Security Breaches

Showing page 3 of 6 pages.

  • Will Yahoo Fall Victim to the Next MegaBreach?

    Yahoo was tipped to a possible data breach this week after a hacker named ‘Peace’ listed 200 million Yahoo user name and password combinations for sale on the dark web. While the company has confirmed it’s investigating, what should Yahoo users be doing? At this point, proactive measures can’t hurt and sitting around waiting for […] Read more

  • Companies Can’t Detect Most Data Breaches

    It’s natural to think that a company that loses your data will let you know. There’s just one major sticking point—the firm has to detect the breach first. A recent study indicates that detection is still elusive even when the company’s core assets are at stake. According to a new study by the Ponemon Institute, […] Read more

  • Wendy’s Data Breach: Is Your Store on the List?

    The recent credit card data theft at numerous Wendy’s locations in the U.S. is not what you’d call breaking news. Word of this breach first surfaced several months ago, but now, the company has revised the size of the breach and admitted that over 1,000 locations were hit — an increase of 325% over original […] Read more

  • Glassdoor Data Breach Hits Users is a website that seeks to match workers with job openings. It also gives employees a chance to provide anonymous company reviews. On Friday, however, the company inadvertently shared their users’ emails with other enrollees when they sent an update of the company’s terms of use. The result was an instant data leak. While […] Read more

  • Are Educators Retaining Too Much Student Data?

    Which documents would you rather have hacked – your current medical files or your 10-year-old college records? Hackers apparently love those old college files, and that’s created a recent surge in hacks on educational institutions. The reasons are numerous, but one key factor is that colleges and universities often stockpile student data for decades. In […] Read more

  • Congratulations, Graduate! Time for a Data Protection Plan.

    Congratulations on your graduation. You made it! School’s done and that piece of (fake) sheepskin is firmly in hand — or at least in the mail. Savor the day but don’t relax yet. Hackers are gearing up to grab your identity. “Do you have a job yet?” is the question most friends and relatives will […] Read more

  • Authentic-Looking Email Scam Harvests Hundreds of W-2s at a Time

    Be on the lookout for an email scam that appears to come from one of your company executives, requesting every employee’s 2015 W-2 form. For busy people, a hot email from a senior executive triggers a response right away. The cybercriminals behind the W-2 email scam are counting on that. You can see how this could trick somebody into sharing hundreds […] Read more

  • Mark Zuckerberg Hacked. Are You Next?

    As researchers sift through the mass of passwords publicly disclosed in the LinkedIn and MySpace hacks announced last month, hackers have been busy too. Now one well-known name has bubbled to the top of the victim list and data security experts are taking him to task for poor security practices. Facebook CEO Mark Zuckerberg’s Twitter […] Read more

  • MySpace, Tumblr, and Why Not All Breaches Make The News

    Move over, LinkedIn data breach. MySpace just smashed your brief reign as the largest (known) data breach in history. MySpace will force a password reset for 360 Million users as a result of disclosure from, a data-tracking site. The size of the breach – over 360 Million users – toppled LinkedIn’s notification to 167 […] Read more

  • Lessons Learned, Big Changes Coming as LinkedIn Breach Adds 160 Million Victims

    The biggest headache for data security bloggers is usually the challenge of determining the size of a data breach. Hacked companies will often go to great lengths to disguise these indicators or steadfastly deny requests for real statistics, but eventually, the actual numbers usually rise to the surface. Few bring quite the surprise that an […] Read more

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Follow us on Twitter

Follow us on LinkedIn