And just two thirds of IT pros say their current IT security budget is sufficient, a recent survey found.
The IT security industry responds to a growing cloud ecosystem, IoT's expanding reach and a rise in nation-state cyberattacks.
45 percent of companies say the cyber security skills shortage is causing breaches, a recent survey found.
A new integration allows Microsoft Enterprise Mobility + Security customers to protect their mobile devices against sophisticated threats.
More than 1,445,000 users were hit by ransomware in 2016, according to a recent report.
A new add-on for the Centrify Identity Services Platform uses machine learning to spot and block suspicious access attempts.
The exposed data ranges from former NFL players' Social Security numbers and medical information to confidential files from Hustler Hollywood stores.
Lawyers from Google, Cisco and Microsoft talk about privacy and why they're confident they're all moving in the right direction.
Today's businesses are journeying into treacherous territory with too few security professionals behind the wheel.
More than 335,000 credit and debit cards may have been compromised.
70 percent have invested in IT security technology that wasn't successfully deployed a recent survey found.
No forensics experience? No problem. BreachDetect uses new timeline views and plain-language explanations to unmask breach attempts.
The company aggregated viewing data, attached demographic information to it, and sold it to third parties for use in targeted advertising.
Bars and restaurants at 12 IHG properties across North America were affected.
Striking while the iron's hot, Capsule8 makes its official debut to help enterprises guard their container-filled Linux infrastructures.
Reasons for the surge include the rise of ransomware as a service, easier access in the underground market, and the low cost of conducting an attack.
Still, 83 percent of consumers say they trust banks and insurers to maintain strong cyber security, a recent survey found.
The organization failed to encrypt patient data after an unencrypted, non-password protect BlackBerry containing PHI was lost in 2009.
The company's new cloud-based offering helps businesses better asses the risks of their dynamic IT workloads.
The buy will help strengthen the company's Aruba ClearPass network access control and management platform.
The hackers demanded 2 Bitcoins in payment to return control of the systems back to the hotel -- and the hotel says it had no choice but to pay.
Email addresses, passwords and IP addresses were exposed.
And 26 percent said their organizations were breached in the past year, a recent survey found.
The deal is expected to help put (and keep) data security on radars of corporate business leaders.
The app demanded 0.2 Bitcoins in payment from infected users.
94 of those breaches exposed a million or more records each, according to a recent report.
The company debuts new appliances that help businesses keep cyber-attackers away from their critical applications.
The attacks continued to hit organizations in Saudi Arabia earlier this week.
And 93 percent say they face persistent challenges in protecting data, a recent survey found.
The number represents a 40 percent increase over the previous year, according to a recent report.
Multi-factor security firm gets new financial backing as it takes aim at growing share in the authentication market.
The exposed data includes names, Social Security numbers, birthdates, contact details, medical record numbers and/or clinical information.
The country's national power company hasn't said whether it was able to link the attack to any specific group or nation state.
More than three times as many IT pros would prefer to grow their staff's skills than grow the number of people on their team, a recent survey found.
'If there's one thing you shouldn't do, it's decrypting passwords client side,' researcher Tijme Gommers noted.
The attack has already caught several technical users, according to Wordfence CEO Mark Maunder.
82 percent don't encrypt data at rest, according to a recent report.
CrowdStrike analysts determined the identity of the attacker, and concluded that the attacker was acting on a foreign government's behalf.
The seven companies will begin a three-month program providing mentoring, contact with investors, office space and access to GCHQ personnel.
Nine percent of organizations using two-factor authentication say their users simply 'hate it,' a recent survey found.
The hacker provided the records to LeakedSource after ESEA refused to pay the ransom.
28 percent of organizations don't wipe corporate data from employee-owned devices when they leave, a recent survey found.
And 39 percent are unclear on how to protect against DDoS attacks, a recent survey found.
The law went into effect on January 1, 2017.
The exposed data includes names, addresses, Social Security numbers and Medicaid identification numbers.
Customers who shopped at the company's website between July 30 and October 12 of 2016 may be affected.
And 94 percent have implemented two-factor authentication for at least one application, a recent survey found.
The hackers are alleged to have made over $4 million in illegal profits from the trades.
Over a third work more than 15 extra hours per week, a recent survey found.
One in four said something embarrassing has popped up on their phone while someone else was holding it, a recent survey found.
And 20 percent would just stop shopping at the affected merchant, a recent survey found.
9.5 million Lynda.com users and 756,000 L.A. County residents may be affected.
And seven percent said a missed deadline had resulted in serious consequences, a recent survey found.
The hacker claimed to be accessing the system via an unpatched SQL injection vulnerability.
Over a billion names, email addresses, phone numbers, birthdates, hashed passwords and security questions and answers may may have been accessed.
Thousands of victims worldwide have already been hit by the scam.
The company said the attack involved 'organized, highly professional hacker activities.'
In 18.3 million cases, the exposed data includes hashed passwords.
And 65 percent of those attacks compromised employees' login credentials, a recent survey found.
