Macys.com checkout page hacked; customers advised to be vigilant of fraud

Macys.com checkout page hacked; customers advised to be vigilant of fraud

American department store chain Macy’s has suffered an embarrassing data breach where hackers gained access to customers’ personal and financial information, including credit card numbers and even card security codes. In a ...
IT

Security Threats Are Swamping IT

Spiraling costs and a lack of skilled cybersecurity professionals are putting pressure on IT teams—and it shows When I think of IT departments and cybersecurity, I’m reminded of the fable of the ...
Security Boulevard

Combatting the Accidental Insider Data Leakage Threat

| | Data breach, insider threat
Cybercrime has rapidly become the world’s fastest growing form of criminal activity, and is showing no sign of slowing down with the number of attacks on businesses rising by more than 50% ...

Only after running out of hard disk space did firm realise hacker had stolen one million users’ details

Yet another company has been found lacking when it comes to securing its consumers’ data. Utah-based InfoTrax Systems provides back-end services to multi-level marketing companies (MLMs) such as dōTERRA, ZanGo, and LifeVantage, ...

For Caught in the Crossfire of Cyberwarfare

Authored by Dr Sandra Bell, Head of Resilience Consulting EMEA, Sungard Availability Services PDF edition of this articleThe 2019 National Cyber Security Centre’s (NCSC) Annual Review does not shy away from naming ...
Solara Medical Supplies Notifying Individuals Affected by Data Breach

Solara Medical Supplies Notifying Individuals Affected by Data Breach

Solara Medical Supplies, LLC (“Solara”) revealed that it’s in the process of notifying individuals potentially affected by a data breach. On November 13, Solara stated that it had learned of a security ...
Twitter Saudi

Twitter and the Saudi Computer Crime – Or Was It?

What the two Twitter employees’ actions in accessing user data for use by the Saudi Kingdom was not technically a criminal offense On Nov. 7, the United States Department of Justice (DoJ) ...
Security Boulevard

Why Cybersecurity Breach Survivors are Valued Assets

Guest article By Ewen O’Brien, VP of Enterprise, EMEA at BitSightNo one wants to talk about their failures, especially in the cybersecurity realm where the stakes are high. But new insight from ...
Automated Sensitive Data Leak Detection

Automated Sensitive Data Leak Detection

The average multinational spends several million dollars a year on compliance, while in highly regulated industries — like financial services and defense — the costs can be in the tens or even hundreds of millions. Despite ...

Why CFOs Must be Involved in Cybersecurity

Taking cybersecurity seriously is far from being exclusively an IT department issue. Given the impact that a breach can have on the whole company, it's critical every department takes some level of ...
Loading...