Data breaches

November 2, 2015
Comments [0]

Every day we hear about data breaches, whether they’re at the White House or our local bank. But it’s easy to confuse terms used to describe what’s happening: cyber crime, hacktivism, cyber war. What’s the difference?

Richard Clarke, former counterrorism czar for the United States, recently shared his system for understanding cyber crime—and two key ways to protect your businesses and customers—at the third annual...

Read More
August 7, 2015
Comments [0]

Russia launched a “sophisticated cyber attack” against the Pentagon’s Joint Staff unclassified email system, which has been shut down and taken offline for nearly two weeks. According to the officials, the “sophisticated cyber intrusion” occurred sometime around July 25 and affected some 4,000 military and civilian personnel who work for the Joint Chiefs of Staff. It appears the cyber attack relied on an automated system that rapidly gathered massive amounts of data and within a minute...

Read More
August 6, 2015
Comments [0]

LAS VEGAS—Hacking the daily stuff of life is one theme emerging at this year’s Black Hat computer security conference. More than 10,000 computer security professionals, researchers and government workers are expected at the conference, which features 290 sessions describing network security flaws, attacks past, present and future, and how to guard against them. Black Hat is known as a conference where security types present the fruits of research that’s necessary, but at...

Read More
August 5, 2015
Comments [0]

Drones could help hack into personal computers, and, according to emails posted by WikiLeaks, military contractors may want to do that. Boeing and Hacking Team were in talks earlier this year to plant malware on drones to perform such activities, according to emails stolen from Hacking Team in July. How this could work: An al-Qaeda operative is hiding in the foothills of another country, which may or may not be protecting him from U.S. detection. The U.S. military could try hacking into that...

Read More
August 4, 2015
Comments [0]

By Byron Acohido, ThirdCertainty

In a move that could set a precedent for service providers, Google pushed back against the expansion of what’s become known as the Right to be Forgotten ruling, and refused to comply with a notice issued by French data protection agency Commission Nationale de l’Informatique et des Libertes mandating the company remove links from its domains worldwide (as opposed to removal by country only). “We respectfully disagree with the CNIL’s...

Read More
August 3, 2015
Comments [0]

A government contractor, several of whose employees were caught on video drunk while on a sensitive security mission in Afghanistan, now is being used to help fix the security breach at the Office of Personnel Management. “What are they thinking?” asked Sen. Claire McCaskill, D-Mo., who wants to know how the company got its contract from the OPM with no competitive bidding. “What in this company’s background gave them assurances that they are the company that can handle this incredibly...

Read More
July 29, 2015
Comments [0]
The hackers who stole data on tens of millions of U.S. insurance holders and government employees in recent months breached another big target at around the same time — United Airlines. The world’s second-largest airline detected an incursion into its computer systems in May or early June, said several people familiar with the probe. According to three of these people, investigators working with the carrier have linked the attack to a group of China-backed hackers they say are behind several... Read More
July 28, 2015
Comments [0]

Greece’s former finance minister was ready to hack into the country’s tax-collection system as part of contingency planning for a possible exit from the euro. The hacking was part of a “Plan B” hatched by Yanis Varoufakis to create a parallel currency in case Greece was unable to agree on a new bailout with its creditors. Varoufakis resigned on July 5 as the financial crisis spiraled out of control. He described the plan during a teleconference with investors earlier this month. A recording...

Read More
July 24, 2015
Comments [0]

Lax security left the U.S. Treasury’s computer system for tracking overseas threats to the U.S. financial system vulnerable to hackers, according to a government audit prepared in late 2014 and obtained by Reuters. U.S. spy agencies use the Treasury Foreign Intelligence Network to share secret information and to keep tabs on the impact of sanctions against countries such as Iran and Russia, as well as militant groups such as Hezbollah. The report gave no indication the foreign intelligence...

Read More
July 23, 2015
Comments [0]

Credit bureau Experian is the target of a class-action lawsuit alleging that the company negligently violated consumer-protection laws when it failed to detect that a customer of its data broker subsidiary was a scammer who sold data to identity thieves. The lawsuit follows the imposition of a 13-year jail sentence against Hieu Minh Ngo, who ran an ID theft service variously named Superget.info and findget.me. Ngo admitted hacking into or otherwise illegally gaining access to databases...

Read More

Offer 24/7 CyberScout Protection

CyberScout's partnership options help you safeguard the identity and privacy of your policyholders, customers, members and employees. Discover how a customized program can help build brand loyalty, customer retention, and quickly generate long-term recurring revenue.

Get Started