HackDig : Dig high-quality web security articles for hacker

How to Increase Transparency and Rebuild Trust After a Data Breach

As more companies suffer breaches and leak private data online, it becomes harder for organizations to be transparent and establish trust with their customers. Recent incidents have shown that many experts underestimated the total impact of a data breach in terms of the actual number of users affected and the volume of data made public. Many companies take t
Publish At:2017-10-22 05:00 | Read:252 | Comments:0 | Tags:Application Security Data Protection Incident Response Data

When Responding to a Data Breach, Cooperation Is Nine-Tenths of the Law

In recent years, several high-profile breaches involving customer data have led to long and costly litigations. These events demonstrated that data protection is more than just a cybersecurity concern. When responding to a data breach, legal teams have to work closely with the chief information security officer (CISO) to ensure that security policies, r
Publish At:2017-09-21 19:15 | Read:198 | Comments:0 | Tags:CISO Incident Response Chief Information Security Officer (C

Seeing Data Security Breaches With Your Own Eyes

Although you can never truly predict the unexpected, most security applications attempt to do just that. They use attack models built to defend against security breaches that follow known patterns or model behaviors using a series of assumptions about exceptions. The attacks that do get through expose the uncomfortable truth that determined attackers can sur
Publish At:2017-08-10 20:40 | Read:352 | Comments:0 | Tags:Data Protection Access Management Cost of a Data Breach Data

Eight Myths Not to Believe About Penetration Testing

Penetration testing — the process of trying to break into one’s own system to find vulnerabilities before cybercriminals do — is an integral part of information security. The data gleaned from these evaluations can help companies remediate flaws in their security infrastructure before fraudsters have a chance to expose them. Dispelling Eight Penetratio
Publish At:2017-08-10 20:40 | Read:346 | Comments:0 | Tags:Data Protection Risk Management Data Breaches Penetration Te

Half-Year Roundup: The Top Five Data Breaches of 2017 — So Far

Data breaches aren’t slowing down. If anything, they’re set to break last year’s record pace. As noted by 24/7 Wall Street, the 758 breaches reported this year mark nearly a 30 percent increase from 2016. If cybercriminals keep it up, the total number of attacks could break 1,500 by the end of 2017. Top Five Data Breaches of the First Half
Publish At:2017-07-13 23:10 | Read:717 | Comments:0 | Tags:Data Protection Risk Management Cost of Data Breach Data Bre

Outsider or Insider: Who Will Cause Today’s Data Breach?

In today’s cybercrime landscape, threats come not only from all sides, but also from within. In its annual Threat Intelligence Index, IBM X-Force called 2016 the “year of the mega breach.” As threat actors become more sophisticated, enterprises must deal with outsiders who target corporate networks to steal product, client and customer data
Publish At:2017-07-12 10:20 | Read:471 | Comments:0 | Tags:Data Protection Identity & Access Data Breach Data Breaches

Information and Communication Technology (ICT) Industry: Second-Most Attacked Sector in 2016

The information and communication technology (ICT) industry has evolved greatly over the last several decades. The interconnected nature of ICT devices and systems, along with modern society’s dependence on the technologies and services this sector provides, increases the risk of cyberattack. Furthermore, firms in this industry often act as a clearingh
Publish At:2017-07-10 21:30 | Read:431 | Comments:0 | Tags:Industries Threat Intelligence X-Force Research Buffer Overf

Can You Guess the Cost of a Data Breach in the Asia-Pacific?

The Asia-Pacific is a region of unique contracts — rules, customs, cultures, languages, food and more. However, there is a common thread that glues the region together: On the whole, it is growing. Per capita income is rising, and so is consumerism. Markets are growing at a remarkable rate and show no signs of slowing. Organizations are embracing cloud, mobi
Publish At:2017-07-07 19:55 | Read:360 | Comments:0 | Tags:Data Protection Australia Cost of a Data Breach Data Breach

March was biggest month for compromised data yet with 1.4B exposed email addresses

With over 1.45 billion compromised accounts, emails, social security numbers, dates of birth, and other data types, March was the biggest month for exposed data this year.   Seventeen companies reported data breaches in March, totaling 1,449,373,000 breached accounts. Major companies, including Saks Fifth Avenue, Coupa, and McDonald’s (Canada), experie
Publish At:2017-04-08 06:25 | Read:905 | Comments:0 | Tags:Mobile Tips + Tricks Breach Report Data Breaches

February 2017: Breaches increase, scattered across many industries

Lookout tracks breaches related to companies and services that may impact customers with our Breach Report feature. Breach Report looks at the largest companies globally, and reports on those breaches to provide  customers the most relevant information. It also provides remediation actions to help keep them safe. Interested in getting Breach Report? Upgrade
Publish At:2017-03-09 09:50 | Read:741 | Comments:0 | Tags:Mobile Tips + Tricks Breach Report Data Breaches

Everything you need to know about data breaches in January 2017

Lookout tracks breaches related to companies and services that may impact customers with our Breach Report feature. Breach Report looks at the largest companies globally, and reports on those to give customers the most relevant information to them. It also provides remediation actions to help keep them safe. Interested in getting Breach Report? Upgrade to P
Publish At:2017-02-02 13:00 | Read:909 | Comments:0 | Tags:Mobile Tips + Tricks Breach Report Data Breaches mobile secu

U.S. Top-Ranked Globally in 2016 Data Breaches, Finds Report

The United States takes the number one spot worldwide in data breaches disclosed last year, revealed a new report analyzing breach activity in 2016.Risk Based Security’s annual report released on Wednesday found that the U.S. accounted for nearly half – 47.5 percent – of all incidents, and a whopping 68.2 percent of all exposed records.Close to 2,000 breache
Publish At:2017-01-26 22:25 | Read:1342 | Comments:0 | Tags:Latest Security News Data Breaches US

2016 data breaches: A look back at a big year of data loss

Though we still have a little less than a month left in 2016, this year has proven to be one of the most significant years for breaches. We dove into the data using Breach Report, Lookout’s new feature that tracks and alerts users about such incidents, to bring you a deeper look at what breaches really looked like in 2016. Of course, criminals also put name
Publish At:2016-12-22 16:40 | Read:1250 | Comments:0 | Tags:Security Breach Report Data Breaches

Amazon Denies Data Breach Rumors but Resets User Passwords Just in Case

"Out of an abundance of caution," as every company likes to say these days, Amazon has started resetting passwords for a select list of users who had their personal details exposed online.The company says that nobody breached its servers, but that it took this step after its security staff discovered a set of customer details posted online as part
Publish At:2016-10-13 05:30 | Read:883 | Comments:0 | Tags:Data Breaches

Hacker Steals 58 Million User Records from Data Storage Provider

An unsecured database has allowed at least one hacker to steal data from the servers of Modern Business Solutions (MBS), a company that provides data storage and database hosting solutions.The company has yet to provide an official statement to the press surrounding the incident, but they have secured the vulnerable database against external access.Responsib
Publish At:2016-10-12 11:15 | Read:823 | Comments:0 | Tags:Data Breaches

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud