iOS app Android app

Data Breach

EMV Credit Card Chips: No Silver Bullet, but a Significant Step Forward in Fraud Reduction

ACM, the Association for Computing Machinery | Posted 01.07.2016 | Technology
ACM, the Association for Computing Machinery

By Steven Myers Associate Professor of Computer Science and Informatics Indiana University With the New Year beginning, we have just come throu...

Uber Settles Investigation Into Creepy 'God View' Tracking Program

The Huffington Post | Kim Bellware | Posted 01.06.2016 | Technology

Uber has agreed to pay a $20,000 penalty and overhaul privacy and security practices to settle the New York attorney general's investigation into a se...

I Refuse to Strategically Vote for Hillary Clinton

Ben Spielberg | Posted 12.21.2015 | Politics
Ben Spielberg

While I understand the lesser-of-two-evils mentality, I disagree with it; most of Clinton's policy positions are unacceptable to me. If Sanders loses the primary, I will probably vote for Jill Stein.

DOJ Pursues Criminal Investigaton Of Data Breach At Uber

Reuters | Mehreen Kasana | Posted 12.18.2015 | Technology

SAN FRANCISCO, Dec 18 (Reuters) - The U.S. Department of Justice is pursuing a criminal investigation of a May 2014 data breach at ride service Uber,...

After Hack, Congress Wants To Know How Vtech Collects Data On Kids

Reuters | Lorenzo Ligato | Posted 12.03.2015 | Technology

U.S. lawmakers on Wednesday asked VTech Holdings Ltd for details about the data it collects on children who use its digital toys, as well as h...

VTech Hack Leaves Millions Of Parents -- And Their Kids -- Exposed

Reuters | Lorenzo Ligato | Posted 11.30.2015 | Technology

The theft of toy maker VTech Holdings Ltd's database highlights a growing problem with basic cyber security measures at small, non-financial companie...

The Not-So-Secret Service: What Your Company Can Learn From the Rep. Chaffetz Scandal

Tom Garrubba | Posted 10.21.2015 | Business
Tom Garrubba

How can your company learn from the U.S. Secret Service's mistakes? Start by developing basic information security guidelines with respect to who can access sensitive data (such as personnel files or other confidential data) within your organization.

Hilton and Trump Hotel Breaches: What You Need to Know

NextAdvisor.com | Posted 10.07.2015 | Travel
NextAdvisor.com

By Jocelyn Baird, NextAdvisor.com If you thought credit card breaches were limited to restaurants and retail stores, you were unfortunately mistaken...

Inside The Hunt For The Uber Hacker

Reuters | Alexandra Ma | Posted 10.08.2015 | Technology

SAN FRANCISCO, Oct 8 (Reuters) - Eight months after disclosing a major data breach, ride service Uber is focusing its legal efforts on learning more ...

4.6 Million Customers Affected in Scottrade Breach: Are You One of Them?

NextAdvisor.com | Posted 10.06.2015 | Business
NextAdvisor.com

October is National Cyber Security Awareness Month, and it's off to a pretty dismal start. Following the Experian breach announcement on Oct. 2 that affected 15 million T-Mobile customers, retail brokerage Scottrade announced it had discovered a breach in one of its systems.

Experian Breach Exposes 15 Million T-Mobile Customers, Applicants' Information: What You Need to Know

NextAdvisor.com | Posted 10.07.2015 | Business
NextAdvisor.com

If you've applied for a T-Mobile phone plan within the past two years, there's a high chance your information may have been breached by Experian -- one of the three major credit bureaus.

Former DHS Director Chertoff: 'You Can't Have Privacy Without Security'

The Huffington Post | Alexander Howard | Posted 10.03.2015 | Technology

If you can’t lock your door, you can’t maintain the privacy of your home. If you can’t encrypt your phone, you can’t keep you...

Don't Collect What You Can't Protect

Christopher Burgess | Posted 10.16.2015 | Technology
Christopher Burgess

The mantra of every corporation should be, "Don't collect what you can't protect." It should matter not if you are the CEO of very large corporati...

Comcast To Pay $33 Million Over Privacy Breach

AP | Alexandra Ma | Posted 09.18.2015 | Technology

LOS ANGELES (AP) -- Cable operator Comcast has settled with California authorities and agreed to pay $33 million for accidentally publishing the name...

The Medical Identity Theft Apocalypse? Fear the Walking Files

Adam Levin | Posted 09.17.2015 | Technology
Adam Levin

Criminal cyber attacks on health care information repositories have increased 125 percent since 2010. With the announcement of the Excellus breach last week, the total number of big-headline medical information compromises reported in 2015 had crossed the mind-blowing demarcation line of 100 million files.

How's Your Data Security? The FTC Now Wants to Know

Gene Marks | Posted 09.02.2015 | Business
Gene Marks

Are you taking "reasonable steps to secure sensitive consumer information"? I certainly hope so. If not, the U.S. government can now come after you.

The Ashley Madison Hack: A Privacy Issue, Not an Adultery Issue

Patrick Ambron | Posted 08.21.2015 | Technology
Patrick Ambron

While on the surface this may seem like a deserved day of reckoning for exposed adulterers, it speaks to a much larger privacy issue that concerns everyone. We live our entire lives online, and our actions there hinge on the promise of privacy.

Top Official Resigns Amid News Of Major Data Breach

Reuters | Posted 07.10.2015 | Politics

WASHINGTON, July 10 (Reuters) - The chief of the U.S. Office of Personnel Management, Katherine Archuleta, is resigning in the aftermath of computer h...

Hackers Stole Social Security Numbers From 21.5 Million People In Recent Data Breach, U.S. Says

Reuters | Posted 07.10.2015 | Politics

WASHINGTON, July 9 (Reuters) - Data breaches at the U.S. government's personnel management agency by hackers, with suspicions centering on China, invo...

Why You Need to Add Third Parties Into Your Business Resiliency Equation

Tom Garrubba | Posted 07.09.2015 | Business
Tom Garrubba

You'll never know where the next "hit" is going to come from, but if or when it does, the efforts brought into it should certainly pay off.

Federal Government Data Breach Being Investigated As National Security Matter

Reuters | Posted 06.05.2015 | Politics

By Andrea Shalal and Matt Spetalnick WASHINGTON, June 5 (Reuters) - Data stolen from U.S. government computers by suspected Chinese hackers include...

This Is Why The Government Needs Better Online Security, Now

Posted 06.04.2015 | Technology

What should have been a trustworthy digital service has been compromised, in the latest sign that the U.S. government can't be relied upon to keep the...

Senate Panel Says Recent White House Data Breach Contained Personal Information

Reuters | Peter Cooney | Posted 05.03.2015 | Politics

WASHINGTON, May 3 (Reuters) - The U.S. Senate Commerce Committee has written President Barack Obama over concerns that a recently reported data breach...

Anthem Hack Exposes 80 Million Individuals: How to Protect Yourself

NextAdvisor.com | Posted 04.08.2015 | Technology
NextAdvisor.com

Health insurance provider Anthem announced late Wednesday, Feb. 4 that it had experienced a massive security breach which exposed the information of up to 80 million of its current and former customers, as well as employees.

POS Breaches in 2015: The Good, the Bad and the Ugly

Joe Ross | Posted 03.16.2015 | Technology
Joe Ross

Take the time to find out when you can receive a debit and/or credit card with chip-and-pin technology from your financial institution. While it likely will get worse before it gets better, merchants and financial institutions are taking baby steps toward a more secure payment future.