Data Breaches News
-
Chinese Attackers Infiltrate Defense Contractor, Steal Sensitive Military Technology
12:14 PM EST Fri. May. 03, 2013
The QinetiQ attackers were persistent, remaining on the systems at one point for 251 days, accessing more than 150 computers and stealing 20 GB of data before they were detected, according to reports. -
The Top 5 Causes Of Corporate Data Breaches (Video)
2:30 PM EST Thu. May. 02, 2013
Verizon's new security report explains how businesses can avoid and minimize the risk of major data breaches. -
5 Ways To Avoid A Stolen Password Pitfall
1:00 PM EST Thu. May. 02, 2013
Avoiding having your email or Facebook account hijacked or bank account drained takes a little work, but following these steps can greatly reduce the risk. -
WhiteHat: Almost All Websites Have One Serious Coding Error
12:22 PM EST Thu. May. 02, 2013
WhiteHat's latest report analyzes data from websites at more than 650 organizations that are monitored by the firm's Sentinel application security platform. -
Breach Stats Prompt Need For Vulnerability, Configuration Assessment: Report
7:40 PM EST Wed. May. 01, 2013
Enterprises need to focus on vulnerability and configuration weaknesses that are consistently being targeted by attackers, according to security experts. -
New Amazon Blog Tackles Web Services Security Concerns
11:38 AM EST Tue. Apr. 30, 2013
Amazon Web Services' security has been under scrutiny after a new study finds the complexity of managing Amazon S3 opens up security weaknesses that potentially expose confidential data. -
DDoS Attacks Behind Unauthorized Wire Transfers, ACH Fraud: Report
5:47 PM EST Mon. Apr. 29, 2013
Security researchers at Dell SecureWorks have found that short-lived DDoS attacks against banks could be a precursor to an unauthorized wire transfer. -
LivingSocial Data Breach Affects Millions
10:05 AM EST Mon. Apr. 29, 2013
LivingSocial, which localizes daily deals, events, restaurant listings and merchandise, revealed a data security breach late Friday, informing at least 50 million users that some customer data was accessed. -
Box Brings In Former Symantec, Yahoo Execs To Ramp Up Security, Trust
5:58 PM EST Thu. Apr. 25, 2013
Box hires former security executives from Yahoo and Symantec in its bid to bolster trust with customers and encourage enterprise adoption. -
Verizon Analysis: Top 10 Causes Behind Data Breaches
12:00 PM EST Wed. Apr. 24, 2013
Attackers are stealing account credentials and bypassing security systems as valid users, according to Verizon's analysis of 621 breaches that occurred in 2012. -
Microsoft Security Tool Helps Slam The Door On Attacks, Says Researcher
10:55 AM EST Tue. Apr. 23, 2013
Microsoft's Enhanced Mitigation Experience Toolkit can make it much more difficult for attackers to gain an initial foothold into corporate systems, says a Verizon security researcher. -
Verizon Data Breach Report Finds Employees At Core Of Most Attacks
8:00 PM EST Mon. Apr. 22, 2013
Attackers are choosing the least sophisticated methods, often turning to phishing attacks and stolen account credentials, to gain a foothold into corporate networks, according to the 2013 Verizon Data Breach Investigations Report. -
McAfee Channel Chief Unveils Program Changes, Adds Partner Support (Video)
4:36 PM EST Thu. Apr. 18, 2013
In a wide-ranging interview, McAfee Channel Chief Gavin Struthers said the channel program has been retooled to include an improved partner portal, more outreach and support of sales initiatives. -
5 Lessons In How Not To Handle A Security Breach
4:00 PM EST Tue. Apr. 16, 2013
These five data security breaches illustrate the need for an effective incident response plan and a skilled crisis communications team. And how a lack of those skill sets can make things worse. -
Varnex: Updated HIPAA Guidelines Mean Changes For VARs
6:48 PM EST Mon. Apr. 15, 2013
VARs need to sign business associate contracts with their healthcare clients, and they also must sign any company they work with around patient data, such as a colocation company or backup storage provider, to business associate contracts. -
Not Playing Nice: Chinese Hacker Gang Has Their 'Game' Face On
12:45 PM EST Thu. Apr. 11, 2013
Financially motivated cybercriminal gang is targeting online gaming companies, according to new research from Kaspersky Lab. -
5 Essential Steps To Effective Data Breach Notification
6:00 PM EST Wed. Apr. 10, 2013
Having an incident response plan and ongoing training in the event of a breach is core to appropriately notifying those impacted by a data breach. -
Virtual Instruments Leads The Performance Management Charge (Video)
3:37 PM EST Tue. Apr. 09, 2013
John W. Thompson talks about this new company, Virtual Instruments, and how it's ensuring the optimal performance of applications housed in virtual and cloud-based environments. -
Former Symantec CEO: 'We Did The Best Job We Could But Not The Best Job Possible'
4:42 PM EST Fri. Apr. 05, 2013
Former Symantec CEO John W. Thompson says the aim was true on the security-storage vision behind the blockbuster $11 billion Symantec-Veritas merger in 2005, but the execution could have been better. -
Where's The Talent? 10 Ways The IT Security Job Landscape Is Changing
12:00 PM EST Fri. Mar. 29, 2013
There's an IT security workforce shortage, according to a recent report, and the current business climate, shortcomings in executive knowledge and a lack of trained security pros are to blame. Here are 10 key insights into the changing IT security job landscape. -
Cybercriminals Using Evernote As Drop-Off Point For Stolen Information
11:15 AM EST Thu. Mar. 28, 2013
The popular note-taking application is the perfect way for cybercriminals to hide their tracks, according to analysis by Trend Micro. -
Amazon S3 Users Exposing Sensitive Data, Study Finds
5:21 PM EST Wed. Mar. 27, 2013
A random sample of Amazon S3 Public Bucket files analyzed by Rapid7 found more than 40,000 visible files, many of which contained sensitive data. -
Palo Alto Pinpoints Older Ports That Are Letting In Malware
12:05 PM EST Mon. Mar. 25, 2013
Web browsing is the source of most malware infections, but malicious traffic traveling over FTP and other nonstandard ports is being missed by many firms, according to a new study by Palo Alto. -
Channel Beat: A New Buyout Offer For Dell (Video)
10:55 AM EST Fri. Mar. 22, 2013
This week's episode of Channel Beat looks at The Blackstone Group's new buyout offer for Dell, plus a Facebook scam, and a proposed IT services tax in Massachusetts. -
Microsoft Releases Law Enforcement Disclosure Report On Cloud Data
4:44 PM EST Thu. Mar. 21, 2013
Microsoft released information on more than half of the requests made by U.S. Law enforcement.
CRN Vault
CRN's 30th AnniversaryIn our special report, we reflect on the changes in technology and take a trip down memory lane as we reminisce on the companies and personalities that shaped the industry over the past three decades.
CHANNEL SERVICES >>
| • |
| • |
| • |
| • |
| • |
| • |
| • |
|
|


