Data Security

Data security news, trends, analysis and practical advice

Web attack silently modifies DNS configurations in routers
Checking mobile phone


Inside the head of your company’s cyber traitor

Employers misjudge how potential insider cyberattackers will judge the risks and payoffs from their crimes.

Security (3)

Tired of memorizing passwords? A Turing Award winner came up with this algorithmic trick.

Passwords are a bane of life on the Internet today, but one Turing Award winner has an algorithmic approach he thinks could make them not only easier to manage but also more secure.

A new version of the sophisticated Duqu malware is used for spying

Russia, China said to use hacked databases to find U.S. spies

Russian and Chinese cyberspying units are reportedly cross-checking hacked databases to identify U.S. intelligence operatives.

Global economic/technology prospects: China and the United States of America

U.S. readies sanctions against China for cyberspying

Experts question whether the penalties on Chinese companies for economic cyber espionage will have a significant effect.

shadow it

The security and risk management of shadow IT

Shadow IT brings many security issues, but since these systems are not on IT's radar, they do not get factored into overall risk management strategy. Here are some practical suggestions.

avid life media

Ashley Madison data dump reveals emails, source code for websites

The woes of’s owners continued, with a second release of internal data that security experts suspect is authentic.

Ashley Madison data dump

Ashley Madison sex-cheat data -- it's FAR worse than you think

Ashley Madison hackers released the site's user data, as threatened. Or, at least, that's what they say they've done. But it's likely that much of the data is forged or bogus in some way...

IRS says data breach was worse than thought

The cyberattack on U.S. taxpayer data reported by the IRS earlier this year now appears to be much worse than originally thought, the agency said Monday.

equations on chalkboard 87173350

How college CIOs brace for back-to-school (with video!)

Enterprise IT stands to learn a lot from higher-ed CIOs, who are on the front lines in tackling demands for connectivity, service, security and innovation.

emv chip and pin

FAQ: What you need to know about chip-embedded credit cards

The conversion process from older magnetic stripe cards to chip-embedded credit and debit cards has sped up in recent months because of an Oct. 1 deadline. That's the day when liability for credit card fraud will shift from banks to...

Carphone Warehouse hack

A Warehouse of Carphones? What is this, Back To The Future?

Millions of Carphone Warehouse customers' data got hacked last week. But we're only now hearing about it. The British mobile retailer is 'sorry'...

Windows 10

Windows 10 hardening and enterprise security

Windows 10 incorporates a number of promising additional features that will greatly benefit corporate security officers in their attempts to secure and lock down their environments. These features come at a price, however, involving...

data breach thinkstock

ICANN resets passwords after website breach

The overseer of the Internet's addressing system said that someone obtained information related to user accounts for its public website, although no financial information was divulged.

United Airlines

OPM, Anthem hackers may also have breached United Airlines

The cyberespionage group that stole the personal records of millions of Americans from U.S. health insurer Anthem and the U.S. Office of Personnel Management has also reportedly breached United Airlines.

breach bucket

Closing the data floodgates

The unauthorized disclosure of sensitive and controlled data is a major issue for businesses today. Data loss prevention is a relatively new class of products that attempt to monitor common communication channels for the presence of...

hillary clinton

More questions raised about Hillary Clinton emails

A government review has concluded that Hillary Clinton sent classified information through a personal email account while she served as secretary of state, The Wall Street Journal reported.

military laser experiment

When the good guys are wielding the lasers

Lasers can be used to steal sensitive data, even over long distances. New research at MIT shows that they can also be used to protect data.

phishing attempt

Thanks for all the phish

Verizon, in its 2015 Data Breach Investigation Report, found that for three years running, phishing attacks were a part of over two-thirds of cyber-espionage incidents. Since a single user click can start a chain of events resulting...

Load More