Type to search
Analyze a fileFree Tools

Blog: data breach

2016 is Here - Are You Set Up for Real Security?

2015 may just go down in history as the year of the hack. 

2015 featured 365 days filled with headlines covering everything from the OPM breach, to Anonymous' latest shenanigans, to mobile vulnerabilities. The breadth and depth of these breaches were both alarming and eye-opening. We saw how an average teenager with basic computer skills can bring down telecom giants and how CCaaS (cyber-crime as a service) has quickly become a booming business. Governments breached other governments and federal agencies had their weaknesses exposed in serious ways. Even gamers and kids weren't safe in 2015. 

read more

8 of the Largest Data Breaches of All Time

There have been 5,754 data breaches between November 2005 and November 2015 that have exposed 856,548,312 records. According to their data, there were 783 breaches in 2014, the largest number of data breaches in a single year to date. Data also indicated that 29% of breaches involved hacking incidents in 2014, compared to just 14.1% in 2007. This shows an upward trend in the number of data breaches resulting from an outside cyber attack. Although this data includes a comprehensive list of data breaches, whether large-scale or small, there are a few that stand out from the rest as some of the worst data breaches in history in terms of resulting costs and the number of records compromised. Below is a list of 8 of the worst breaches in history that highlights the cause of the breach and the effects on the public and business sectors. 

read more

Top 3 Trends in Today’s Threat Landscape

Every day there seems to be a new malware threat that we hear about, from remotely controlling cars and medical equipment, to attacks on well-known security vendors such as Kaspersky Lab and Bitdefender. Each threat seems to be bigger and more destructive than the last. Among this never ending stream of publicized cyber threats and attacks, here are three trends to keep an eye on: 

read more

Get the Facts for All the Latest Data Breaches

Data breaches have been in the news more this year than ever! We are excited to launch a new Data Breach page that will highlight notable breaches. Information available on the page will include the cause of the breach, the number of records or data lost, monetary damages and a solution for how the breach could have been prevented. We believe this page will add value for both our customers as well as others in the industry and will help raise awareness on how breaches happen and will hopefully promote discussions on how they can be prevented in the future. 

 

10 Facts You Need To Know About Data BreachesFuture post

2014 was dubbed as ‘the year of the data breach’. With many new data breaches dominating the headlines in 2015, including Anthem, the White House, banking attacks, and the latest employee data theft at the US federal government, one can only imagine what the name for 2015 will be: the year of even more data breaches?

According to the Ponemon Institute, 43% of companies experienced a data breach in 2014. Not only is the number of data breaches rising, the number of records stolen per breach is increasing as well as the cost per stolen record. It is apparent that current security measures are not sufficient to protect organizations from data breaches.

read more

What Can IT Departments Learn From Hacking Team's Leaked Emails?

Among the revelations coming out of the massive data dump from the Hacking Team breach include emails showing that the FBI purchased services and products from Hacking Team for the purpose of identifying Tor users. With customers all across the world, this isn’t surprising that the FBI is among them. 

Apparently a small unit in the FBI purchased Hacking Team's Remote Control System (RCS), otherwise known as Galileo, as a sort of 'backup' for a primary tool. RCS is an impressive ‘tool’ that provides endpoint telemetry and surveillance of encrypted communications as long as it is installed on the target device.

read more

Introduction: Threat Detection Strategies by IndustryFuture post

With so many different types of threats circulating, it is difficult for network security administrators to find a comprehensive solution for their secure networks. By identifying which threats are the most dangerous to their organization, security administrators can effectively focus their resources where they are needed most. 

4 Reasons Data Breaches are on the Rise

Last week the CyberEdge group released the 2015 Cyberthreat Defense Report that surveyed 800 IT Security professionals on cybersecurity matters. The report states that 71% of respondents’ networks were breached in 2014, up from 62% in 2013. The expectation of further cyber-attacks is also rising: 52% of respondents believe a successful attack is likely in 2015, compared to 39% last year. Phishing, malware, and zero-day attacks were considered to pose the greatest cyber risks to responding organizations.

Kaspersky Discovers Massive Cyber-Attack: Losses Could Reach $1 Billion

Over the weekend, Kaspersky Lab announced details of what may be the largest cyber-attack to date, targeting the banking industry. The breach affected more than 100 banks in 30 different countries worldwide and could total as much as $1 Billion in total losses.

Geolocation of Cybercrimes

Since the 20th century, the Made in America moniker has been associated with higher quality goods when compared to imported alternatives, at least when these goods are targeted at the American consumer. For manufactured or assembled products, it’s hard to know when this label indicates that the product was actually made in the United States. For cyber-attacks, which carry no label, it’s even more difficult to track their origin. This happens for many reasons, the most obvious one being this: Cybercriminals strive to remain anonymous, and their ‘products’ rarely carry telltale signs of their origin.

read more