The breach took place in July 2013, and was detected in the middle of September.
The three allegedly stole as much as $4.1 million from investors.
Microsoft and its partners in law enforcement aim to disrupt the ZeroAccess botnet, one of the most robust botnets in operation today.
The 13 will be sentenced in November and December of 2014.
The Web site's credit card transaction system was accessed between mid-October and mid-November of 2013.
Almost $1 million in Bitcoins were seized by German police.
In at least one case, the credit card reader was accessed via the restaurant's Wi-Fi network.
Doru Gabriel Trifu was also ordered to pay $562,240 in restitution.
The login credentials provide access to Facebook, Twitter, Google, Yahoo and ADP, among other sites.
Daniel Stratman pled guilty in return for a recommended sentence of not more than two years in prison.
URM Stores is now working to determine which stores were affected and for how long.
The sites were being used to sell counterfeit merchandise.
Eric J. Rosol has been ordered to pay $183,000 in restitution for using the Low Orbit Ion Cannon tool for one minute in February 2011.
Vulnerable sites include those for Kickstarter, Mozy, Urbanspoon and Warner Bros., among many others.
Some users' passwords may have been intercepted.
Students' names, birthdates, genders, identification numbers, vision exam dates, diagnoses and school names were mistakenly published online.
Akamai is paying $370 million to add a missing piece to its security portfolio, enabling full Web application and data center Distributed Denial of Service protection.
Traffic was redirected to a DotCache exploit kit landing page, according to Malwarebytes.
The hacker leaked more than 77,000 users' data, including many users' bank details.
The exposed data includes employees' Social Security numbers, driver's license numbers and bank account numbers, and students' academic information.
Almost 1,300 patients' names, birthdates, contact information, treatment information, diagnosis information and Social Security numbers were accessed.
Still, 82 percent say they're very or extremely concerned about their security online.
Names, medical record numbers, addresses, phone numbers, dates of service, charge amounts, birthdates and Social Security numbers were accessed.
Employees' Social Security numbers, birthdates, home addresses, phone numbers and bank routing numbers may have been accessed.
An undisclosed number of patients' names, medical record numbers and birthdates may have been exposed when a USB flash drive was lost.
A former employee was caught after trying to print photos of patient records at Walmart.
John Anthony Borell III denied having had anything to do with the March 2012 arrest of fellow CabinCr3w hacker Higinio Ochoa.
Many supermarkets are asking customers to pay with cash or check after URM Stores' payment processing system was hit by a cyber attack.
An undisclosed number of people's names and Social Security numbers were mistakenly provided to employers for whom they hadn't worked.
The malware creates a user account with administrative rights on the infected system.
8.294 patients' personal and health information may have been exposed when a physician's laptop was stolen.
Users whose e-mail addresses appear on a list of those exposed in the Adobe breach are being advised to consider changing their passwords.
Matthew Calicchio allegedly published thousands of student's personal information online.
Planned events include webinars, a bilingual Twitter chat, and regional events in California, Maryland, Nevada, Virginia and Washington.
Employees' names, compensation and Social Security numbers were accessed.
Users' full names, user names, encrypted passwords, e-mail addresses, mailing addresses and birthdates may have been accessed.
'Most balances left are miniscule,' says company CEO Kris Henriksen.
Still, 33 percent of respondents to an Avecto survey said rogue employees present the most important security threat to their organization.
1,039 patients' personal information may have been exposed when an unencrypted thumb drive was lost.
Bob Rampy allegedly tampered with Maricopa County's Integrated Criminal Justice Information System after he wasn't selected to become its director.
Employees' names, addresses, e-mail addresses, phone numbers, birthdates, Social Security numbers, salaries and 401(k) balances may have been exposed.
A CompTIA survey also found that most companies still view hacking and malware as the leading cyber security threats.
Users with compromised accounts have been notified by e-mail.
Names, addresses, birthdates, genders and Social Security numbers were exposed when a flash drive was stolen.
The five were allegedly involved in an operation in which $45 million was withdrawn from ATMs worldwide in December 2012 and February 2013.
Names, business addresses and Tax Identification Numbers were mistakenly published on the company's Web site.
While many of the accounts are inactive, those passwords may well have been reused on other sites.
An HP study also found that 18 percent send user names and passwords via HTTP.
Users' first and last names, e-mail addresses, majors, grades, birthdates and hashed passwords were published online.
The department paid 2 Bitcoins to decrypt images and documents encrypted by the ransomware.
11 user names and hashed passwords were published online.
'A perfect landing,' Bitzer CEO Naeem Zafar tweeted.
Jeremy Hammond pled guilty in May 2013 to one count of conspiracy to engage in computer hacking.
