Security 500 conference     

 Don’t miss the networking event of the year for security executives!
Register today for the Security 500 Conference.

Items Tagged with 'hacking'

ARTICLES

Tesla Hires Hackers to Increase Vehicle Security

In coming months, Tesla will hire up to 30 full-time hackers whose job will be to find and close vulnerabilities in the sophisticated firmware that controls its cars.


Read More

Computer Scientists Hack Michigan Traffic Lights To Show Security Flaws

With permission from the authorities, a Michigan team conducted an experiment to see whether or not they could hack into traffic light systems around Michigan.

Read More

Albertson's Stores Hacked For Credit and Debit Cards

Hackers have broken into the credit and debit card payment networks at supermarket chains Albertson's and SuperValu.


Read More

Study Says 70% of Internet of Things Smart Devices are Prone to Hacking

A recent study said that almost three-quarters or 70 percent of all Internet of Things (IoT) devices are vulnerable to hacking.


Read More

95% of Successful Security Attacks are the Result of Human Error

According to security researchers at IBM and the Cyber Security Intelligence Index, 95 percent of successful hack attacks or incidents were because of some type of human error.


Read More

Judge Rules FTC can Sue Wyndham over Cyber Security Lapses

A federal judge ruled that the U.S. Federal Trade Commission can sue hotel group Wyndham Worldwide over alleged poor data security.


Read More

Websites of Venetian, Palazzo casinos hacked

Hackers breached the websites of all Las Vegas Sands Corp. websites.


Read More

CNN's Social Media Accounts Hacked

Some of CNN's social media accounts and blogs have been hacked.


Read More

House Democrats Want Probe into Target Card Breach

Democratic lawmakers called for a congressional inquiry into the hacking of credit and debit card data of Target customers.


Read More

Neiman Marcus Reports CyberSecurity Breach

Retailer Neiman Marcus said that thieves stole some of its customers' payment card information and made unauthorized charges over the holiday season.

Ginger Reeder, spokeswoman for Dallas-based Neiman Marcus Group Ltd., said in an email that the retailer had been notified in mid-December by its credit card processor about potentially unauthorized payment activity following customer purchases at stores, said AP. On Jan. 1, a forensics firm confirmed evidence that the upscale retailer was a victim of a criminal cyber-security intrusion and that some customers' credit and debit cards were possibly compromised as a result, said AP.

Reeder wouldn't estimate how many customers may be affected but said the merchant is notifying customers whose cards it now knows were used fraudulently. Neiman Marcus, which operates more than 40 upscale stores and clearance stores, is working with the Secret Service on the breach, said AP.

"We have begun to contain the intrusion and have taken significant steps to further enhance information security," Reeder wrote.


Read More

EVENTS

Industry

The Amphion Forum

3/28/12
Hotel Bayerischer Hof
Promenadeplatz 2-6
Munich
Germany
Contact: Dan Brown

The Amphion Forum (www.amphionforum.com) is taking place 28 March in Munich, and will feature a wide variety of experts in securing the "Internet of Things", or any device that connects to the internet but is not a PC.

Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

Security Magazine 2014 September cover

2014 October

Security takes a look at safety and preparedness for the harshest of weather phenomena in this October 2014 edition of the magazine. Also, we investigate supply chain security and the many benefits of PSIM. 

Table Of Contents Subscribe

Travel & the Ebola Risk

Are you and your enterprise restricting travel due to Ebola risks?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.