Identity Theft and Data Security Breaches

Identity Theft and Data Security Breaches News

  • September 09, 2014 09 Sep'14

    Home Depot confirms data breach began in April

    The home improvement retailer confirms its customers' payment card data was breached in an incident that is believed to have begun in April, likely compromising millions of card accounts.

  • September 09, 2014 09 Sep'14

    Home Depot confirms data breach began in April

    The home improvement retailer confirms its customers' payment card data was breached in an incident that is believed to have begun in April, likely compromising millions of card accounts.

  • September 05, 2014 05 Sep'14

    Goodwill breach highlights need for service provider due diligence

    News roundup: The recent Goodwill security breach has been blamed on a third-party service provider, highlighting the need for due diligence. Plus: Mobile device theft; Android app vulnerabilities and a 12-year-long cyber-espionage network.

  • September 04, 2014 04 Sep'14

    Card trail shows Home Depot data breach could be huge

    The reported Home Depot data breach may have affected stores nationwide over the course of several months if new data proves to be correct.

View All News

Identity Theft and Data Security Breaches Get Started

Bring yourself up to speed with our introductory content

  • synthetic identity theft

    Synthetic identity theft is the fraudulent use of stolen personally identifiable information (PIF) that is combined with made-up details to create a false identity. The thief may steal an individual's social security number, for example, and use it ... Continue Reading

  • medical identity theft

    Medical identity theft is the illegal access and use of someone’s personally identifiable information to fraudulently obtain medical service, prescription drugs or medical insurance coverage. The types of information stolen can include name, social ... Continue Reading

  • rainbow table

    A rainbow table is a listing of all possible plaintext permutations of encrypted passwords specific to a given hash algorithm. Rainbow tables are often used by password cracking software for network security attacks. Continue Reading

View All Get Started

Evaluate Identity Theft and Data Security Breaches Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Identity Theft and Data Security Breaches

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Identity Theft and Data Security Breaches Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close