Thousands of employees' personal information was accessed, according to news reports.
Dell launches new open source tool that uses Docker containers to help organizations identity credential thefts from memory. [VIDEO]
VIDEO: Bryan Sartin, managing director, the RISK Team, Verizon, discusses the new Verizon Breach Digest.
And exploits rose by almost 40 percent, according to a recent Bromium report.
What does it take to run a successful bug bounty program?
The group, New World Hacking, claims the DDoS attack exceeded 600 Gbps.
The hackers probed the system but didn't take control of it, the Wall Street Journal reports.
The data potentially exposed includes full contact information, passwords, birthdates, and credit card data.
The tablets have been sold and delivered to over 17,000 customers in more than 150 countries.
And porn sites are now the top mobile infection vector, according to Blue Coat.
The hacker claims to have accessed Brennan's application for top secret security clearance, along with other sensitive data.