over the next year, a recent survey found.
Roman Seleznev, the son of a Russian MP, caused over $169 million in damages by installing malware on point-of-sale machines.
The funds will help the application container security startup expand into more markets and grow its product.
And a quarter of all targeted attacks were aimed at industrial targets, a recent study found.
The open-source Docker container project integrates many different security approaches, but like every other software project, it still has to deal with reported software vulnerabilities.
The startup's "zero-touch" cloud workload security platform eliminates the need to fine-tune policies and pore over logs to secure cloud environments.
And 51 percent believe the risk of mobile data loss is equal to or greater than that for PCs, a recent survey found.
The company consolidates network, mobile and cloud security into a single architecture called Check Point Infinity.
The malware's peer-to-peer IoT device network numbers in the tens of thousands, according to Symantec.
Docker's swarmkit integrates multiple secure mechanisms including one known as Transparent Root Rotation.
Customer names, card numbers, expiration dates and verification codes were accessed by malware.
The solution uses DNS data to detect suspicious behavior within enterprise networks.
And 37 percent turn over complete control of keys and encryption processes to cloud providers, a recent survey found.
That's far higher than 2016, when less than 60 percent said they planned to do so.
The latest version offers improved visibility into their application container environments and helps organizations ensure that they take security and compliance into consideration from the start.
The use of VPNs and other tools to bypass security restrictions doubled from 2015 to 2016, a recent survey found.
Names, email addresses, home addresses, phone numbers, bank account numbers and sort codes were exposed.
A new feature in the company's Secret Server helps IT security teams detect suspicious behavior on high-value accounts.
Tens of thousands of dollars have been stolen from seller accounts, and fake items have been listed for sale in an effort to steal even more money.
'We had people asking if we were being attacked,' a city spokeswoman said.
The startup that enlists ethical hackers to combat cybersecurity threats attracts millions in funding from Microsoft and HPE.
Credit card data from online purchases made between September 2016 and February 2017 may have been accessed.
While the company was able to avoid falling victim to the ransomware, the attackers may have been able to access patient data.
An employee at third-party vendor Genpact mistakenly left customer information exposed online.
The No More Ransom project gains 15 more decryption tools and dozens of new partner organizations.
And three quarters of SMEs have two or fewer IT security staff members, a recent survey found.
The companies team up to head off the inevitable rise in security threats targeting application container environments.
The OS is in use on a wide range of devices, including Galaxy Gear smartwatches and Z1, Z2 and Z3 phones.
The company's NSE7000 appliance can deflect DDoS attacks under a minute with a negligible impact on network performance.
And 53 percent haven't done so in more than a year, a recent survey found.
And 74 percent feel vulnerable to such attacks, a recent survey found.
An analysis of data collected from over 24,000 Firebox appliances from WatchGuard reveals the daunting security landscape businesses face today.
The NCTA called the repeal 'an important step toward restoring consumer privacy protections that apply consistently to all Internet companies.'
That's an increase of 86 percent over the previous year, according to Gemalto.
Like today's craftier attackers, Radware's new offering takes a targeted approach to blocking DDoS attacks on AWS and Azure applications.
DDoS-as-a-service providers can launch attacks for as little as $7 an hour, according to a recent report.
Today's IT security experts are wary about much more than dangerous viruses and other malware, finds a new survey from Carbon Black.
Names, Social Security numbers and birthdates were accessed.
The allegedly compromised account information may have come from the LinkedIn breach.
The vulnerabilities, uncovered by security researcher Tavis Ormandy, were patched quickly.
In both cases, the information appears to have been exposed by mistake, not by an external or internal attack.
The malware began infecting businesses across North America in late January.
59 percent of senior security executives are concerned about security breaches due to attacks hitting cloud service providers, a recent survey found.
And men are nine times more likely than women to hold managerial positions, a recent survey found.
The vast majority of IT security professionals are expecting in an increase in attacks targeting Industrial Internet of Things deployments, finds a Tripwire survey.
'The indictment unequivocally shows the attacks on Yahoo were state-sponsored,' Yahoo's assistant general counsel said.
33 percent of respondents to a recent survey experienced a ransomware attack in the past year.
The exposed data included information on open investigations, as well as completed applications for national security clearances.
The companies float a new cloud-based security service aimed at helping SMBs keep their users and data safe wherever they roam.
Another 54 percent refuse to pay but are able to recover their data anyway, a recent survey found.
And 70 percent want their SIEM to generate fewer alerts that are more meaningful, a recent survey found.
The company's machine-learning technology helps enterprises focus their security efforts on high-priority threats.
