Enhanced threat detection: The next (front) tier in security

Identity Theft and Data Security Breaches

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Data breach procedures to stop Gawker-type Web password security leaks

    Following its recent security breach, Gawker.com has promised to boost its security, but, in this tip, threats expert Nick Lewis looks at what the site could've done to pre-empt the breach in the first place. 

  • Gawker data breach exposes passwords, email addresses

    The email addresses and encrypted passwords of more than 1.3 million users were made publicly available by a hacking group calling themselves "Gnosis." 

  • parameter tampering

    Parameter tampering is a form of Web-based hacking event (called an attack) in which certain parameters in the Uniform Resource Locator (URL) or Web page form field data entered by a user are changed without that user's authorization... (Continued) 

  • PCI encryption requirements driving widespread adoption, survey finds

    Encryption has become generally accepted in the industry, said Larry Ponemon, founder of the Ponemon Institute LLC. 

  • privilege escalation attack

    A privilege escalation attack is a type of network intrusion that takes advantage of programming errors or design flaws to grant the attacker elevated access to the network and its associated data and applications. 

  • Privacy advocate explains why people should care about privacy

    An all out assult on privacy is taking place and some people are failing to see the problem, said Tracy Ann Kosa, a privacy impact assessment specialist with the government of Ontario. 

  • Midmarket financial firms grapple with internal, external security threats

    Midmarket financial firms, struck hard by global economic concerns, are facing a challenging threat environment while trying to trim operational costs – a process that is putting further strain on IT security professionals. 

  • University data breach stats show more data losses

    With data losses mounting, universities are paying a big price for stolen information, according to a new report. A more proactive approach to security can mitigate the problem. 

  • bot worm

    A bot worm is a self-replicating malware program that resides in current memory, turns infected computers into zombies (or bots) and transmits itself to other computers. A bot worm may be created with the ultimate intention of creating a botnet that ... 

  • Black Hat: Targeted network security attacks beating forensics efforts

    Targeted, persistent attacks are supported by a great deal of automation and new functionality that is having little difficulty bypassing traditional security defenses and forensic investigations, two researchers revealed at the Black Hat Briefings.