The leading concern regarding insider threats is malware installed by careless employees, a recent survey found.
The routers were 'affected by an attack from outside,' the company said.
And 14 percent said it would cost them their jobs, a recent survey found.
Hackers Hit Madison Square Garden, Radio City Music Hall, Beacon Theater, Chicago Theater, Michigan State University
The data potentially accessed ranges from students' names and Social Security numbers to credit card numbers and expiration dates.
And another 14 percent said they're unlikely to do so, a recent survey found.
And 82 percent of email servers are misconfigured, recent research discovered.
And 9.3 percent of files shared externally contain sensitive data, a recent survey found.
And 42 percent access corporate data over public Wi-Fi, a recent survey found.
The proof-of-concept worm could jump from one smart bulb to another via ZigBee wireless connectivity.
And 95 percent bypass firewalls, a recent survey found.
In 20,000 cases, the bank says, the breaches resulted in 'money being withdrawn fraudulently.'
The attacks exceeded 500 Gbps.
21 percent say the breaches could have been prevented if security policies were better communicated to employees.
Just 46 percent say they're using threat data at all in deciding how to respond to malicious activity.
Names, genders, email addresses, phone numbers and birthdates were exposed by a third party vendor.
The flaw was discovered almost six months ago by researchers at Indegy Labs.
64 percent of U.S. consumers think they're always safe sharing personal data on a major retail or social networking site.
The attack on Dyn's managed DNS services hit sites ranging from CNN to Twitter.
The exposed data includes email addresses and/or user names, IP addresses and encrypted passwords.
The hackers were able to siphon the data out of the facility for six months before they were discovered.
The retailer was notified by law enforcement of a 'potential data security issue' on September 15.
And 73 percent prefer to keep their sensitive corporate data on premises rather than in the cloud, a recent survey found.
Among those that do check for it, fully 57 percent have found malware, a recent survey found.
Still, 46 percent are solicited for jobs at other companies at least once a week, a recent survey found.
And 39 percent have lost business information in a public place, a recent survey found.
And 71 percent said incident response has become more difficult over the past two years, a recent survey found.
And 29 percent said it would take them several months to begin trusting a company again following a data breach, a recent survey found.
Fully 74 percent of IT pros say their organization is vulnerable to insider threats, a recent survey found.
Fully 95 percent are using threat intelligence in some way, a recent survey found.
Verizon, which announced plans to acquire Yahoo two months ago, says it only learned of the breach last week.
The flaws enabled the researchers to fold in the rear view mirrors, pop the trunk, and activate the brakes remotely while the car was being driven.
Still, 55 percent say they have evolved processes for managing privileged accounts, a recent survey found.
And 47 percent said security concerns are their main reason for avoiding cloud deployments, a recent survey found.
Doing so, the FBI stated, 'provides law enforcement with a greater understanding of the threat.'
Confidential medical information for U.S. athletes including Simone Biles and Serena Williams was published online.
The largest attack detected in the second quarter peaked at 256 Gbps, according to Verisign.
Downtime resulting from ransomware attacks can cost companies more than $8,500 an hour, a recent survey found.
Cards used at front desks and restaurants may be affected.
Intel sells majority stake in its security unit in a deal that values the former McAfee at $4.2 billion. New majority owner TPG will again use the McAfee name.
And smartphones accounted for 78 percent of those infections, according to Nokia.
As many as 12 banks may have suffered breaches.
The data comes from a breach dating back to mid-2012.
And nine percent would do it for free, a recent survey found.
Still, 47 percent expect the number of IoT devices on their networks to increase by at least 30 percent next year.
And 74 percent think privileged users believe they're empowered to access all the information they're able to view, a recent survey found.
Intel Security and Kaspersky Labs worked with international law enforcement agencies on a website that offers decryption keys for several variants of ransomware.
Names, card numbers, security codes and expiration dates were accessed.
The breach may have exposed the personal information of employees at 280 companies.
Customer names, account numbers, expiration dates and verification codes may have been accessed.
Deep Instinct reveals flaw that could potentially enable a security certificate bypass in Microsoft applications.
The hackers targeted weaknesses in the vendors' servers, then attempted to steal login information and use it to access retailers' POS systems.
And 76 percent of organizations have experienced the loss or theft of data in the past two years, a recent survey found.
It's not yet clear how many customers may be affected.
'We hope this settlement sends a strong message,' OCR director Jocelyn Samuels said.
A wide range of information was exposed, from credit card numbers to patient data.
And 82 percent admit to a shortage of cyber security skills, a recent survey found.
The education sector comes second at 6 percent, according to a recent report.
Scott Petry, co-founder and CEO of Authentic8, talks about his past with Postini and how his new startup is the future of online security. [VIDEO]
And 54 percent of IT pros said it's more difficult to protect confidential or sensitive information when using cloud services, a recent survey found.
The O2 breach appears to have been caused by password reuse, while the Kimpton breach leveraged point-of-sale malware.
The exposed data includes user names, email addresses, IP addresses, device identifiers, Facebook data, and hashed and salted passwords.