All employees and contractors have been blocked from installing software on their computers, and have been told to change their passwords.
The organization claims the files were already circulating among former U.S. government hackers and contractors.
The company's latest offering offers integrated security services for enterprises moving their workloads to Google's cloud.
The organizations have been targeted with ransom demands ranging from $30,000 to $150,000.
And just under a third of financial phishing was detected on Mac OS computers, according to a recent report.
Last year saw a volume of mobile malware equivalent to half of all the malware detected over the previous 11 years, according to a recent report.
The company is on the lookout for cybersecurity startups to invest in and help grow using the company's own technical resources and threat intelligence.
And 43 percent have an IT team of less than 10, a recent survey found.
Customer credentials were stored in a database that wasn't password-protected or behind a firewall.
Secure@Source bulks up its data security intelligence offering to better identify risks to a business' sensitive data.
And 50 percent change their attack methodologies with every target, a recent survey found.
The exposed data ranges from password manager data to hotel bookings and private messages.
The regulations, requiring companies to establish and maintain cyber security programs, take effect on March 1.
The networking giant's DNA technology does more than deliver automated network management, it also helps protect against today's sneakier threats.
Email addresses, user names and hashed passwords are being offered for sale for $300.
90 percent of U.S. healthcare organizations feel vulnerable to data threats, a recent survey found.
And almost 40 percent of cloud services are commissioned without the involvement of IT, a recent survey found.
VCs from Trident Capital Cybersecurity, Elephant, Glasswing Ventures and Ten Eleven Ventures discuss where they see the opportunity to profit.
Microsoft detects a drop in ransomware encounters toward the end of 2016 but warns against growing complacent.
And just 55 percent believe their company's current technology investment is sufficient to ensure security, a recent survey found.
And just two thirds of IT pros say their current IT security budget is sufficient, a recent survey found.
The IT security industry responds to a growing cloud ecosystem, IoT's expanding reach and a rise in nation-state cyberattacks.
45 percent of companies say the cyber security skills shortage is causing breaches, a recent survey found.
More than 1,445,000 users were hit by ransomware in 2016, according to a recent report.
A new integration allows Microsoft Enterprise Mobility + Security customers to protect their mobile devices against sophisticated threats.
The exposed data ranges from former NFL players' Social Security numbers and medical information to confidential files from Hustler Hollywood stores.
A new add-on for the Centrify Identity Services Platform uses machine learning to spot and block suspicious access attempts.
Lawyers from Google, Cisco and Microsoft talk about privacy and why they're confident they're all moving in the right direction.
Today's businesses are journeying into treacherous territory with too few security professionals behind the wheel.
More than 335,000 credit and debit cards may have been compromised.
70 percent have invested in IT security technology that wasn't successfully deployed a recent survey found.
No forensics experience? No problem. BreachDetect uses new timeline views and plain-language explanations to unmask breach attempts.
The company aggregated viewing data, attached demographic information to it, and sold it to third parties for use in targeted advertising.
Bars and restaurants at 12 IHG properties across North America were affected.
Striking while the iron's hot, Capsule8 makes its official debut to help enterprises guard their container-filled Linux infrastructures.
Reasons for the surge include the rise of ransomware as a service, easier access in the underground market, and the low cost of conducting an attack.
Still, 83 percent of consumers say they trust banks and insurers to maintain strong cyber security, a recent survey found.
The organization failed to encrypt patient data after an unencrypted, non-password protect BlackBerry containing PHI was lost in 2009.
The company's new cloud-based offering helps businesses better asses the risks of their dynamic IT workloads.
The hackers demanded 2 Bitcoins in payment to return control of the systems back to the hotel -- and the hotel says it had no choice but to pay.
The buy will help strengthen the company's Aruba ClearPass network access control and management platform.
Email addresses, passwords and IP addresses were exposed.
And 26 percent said their organizations were breached in the past year, a recent survey found.
The app demanded 0.2 Bitcoins in payment from infected users.
The deal is expected to help put (and keep) data security on radars of corporate business leaders.
94 of those breaches exposed a million or more records each, according to a recent report.
The company debuts new appliances that help businesses keep cyber-attackers away from their critical applications.
The attacks continued to hit organizations in Saudi Arabia earlier this week.
And 93 percent say they face persistent challenges in protecting data, a recent survey found.
The number represents a 40 percent increase over the previous year, according to a recent report.
Multi-factor security firm gets new financial backing as it takes aim at growing share in the authentication market.
The exposed data includes names, Social Security numbers, birthdates, contact details, medical record numbers and/or clinical information.
The country's national power company hasn't said whether it was able to link the attack to any specific group or nation state.
