Data Security

Data security news, trends, analysis and practical advice

data breach thinkstock
us china flags

Revving up security illustration by Stephen Sauer [single use]

Your IT security infrastructure, rebooted for 2015

Cloud, mobile, social media and other factors are conspiring to force companies to reevaluate their security infrastructure, from firewalls to authentication.

data breach thinkstock

More than 1B records breached in 2014

In IT security, worst case scenarios became commonplace in 2014, and there’s no end in sight. Headline-making data breaches will likely continue into this year, as businesses, governments and regulators play catch-up to this threat.

malware shield prevent security virus warning

Critical vulnerability in Group Policy puts Windows computers at risk

Microsoft patched a critical vulnerability Tuesday that put Windows computers at risk of full compromise, especially those in corporate networks.

00 breach happens

Security Manager’s Journal: Breaches are everywhere

A look back at the top 20 data breaches of 2014 — over 450 million records compromised — points to the new normal.

security threat 100305038

Facebook builds platform for companies to share cybersecurity threat data

Facebook has built a platform where organizations can share information about the security threats they face in order to better fend off cyberattacks.

countdown

Five sneaky ways companies are changing employees’ security behavior

Like precocious teenagers, some employees don’t want to be told what to do when it comes to cyber security. Too many rules about what they can and cannot do with technology can lead to bad decisions that inadvertently put company data...

Advantech communication devices vulnerable to remote code execution

Industrial computer manufacturer Advantech fixed a critical vulnerability in a series of devices that handle data communication for industrial equipment with serial connections and TCP/IP networks.

sophisticated blogger

The ‘sophisticated attack’ myth

Every significant data compromise is said to be sophisticated. Well, sophisticated attacks are now average attacks. Deal with it.

US to form cybersecurity agency to combat online threats

The Obama administration will create a new agency to monitor cybersecurity threats and share data about possible attacks among government departments.

data breach lessons

Researcher releases 10M usernames, passwords from data breaches

A researcher has released 10 million usernames and passwords collected from data breaches over the last decade, a step he worries could be a legally murky but one that will help security research.

confide

Protect yourself from hackers and the NSA

Everybody's talking about hackers and the NSA stealing our data. Here's how to do something about it.

keyboard chinese flag china hacker

State-sponsored Chinese hackers suspected in Anthem breach

Hackers involved in the data breach at health insurer Anthem may have ties to the Chinese government, according to a news report.

Hacked, unlocked, unsafe.

Health insurer Anthem discloses customer and employee data breach

Anthem, one of the largest health insurers in the U.S., said Wednesday one of its IT systems was breached, resulting in the loss of customer and employee data.

Toshiba's Encrypted flash drive

Back to the future: Toshiba touts a USB flash drive with keypad passkey

Toshiba has released a line of USB sticks that contains a 10-digit keyboard to control access to data stored on the device through a PIN. But the new flash drive looks a lot like those produced by other companies as far back as seven...

Confide 3.0

Confide for business users lets you share sensitive docs that then disappear

Starrt-up Confide Inc. offers a Snapchat-style app for the enterprise world.

credit card

It’s time for the chip-and-PIN’ing of America

Credit card security lags in the U.S. We need to change that.

Silk Road operators developed a taste for murder

Chat logs and other digital records entered into evidence in a federal court case Monday detailed how the operators of the infamous Silk Road underground online marketplace planned to have individuals murdered for potentially...

A real bug one a computer monitor full of code

Google to award grants to motivate bug hunters

Google has expanded its bug bounty programs to cover the company's official mobile applications, and is seeking to stimulate vulnerability research on particular products by offering money in advance to bug hunters.

Load More