In response, all customer passwords have been reset.
Pay $300, and it'll just ask for another $450, according to Malwarebytes.
Jose Torres was part of a scheme that involved the filing of more than 8,000 fraudulent tax returns seeking over $65 million in refunds.
All users' wallets were emptied, according to site owner Karel Minx.
The malware is currently detected by just 24 of 47 anti-virus solutions used by VirusTotal.
Jared James Abrahams faces up to 11 years in prison and up to $1 million in fines.
While 860,000 users' e-mail addresses, user names and hashed passwords may have been accessed, the hacker says he's not planning to leak the data.
Still, a SilverSky survey found that 81 percent already believe they're as secure or more secure than they were a year ago.
The researchers say they uncovered a 'development and logistics operation used to support several APT actors in distinct but overlapping campaigns.'
'A hospital can only do so much in the case of a rogue employee,' hospital administrator John Halfen said.
Still, half of employed adults who have work-issued devices say they check their social media accounts from those devices.
A former employee only recently discovered that she had taken sensitive data with her by mistake when she left the company in 2010.
The combined offering aims to address key security concerns regarding cloud environments.
'The initial indications are that these breaches were an external criminal act,' Ireland's Data Protection Commssioner stated.
Users will only receive partial refunds of their balances.
Trustwave will continue to develop and support AppSecInc's DbProtect and AppDetectivePRO products.
Edwin Vargas paid e-mail hacking services more than $4,000 for the login credentials to at least 43 personal e-mail accounts.
A former employee is holding a laptop containing patient data hostage.
An undisclosed number of people's names, addresses, birthdates and Social Security numbers were inadvertently disclosed.
Quentin Collick and Deatrice Williams were sentenced to 85 and 51 months in prison, respectively.
According to Europol, the police operation dismantled a major international network of card fraudsters.
'We need the public's help to catch these individuals,' said the FBI's Richard McFeely.
11,500 patients' names, diagnoses, insurance information and dialysis treatment data may have been exposed when an unencrypted laptop was stolen.
Names, home addresses, birthdates, medical record numbers, insurance provider information and treatment information may have been exposed.
94.1 percent of all login attempts are made by malicious automated tools, according to Incapsula.
Berness Swan faces up to 12 years in prison for using patients' personal information to file fraudulent tax returns.
57 percent of enterprise malware analysts say they've investigated or addressed a data breach that was never disclosed by their company.
Customers' names, phone numbers, e-mail addresses, birthdates and Social Security numbers may have been accessed.
The government says it's not yet clear whether government or private bodies were behind the attacks.
4.4 million Americans were both notified that their payment card data was compromised in a data breach and suffered fraud on their financial accounts.
And 90 percent say coordination of security policy across the entire network is essential, according to Tufin Technologies.
More than 850,000 customers' names, addresses, credit card numbers and expiration dates were exposed, including those of Tom Hanks and LeBron James.
A new CryptoLocker Decryption Service demands 10 Bitcoins for access to encrypted files.
Customers' credit or debit card account numbers, expiration dates and card verification numbers were accessed by hackers.
Gartner says the market will to grow to $3.1 billion in 2015.
Harvey James admitted using inmate information from the Alabama Department of Corrections to file hundreds of fraudulent tax returns.
286 children's mental and physical health problems and teaching requirements were exposed when an unencrypted USB drive was lost.
Cpl. Keith Hamilton sent an e-mail containing female deputies' height, weight, chest and bra cup size throughout the department.
The company says the access was enabled via a password that was shared with a compromised personal account.
The names, addresses or e-mail addresses and Social Security numbers of 33 employees, agency employees, and applicants may have been exposed.
Schnucks customers will be paid up to $10 per compromised credit or debit card.
125 patients' birthdates, Social Security numbers, medical diagnoses and prescribed treatments may have been inappropriately accessed.
Lauri Love allegedly stole thousands of people's personally identifiable information and caused millions of dollars in losses.
Still, a survey from McAfee and Office Depot found that 66 percent feel confident their data and devices are safe from hackers.
Names, addresses, birthdates and social insurance numbers from student applications between 2004 and 2009 may have been exposed.
The aim of the alliance is to create a unique end-to-end encrypted protocol and architecture for secure e-mail.
Current and former employees' names, addresses, Social Security numbers and payroll benefit deduction amounts may have been exposed.
Names, contact information, birthdates, clinical data, health information, and the last four digits of Social Security numbers may have been accessed.
While the hackers were able to access Facebook and Twitter access tokens, no passwords, billing information or other user information was exposed.
Kamala Harris published best practice guidelines for the health care industry, along with tips for consumers.
