YOU ARE AT:TagsData breaches

BROWSING: data breaches

Kagan: Hacker says T-Mobile US wireless data security is awful

The hacker behind the T-Mobile hack told the Wall Street Journal their wireless data security is awful. That is a powerful statement, which painted a bullseye on the back of T-Mobile to hackers worldwide. Wireless users, whether business customers, families or individuals must be...

The FCC says it is investigating the T-Mobile US data breach

More than 40 million former, current and prospective T-Mobile US customers were impacted by a cyberattack Following a cyberattack initially disclosed on Aug. 17 that resulted in customer data being accessed by an unauthorized party, T-Mobile US said today that it is "confident that we...

Attacks on web applications rise as data moves to the cloud, Verizon finds

Web applications are increasingly under attack as valuable enterprise data moves to the cloud, according to Verizon's annual Data Breach Investigations Report. Web application attacks doubled from last year, to 43%. In terms of actual breaches, cloud assets were involved in about 24% of breaches,...

Hackers want the most bang for their buck, too: Verizon DBIR

If you want the quickest take on this year's 78-page Verizon Data Breach Investigations Report, skip the executive summary and go straight to page 53. In a discussion on email compromise attacks targeting executive staff, the report authors muse in their typical irreverent style:...

Verizon DBIR: Ransomware rising

If it seems like you're hearing more about ransomware attacks, it's not just that more high-profile attacks -- like the recent takeover of some city government systems in Atlanta, Ga.-- are making the news. Ransomware attacks have increased significantly in the last couple of...

How to patch security holes

What are security holes? Applying patches to operating systems is pivotal to network security. A software vulnerability is typically a security hole discovered in an operating system or software program, which hackers target with a specific code clothed as malware. In the interest of taking...

IBM debuts universal encryption mainframe to combat hackers

IBM Corp. debuted Monday the encryption capabilities of its new z14 mainframe, otherwise known as IBM Z, which is focused on combating the growing threat of data breaches. The number of data breaches within the U.S. is on the rise. IBM purports universal encryption --...

Editorial Reports

White Papers

Webinars

Featured Content