Identity Theft and Data Security Breaches

Identity Theft and Data Security Breaches News

  • April 14, 2015 14 Apr'15

    Sony Pictures hack used easily available malware, destroyed computers

    A '60 Minutes' interview Sunday revealed that not only did Sony Pictures fall victim to well-known, off-the-shelf malware, but that the attackers also destroyed thousands of computers and servers after stealing the data.

  • April 14, 2015 14 Apr'15

    Verizon DBIR 2015 tackles data breach cost predictions

    In its 2015 Data Breach Investigations Report, Verizon debuts data breach cost estimates based on newly available data, and also advocates for better threat intelligence sharing among different industries facing common threats.

  • April 10, 2015 10 Apr'15

    Tech, security M&A activity booms thanks to mobile, cloud

    News roundup: Technology and security acquisitions have seen some healthy activity in 2015, driven by two key trends. Plus: 75% of users aren't vulnerable to Heartbleed?; White House hack tied to phishing; first state digital ID law.

  • March 20, 2015 20 Mar'15

    At 2015 Pwn2Own competition, browser exploits in the spotlight

    News roundup: Researchers at the 2015 Pwn2Own exploited every major Web browser, casting doubt on browser security once again. Plus: high-severity OpenSSL update; IE being phased-out in Windows 10; Americans dodging online surveillance.

View All News

Identity Theft and Data Security Breaches Get Started

Bring yourself up to speed with our introductory content

  • rainbow table

    A rainbow table is a listing of all possible plaintext permutations of encrypted passwords specific to a given hash algorithm. Rainbow tables are often used by password cracking software for network security attacks. Continue Reading

  • POS malware (point-of-sale malware)

    Point-of-sale malware (POS malware) is malicious software expressly written to steal customer payment data -- especially credit card data -- from retail checkout systems. Criminals often purchase POS malware to steal customer data from a retail ... Continue Reading

  • breach detection system (BDS)

    Breach detection systems (BDS) are a category of applications and security devices designed to detect the activity of malware inside a network after a breach has occurred. Enterprise IT uses BDS to protect against the variety of advanced threats, ... Continue Reading

View All Get Started

Evaluate Identity Theft and Data Security Breaches Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

Product Reviews

Powered by IT Central Station View All Evaluate

Manage Identity Theft and Data Security Breaches

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Identity Theft and Data Security Breaches Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close