The boy apparently traded stolen information to members of Anonymous for video games.
Christopher Wright and two co-conspirators redirected financial aid refunds to prepaid credit cards in their possession.
1,182 prisoners' names, ethnicities, addresses, sentence lengths and release dates were mistakenly e-mailed to three inmates' families.
And 44 percent have access rights that aren't necessary for their current jobs, according to BeyondTrust.
Apple's OS X 10.9 update provides a long list of new security features and fixes that aren't in the 10.8 release.
Two employees' direct deposit designations were changed following a phishing attack.
The e-mails attempt to trick recipients into downloading a variant of the Zeus Trojan, according to AppRiver researchers.
And 61 percent experienced malware/botnet infiltration attacks during the same period of time, according to Alert Logic.
Hieu Minh Ngo and his co-conspirators allegedly acquired and sold more than 500,000 people's personally identifiable information online.
Names, Social Security numbers, driver's license numbers, and/or birthdates may have been exposed.
The company says the funds will be used for continued product development and to accelerate sales in North America, EMEA, Japan and APAC.
Jonathan and Alyson Cunningham were sentenced to 3 years probation and 300 hours of community service, plus payments of $2,445.96 in restitution.
The students' medications, health-related letters and medical histories may have been accessed.
A Fortinet survey also found that 14 percent wouldn't tell their employer if a personal device they used for work became compromised.
According to Infonetics, the managed security market will grow by 45 percent over the next five years.
Patient names, Medicare/insurance ID numbers, diagnosis/procedure codes, insurance/patient payments and Social Security numbers may have been exposed.
An OpenDNS study also found that the Expiro malware is currently the leading threat to college and university networks.
University employees' Social Security numbers and driver's license numbers may have been accessed by hackers.
The hackers claim to have stolen $100,000 by leveraging user names and passwords taken from a California ISP to access victims' bank accounts.
Hackers may have accessed customers' names, credit card information, billing addresses, e-mail addresses, phone numbers, and user names and passwords.
The company says the funds will be used to support CounterTack's global expansion in the endpoint threat detection and response market.
The company says 2013 has already seen a 350 percent increase in the number of DDoS attacks monitored at over 20 Gbps.
The company says a database containing approximately 10,000 user records was accessed.
A former employee may have accessed customers' names, birthdates, addresses, phone numbers, Social Security numbers and driver's license information.
Names, e-mail addresses, contact information, user names and encrypted passwords were compromised.
Customers' names, addresses, credit/debit card numbers, expiration dates and CVV codes may have been accessed.
Less than a quarter of young adults believe a career in cyber security would be interesting at all.
An undisclosed number of clients' names, birthdates, Social Security numbers and medical health information may have been accessed.
The alliance will be funded with up to $48.2 million over a potential 10-year period.
144,493 names and Social Security numbers may have been accessed.
The malware encrypts the victim's personal files -- and it's impossible to decrypt them.
Still, according to a recent survey, more than half don't lock their mobile device with a PIN.
Fraudulent Web sites, e-mails and phone messages are tricking victims into giving up sensitive information, according to the HKMA.
Olukunle Babatunde pleaded guilty to using phishing e-mails to trick victims into giving up their bank login information.
Victims are asked either to enter their Facebook credentials, or to download an application that's actually a Trojan.
'Sorry for that then, was just a security alert,' the hackers stated. 'No harm done.'
Still, according to Juniper Research, almost 1.3 billion mobile devices will have security software installed by 2018.
The malware is currently detected by only 22 of 48 leading anti-virus scanners, according to VirusTotal.
The funds will be leveraged to continue international expansion, expand into the enterprise, and invest in security beyond the mobile device.
As many as 8,000 current and former patients' names, birthdates, Social Security numbers and billing addresses may have been accessed.
And 48 percent only review sensitive data access once month, according to Vormetric.
The personal health information of 1,310 patients was transmitted by unsecure e-mail.
According to security researcher Kafeine, the Blackhole exploit kit hasn't been updated in several days.
An undisclosed number of names and Social Security numbers may have been accessed.
The three are accused of stealing proprietary trading strategies and source code for their own use.
Names, addresses, birthdates, marital status and assessment information may have been exposed when an unencrypted SD card was stolen.
The hackers leveraged a zero day flaw in WHMCS to access customers' names and e-mail addresses.
- Dec 2013
- Nov 2013
- Oct 2013
- Sep 2013
- Aug 2013
- Jul 2013
- Jun 2013
- May 2013
- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
- Mar 2008
- Nov 2007
- Oct 2007
- May 2006
- Apr 2006
- Mar 2006
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 2002
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?