Email Alerts
-
TJX to pay $9.75 million for data breach investigations
The company agrees to pay legal expenses related to investigations conducted by 41 Attorneys Generals and establish a data security fund for states. Article
-
Man pleads guilty in online banking hacking scam
Defendant schemed with others to steal money from online bank accounts using credentials stolen with malware. News
-
White House cybersecurity czar faces major hurdles
A new cyberczar must reduce interagency squabbles, work with Congress on legislation, but avoid getting bogged down in red tape and bureaucracy, experts say. Article
-
identity theft
According to the Identity Theft Resource Center, identity theft is a crime in which an imposter obtains key pieces of personal information, such as a Social Security number, to impersonate someone else....(Continued) Definition
-
UC Berkeley breach affects 160,000
Hackers gained access to databases in the campuses health services center from Oct. 9, 2008 until April 9, 2009. Article
-
Heartland breach cost $12.6 million, CEO says
In a conference call with investors, Heartland Payment Systems CEO Bob Carr said the breach directly contributed to the company's $2.5 million loss for the quarter. News
-
LexisNexis investigates breach, notifies thousands
Cybercriminals hacked into the LexisNexis database using stolen IDs and passwords and used information from the firm to set up fake credit cards. The USPS is investigating. Article
-
An inside look at security log management forensics investigations
David Strom provides some examples of log data that provided key clues to enterprise data breaches. Tip
-
Senators hear call for federal cybersecurity restructuring
Congress is mulling over whether to give more authority on cybersecurity issues to the Department of Homeland Security or create a new office within the White House. Article
-
Former Federal Reserve Bank employee arrested
An IT analyst and his brother allegedly used stolen data, including sensitive bank employee information, to obtain loans. News
Security Management Strategies for the CIO