Items Tagged with 'hacking'

ARTICLES

95% of Successful Security Attacks are the Result of Human Error

June 19, 2014

According to security researchers at IBM and the Cyber Security Intelligence Index, 95 percent of successful hack attacks or incidents were because of some type of human error.


Read More

Judge Rules FTC can Sue Wyndham over Cyber Security Lapses

April 8, 2014

A federal judge ruled that the U.S. Federal Trade Commission can sue hotel group Wyndham Worldwide over alleged poor data security.


Read More

Websites of Venetian, Palazzo casinos hacked

February 11, 2014

Hackers breached the websites of all Las Vegas Sands Corp. websites.


Read More

CNN's Social Media Accounts Hacked

January 23, 2014

Some of CNN's social media accounts and blogs have been hacked.


Read More

House Democrats Want Probe into Target Card Breach

January 13, 2014

Democratic lawmakers called for a congressional inquiry into the hacking of credit and debit card data of Target customers.


Read More

Neiman Marcus Reports CyberSecurity Breach

January 11, 2014

Retailer Neiman Marcus said that thieves stole some of its customers' payment card information and made unauthorized charges over the holiday season.

Ginger Reeder, spokeswoman for Dallas-based Neiman Marcus Group Ltd., said in an email that the retailer had been notified in mid-December by its credit card processor about potentially unauthorized payment activity following customer purchases at stores, said AP. On Jan. 1, a forensics firm confirmed evidence that the upscale retailer was a victim of a criminal cyber-security intrusion and that some customers' credit and debit cards were possibly compromised as a result, said AP.

Reeder wouldn't estimate how many customers may be affected but said the merchant is notifying customers whose cards it now knows were used fraudulently. Neiman Marcus, which operates more than 40 upscale stores and clearance stores, is working with the Secret Service on the breach, said AP.

"We have begun to contain the intrusion and have taken significant steps to further enhance information security," Reeder wrote.


Read More

NSA Can Spy on Offline Computers Wirelessly

December 31, 2013

An independent security expert says that the NSA could turn iPhones into eavesdropping tools and use radar wave devices to harvest electronic information from computer even if they weren't online.


Read More

40 Million Credit Cards Compromised at Target

December 19, 2013

Shoppers who used credit cards or debit cards at Target between November 27 and December 15, 2013 may have been hacked.


Read More

2 Million Facebook, Gmail and Twitter Passwords Stolen in Massive Hack

December 4, 2013

Hackers have stolen usernames and passwords for nearly two million accounts at Facebook, Google, Twitter, Yahoo and others.


Read More

Washington Post Site Hacked

August 15, 2013

The Washington Post acknowledged that a sophisticated phishing attack against its newsroom reporters led to the hacking of its Web site, which was seeded with code that redirected readers to the Web site of the Syrian Electronic Army hacker group.


Read More

EVENTS

The Amphion Forum

3/28/12
Hotel Bayerischer Hof
Promenadeplatz 2-6
Munich
Germany
Contact: Dan Brown

The Amphion Forum (www.amphionforum.com) is taking place 28 March in Munich, and will feature a wide variety of experts in securing the "Internet of Things", or any device that connects to the internet but is not a PC.

Read More

Multimedia

Videos

Image Galleries

ASIS 2013 Product Preview

ASIS International 59th Annual Seminar and Exhibits, September 24-27 in Chicago, Illinois, will include an exhibit hall packed with innovative security solutions. Here are some of the products that will be shown at ASIS this year.

Podcasts

Virtualization and Data Center Security: What You Need to Know for 2014

Data centers are increasingly becoming the center of the enterprise, and data center and cyber security is following the same path for security departments. According to Justin Flynn, a consultant at the Burwood Group, the virtualization of data centers allows enterprises to scale more easily and faster, with a smaller footprint.

However, hosting enterprise data in the cloud can make intrusion detection more difficult – how can enterprise security leaders team up with other departments to keep aware of cyber risks and traffic, and physical and data compliance during the virtual transition? How can CISOs and CSOs discuss cyber threats with the C-Suite to get the resources they need? And how can the proper infrastructure test and verify possible malicious attacks? 

More Podcasts

Security Magazine

July 2014

2014 July

In the July issue of Security Magazine, read about how the NFL is balancing security with fan experience to make sure sporting events are running smoothly. If you're doing any traveling this summer, be sure to read the 5 hot spots for business travel security, also, employers can track on-the-go employees with new mobile apps. Also, check out the latest news and industry innovations for the security industry.

Table Of Contents Subscribe

Adopting New Technology

How long do you wait before adopting a new technology?
View Results Poll Archive

THE SECURITY STORE

comptiahighriseproductphoto
CompTIA Security+ Certification Study Guide
CompTIA's Security+ certification is a globally-recognized, vendor neutral exam that has helped over 60,000 IT professionals reach further and higher in their careers. The current Security+ exam (SY0-201) focuses more on being able to deal with security issues rather than just identifying them.
More Products

Clear Seas Research

Clear Seas ResearchWith access to over one million professionals and more than 60 industry-specific publications,Clear Seas Research offers relevant insights from those who know your industry best. Let us customize a market research solution that exceeds your marketing goals.

Vertical Sector Focus: Critical Infrastructures

criticalhomepagethumbFrom terrorism to vandalism, it’s preparedness, response, training and partnerships. Learn about some of the critical security issues facing this sector.

Visit the Critical Infrastructure page to read more.  

STAY CONNECTED

Facebook 40px 2-12-13 Twitter logo 40px 2-12-13  YouTube  LinkedIn logo 40px 2-12-13Google+