More than three times as many IT pros would prefer to grow their staff's skills than grow the number of people on their team, a recent survey found.
'If there's one thing you shouldn't do, it's decrypting passwords client side,' researcher Tijme Gommers noted.
The attack has already caught several technical users, according to Wordfence CEO Mark Maunder.
82 percent don't encrypt data at rest, according to a recent report.
CrowdStrike analysts determined the identity of the attacker, and concluded that the attacker was acting on a foreign government's behalf.
The seven companies will begin a three-month program providing mentoring, contact with investors, office space and access to GCHQ personnel.
Nine percent of organizations using two-factor authentication say their users simply 'hate it,' a recent survey found.
The hacker provided the records to LeakedSource after ESEA refused to pay the ransom.
28 percent of organizations don't wipe corporate data from employee-owned devices when they leave, a recent survey found.
And 39 percent are unclear on how to protect against DDoS attacks, a recent survey found.
The law went into effect on January 1, 2017.
The exposed data includes names, addresses, Social Security numbers and Medicaid identification numbers.
Customers who shopped at the company's website between July 30 and October 12 of 2016 may be affected.
And 94 percent have implemented two-factor authentication for at least one application, a recent survey found.
The hackers are alleged to have made over $4 million in illegal profits from the trades.
Over a third work more than 15 extra hours per week, a recent survey found.
One in four said something embarrassing has popped up on their phone while someone else was holding it, a recent survey found.
And 20 percent would just stop shopping at the affected merchant, a recent survey found.
9.5 million Lynda.com users and 756,000 L.A. County residents may be affected.
And seven percent said a missed deadline had resulted in serious consequences, a recent survey found.
The hacker claimed to be accessing the system via an unpatched SQL injection vulnerability.
Over a billion names, email addresses, phone numbers, birthdates, hashed passwords and security questions and answers may may have been accessed.
Thousands of victims worldwide have already been hit by the scam.
The company said the attack involved 'organized, highly professional hacker activities.'
In 18.3 million cases, the exposed data includes hashed passwords.
And 65 percent of those attacks compromised employees' login credentials, a recent survey found.
The leading concern regarding insider threats is malware installed by careless employees, a recent survey found.
The routers were 'affected by an attack from outside,' the company said.
And 14 percent said it would cost them their jobs, a recent survey found.
Hackers Hit Madison Square Garden, Radio City Music Hall, Beacon Theater, Chicago Theater, Michigan State University
The data potentially accessed ranges from students' names and Social Security numbers to credit card numbers and expiration dates.
And another 14 percent said they're unlikely to do so, a recent survey found.
And 82 percent of email servers are misconfigured, recent research discovered.
And 9.3 percent of files shared externally contain sensitive data, a recent survey found.
And 42 percent access corporate data over public Wi-Fi, a recent survey found.
The proof-of-concept worm could jump from one smart bulb to another via ZigBee wireless connectivity.
And 95 percent bypass firewalls, a recent survey found.
In 20,000 cases, the bank says, the breaches resulted in 'money being withdrawn fraudulently.'
The attacks exceeded 500 Gbps.
21 percent say the breaches could have been prevented if security policies were better communicated to employees.
Just 46 percent say they're using threat data at all in deciding how to respond to malicious activity.
Names, genders, email addresses, phone numbers and birthdates were exposed by a third party vendor.
The flaw was discovered almost six months ago by researchers at Indegy Labs.
64 percent of U.S. consumers think they're always safe sharing personal data on a major retail or social networking site.
The attack on Dyn's managed DNS services hit sites ranging from CNN to Twitter.
- Mar 2017
- Feb 2017
- Jan 2017
- Dec 2016
- Nov 2016
- Oct 2016
- Sep 2016
- Aug 2016
- Jul 2016
- Jun 2016
- May 2016
- Apr 2016
- Mar 2016
- Feb 2016
- Jan 2016
- Dec 2015
- Nov 2015
- Oct 2015
- Sep 2015
- Aug 2015
- Jul 2015
- Jun 2015
- May 2015
- Apr 2015
- Mar 2015
- Feb 2015
- Jan 2015
- Dec 2014
- Nov 2014
- Oct 2014
- Sep 2014
- Aug 2014
- Jul 2014
- Jun 2014
- May 2014
- Apr 2014
- Mar 2014
- Feb 2014
- Jan 2014
- Dec 2013
- Nov 2013
- Oct 2013
- Sep 2013
- Aug 2013
- Jul 2013
- Jun 2013
- May 2013
- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
- Mar 2008
- Nov 2007
- Oct 2007
- May 2006
- Apr 2006
- Mar 2006
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 2002
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?