And 50 percent don't audit privileged account activity, a recent survey found.
'Organizations need to take steps to safeguard their data from ransomware attacks,' says Office for Civil Rights director Jocelyn Samuels.
Still, 79 percent of companies lack comprehensive strategies to detect and mitigate such attacks, a recent survey found.
And just 25 percent are completely confident in their ability to handle security incidents, a recent survey found.
The three recent breaches exposed thousands of customers' personal and payment card information.
The attacks appear to have been enabled by the theft of third-party service providers' remote access credentials.
And just 14 percent of SMBs see their ability to mitigate cyber attacks as highly effective, a recent survey found.
And 67 percent of IT professionals have no cyber security certifications, a recent survey found.
Approximately 4,300 patients' names, birthdates and Social Security numbers were exposed.
The cameras, located in 105 countries, delivered as many as 50,000 HTTP requests per second.
Approximately 57 percent of all organizations using Office 365 were hit by the attack.
The stolen records include full names, Social Security numbers, birthdates, mailing addresses and insurance information.
Cisco broadens its cloud security business with $293 million acquisition of CloudLock, a provider of cloud access security broker (CASB) technology.
Both attacks leveraged email addresses and password stolen from other sites.
The suit was filed by Veridian Credit Union on behalf of all U.S. financial institutions whose customers were affected by the data breach.
Names, addresses, credit card numbers, expiration dates and CVV codes were accessed.
The program is intended to increase the pool of available talent with cyber security skills.
[VIDEO] Former top IBM security exec, Kris Lovejoy, now president of BluVector by Acuity discusses what her new firm's tech is all about.
Hackers breached the DNC's network. and targeted Trump's and Clinton's campaigns along with some Republican PACs.
And the average organization's users connect 733 third-party cloud apps to the corporate environment, according to a recent report.
And 21 percent are very likely to do so, a recent survey found.
Pen Test Partners researchers were able to disable the car's alarm remotely.
The unencrypted laptop held copies of the medical exam results for all NFL Combine attendees for the past 13 years.
The data, all of it dating back to 2013 or earlier, is being offered for sale online.
The same percentage admitted having retained access to sensitive data after leaving a job, a recent survey found.
Far too many unencrypted laptops containing vast amounts of sensitive data are still being left in employees' vehicles.
Phishing Attacks Steal W-2 Info from Milwaukee Bucks, Saint Agnes Medical Center, Rockhurst University
Thousands of employees' tax information may have been stolen.
The potentially exposed data includes names, addresses, Social Security numbers, birthdates, treatment information and health insurance information.
ESET has made a free decryption tool available to those affected.
The stolen database holds 167 million records, of which 117 million include email addresses and passwords.
- Jan 2017
- Dec 2016
- Nov 2016
- Oct 2016
- Sep 2016
- Aug 2016
- Jul 2016
- Jun 2016
- May 2016
- Apr 2016
- Mar 2016
- Feb 2016
- Jan 2016
- Dec 2015
- Nov 2015
- Oct 2015
- Sep 2015
- Aug 2015
- Jul 2015
- Jun 2015
- May 2015
- Apr 2015
- Mar 2015
- Feb 2015
- Jan 2015
- Dec 2014
- Nov 2014
- Oct 2014
- Sep 2014
- Aug 2014
- Jul 2014
- Jun 2014
- May 2014
- Apr 2014
- Mar 2014
- Feb 2014
- Jan 2014
- Dec 2013
- Nov 2013
- Oct 2013
- Sep 2013
- Aug 2013
- Jul 2013
- Jun 2013
- May 2013
- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Sep 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Jan 2012
- Dec 2011
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Sep 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Nov 2009
- Oct 2009
- Sep 2009
- Aug 2009
- Jul 2009
- Jun 2009
- May 2009
- Apr 2009
- Mar 2009
- Feb 2009
- Jan 2009
- Dec 2008
- Nov 2008
- Oct 2008
- Sep 2008
- Aug 2008
- Jul 2008
- Jun 2008
- May 2008
- Mar 2008
- Nov 2007
- Oct 2007
- May 2006
- Apr 2006
- Mar 2006
- Nov 2005
- Oct 2005
- Sep 2005
- Aug 2005
- Jul 2005
- Jun 2005
- May 2005
- Apr 2005
- Mar 2005
- Feb 2005
- Jan 2005
- Dec 2004
- Nov 2004
- May 2004
- Apr 2004
- Mar 2004
- Feb 2004
- Jan 2004
- Dec 2003
- Nov 2003
- Oct 2003
- Sep 2003
- Aug 2003
- Jul 2003
- Jun 2003
- May 2003
- Apr 2003
- Mar 2003
- Feb 2003
- Jan 2003
- Dec 2002
- Nov 2002
- Oct 2002
- Sep 2002
- Aug 2002
- Jul 2002
- Jun 2002
- May 2002
- Apr 2002
- Mar 2002
- Feb 2002
- Jan 2002
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?