Top 10 Data Security Breaches in 2012
Healthcare Finance News
Initially, the number of those affected stood at 24000, yet, according to UDOH, that number grew to 780000, with Social Security numbers stolen from approximately 280000 individuals and less-sensitive personal data stolen from approximately 500000 …
Computer Attack on Iran Adds Urgency to Cybersecurity Efforts
The Hill
By: Brendan Sasso
Top administration officials, such as National Security Agency Director Keith Alexander and Homeland Security Secretary Janet Napolitano, have long argued that the nation is at risk of suffering a devastating cyber attack.
LinkedIn Breach Exposes Light Security Even at Data Companies
New York Times
By: Nicole Perlroth
What has surprised customers and security experts alike is that a company that collects and profits from vast amounts of data had taken a bare-bones approach to protecting it. The breach highlights a disturbing truth about LinkedIn’s computer security:
A Cybersecurity Treaty Is a Bad Idea
U.S. News & World Report
By: James Lewis
Countries recognize that there is increasing risk that cyber incidents like Flame could lead to misperception or miscalculation that could escalate into more damaging conflict. But a treaty? Kellogg Briand is still in force and there has never been a …
9 Best Practices For Hospital Data Security in a “Bring Your Own” Era
Becker’s Hospital Review
By: Kathleen Roney
The mobility of patient data – made possible by new technologies and the proliferation of mobile devices in the workplace – is a leading factor in data breaches. According to Kroll Advisory Solutions’ “2012 HIMSS Analytics Report: Security of Patient …
Hackers Take Protest to Indian Streets and Cyberspace
Wall Street Journal
By: Shreya Shah
This is how the group attacks Web sites: It overwhelms them with thousands of requests from different computer systems simultaneously. The Web site is unable to handle the load and crashes. The group intensified its attacks after Internet Service …
Cyber Warfare
Jerusalem Post
By: JPost Editorial
And since cyber weapons can be deployed anonymously from a distance, the aggressor often does not risk political fallout let alone absorbing a retaliatory attack. Indeed, cyber warfare seems so bloodless and “clean” that there hardly appear to be any …
How Small Businesses Can Avoid a Data Security Disaster Like LinkedIn’s
Washington Post
By: John Sileo
If your business data is breached, you will need help, which is why you should consider subscribing to a fraud and identity protection service such as EZShield Business Identity Restoration, offered by Deluxe Security Solutions. When set up in advance, …
The Secret Ways of Hackers
CNBC
By: Tomer Teller
Gone are the days where hackers were plying their trade for fun. In today’s cyber underworld, the motivation for attackers largely revolves around getting their hands on credit card numbers, email credentials, logins for banking sites and other …
Leave a comment
You must be logged in to post a comment.