Quantcast
Channel: CSO Online - data theft RSS feed
Browsing all 35 articles
Browse latest View live

With economic slump, concerns rise over data theft

Is the worsening economic situation going to turn some employees into data thieves?

View Article



Specialist London police squad to tackle business data theft

A specialist police squad is being established to help businesses in the City of London tackle data theft.

View Article

Gonzalez sentenced for multimillion-dollar credit card scam

As his parents and sister silently wept, hacker mastermind Albert Gonzalez was sentenced Thursday in U.S. District Court to two concurrent 20-year stints in prison for his role in what prosecutors...

View Article

Apache project server hacked, passwords compromised

Hackers broke into a server used by the Apache Software Foundation to keep track of software bugs.

View Article

27 million South Koreans affected by data breach

South Korean authorities have revealed details surrounding massive data breach that impacts 27 million people aged 15-65. The compromised data comes from website registrations for various games and...

View Article


Healthcare data and data breaches: A second opinion:

We've barely begun 2015, yet some security predictions made at the end of last year are already being tested. One of those was a prediction by RSA that criminals will turn their attention to stealing...

View Article

In Pictures: 7 steps to protect your business from cybercrime

As cybercriminals employ increasingly sophisticated tactics to steal identities and data, and the costs and consequences of data breaches skyrocket, here are seven steps that your small business should...

View Article

Breaking the Kill Chain: Protecting Against the Known and the Unknown

Data theft is big business. More than 1.3 billion records have been exposed in the last two years. The threat evolution is faster than ever – we are, on average, discovering more new threats every day...

View Article


Role-based Access Control: Access, security, info tracking

Controlling access to sensitive data is of utmost concern for the world’s most complex business and network environments. The amount of security-related data stored across a network is immense for many...

View Article


‘Hunted’ to ‘Hunter’, Reactive to Proactive Security

It is an unfortunate reality that attackers are becoming far more successful at stealing data and personal customer information from businesses around the world. In October, we saw one of the most high...

View Article

Microsoft to admins: don’t demand long, complex and frequently changed passwords

​Microsoft has warned IT admins to against policies that require passwords that are too long, require multiple character sets, and force users to change them frequently.

View Article

Russian hackers breach DNC computers, steal data on Trump

Hackers were looking for campaign strategies and policies

View Article

​Policing the data lake

Every organisation is facing a new set of security challenges as they amass data says Nuix's Jim Kent.

View Article


​Resilience and intelligence are key to infosec success

One of the key themes coming from this year’s Risk Management and Security Summit, held by Gartner, is that the battle against cybercrime and data theft is as much about resilience and detecting...

View Article

Protecting your reputation following a data breach

Data breaches are inevitable and waiting for a breach to occur before designing an incident response plan is a recipe for failure. It’s a question of when the breach will occur and how you will...

View Article


​Cyber Terrorism - The Final Frontier

A hospital staff member, expecting delivery of an online purchase, opens an email claiming to contain details of a parcel delivery.

View Article

Tribunal rules UK surveillance was illegal for over a decade

As the UK prepares for new surveillance laws, a court has ruled that prior bulk communication data collection was being conducted illegally between 1998 and 2015.

View Article


​Privacy and the right to be 'left alone'

Imagine life without our smartphones, tablets, digital televisions and the Internet. We would still be stuck in the early 90s.

View Article

Role-based Access Control: Access, security, info tracking

Controlling access to sensitive data is of utmost concern for the world’s most complex business and network environments. The amount of security-related data stored across a network is immense for many...

View Article

‘Hunted’ to ‘Hunter’, Reactive to Proactive Security

It is an unfortunate reality that attackers are becoming far more successful at stealing data and personal customer information from businesses around the world. In October, we saw one of the most high...

View Article
Browsing all 35 articles
Browse latest View live




Latest Images