Critical.
Authoritative.
Strategic.
Subscribe to CIO Magazine »

data breach - News, Features, and Slideshows

data breach in pictures

News about data breach
  • Shellshock flaw could pose risks to payments industry

    By Jeremy Kirk | 01 October, 2014 10:30

    The "Shellshock" flaw has the potential to pose a risk to the payments industry, but doesn't appear to have caused any problems yet, an official with a consortium run by major credit card companies warned on Tuesday.

  • EPIC seeks enforcement action over Arizona data breaches

    By Jeremy Kirk | 30 September, 2014 15:09

    A privacy watchdog filed a complaint with the Federal Trade Commission against a community college district in Arizona that lost the personal data of 2.5 million students and employees in two data breaches.

  • Second cyberattack hits SuperValu grocery stores' payment systems

    By Martyn Williams | 30 September, 2014 08:28

    SuperValu, the grocery store operator hit by a cyberattack in June and July, has suffered a second attack on its payment processing system, it said Monday.

  • Data Breaches Rise as Cybercriminals Continue to Outwit IT

    By George V. Hulme | 29 September, 2014 23:08

    Online criminals remain at least one step ahead of many IT groups, according to this year's "U.S. State of Cybercrime Survey," conducted annually by CSO magazine, the Secret Service, the Software Engineering Institute at Carnegie Mellon University, and PricewaterhouseCoopers. Deterrence and detection are both falling short of their goals: The 500 survey respondents faced an average of 135 security incidents last year, and 34 percent say that number was up compared to the previous year. Just one-third of respondents could estimate losses from their breaches; among those who could, the breaches cost $415,000, on average. Legal liabilities and lawsuits after breaches add to the costs.

  • Two scenarios that would make OS X vulnerable to the Shellshock bug

    By Jeremy Kirk | 29 September, 2014 12:05

    Apple's OS X is vulnerable to the Shellshock bug, but it's not that easy for attackers to take advantage of it, according to Intego, which specializes in security software for the operating system.

Tutorials about data breach
  • How to protect yourself against privileged user abuse

    By By Michael Crouse | 28 June, 2014 04:12

    The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.

  • Six ways to prevent a breach like the one at AT&T

    By Antone Gonsalves | 18 June, 2014 22:42

    A data breach like the one recently reported by AT&T demonstrates that security policies alone are only a paper tiger without the technological teeth to make sure they are enforced, experts say.

  • How to Test the Security Savvy of Your Staff

    By Kim Lindros and Ed Tittel | 24 February, 2014 13:58

    How do you know your employees retain what you teach them in company-required security awareness training? You don't -- unless you regularly test their security savvy and effectively address their mistakes during post-test follow-up sessions.

Features about data breach
  • Sorriest technology companies of 2014

    By Bob Brown | 30 September, 2014 01:11

    It's so far been another sorry, sorry year in the technology industry, with big name companies, hot startups and individuals making public mea culpas for their assorted dumb, embarrassing and other regrettable actions.

  • CIO Discovers the 'Terrifying' Reality of Cloud Apps Running Wild

    By Tom Kaneshige | 10 May, 2014 03:38

    Rogue cloud services are ripping gaping holes in the security fabric of most companies, putting the CIO in a tough spot. But as the fallout from the Target attack shows, IT and business leaders will go down together if the breach hits the fan.

  • 'HoneyDocs' lays irresistible bait for hackers

    By Jeremy Kirk | 17 September, 2013 12:01

    Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.

  • IT Concerns About Targeted Malware Rising

    By Thor Olavsrud | 28 March, 2013 13:30

    IT and security professionals are increasingly concerned about targeted malware and data breaches. What's worse is that their confidence in their ability to identify and stop them is waning.

  • Chinese Government's Link to Cyber Espionage Clearer Than Ever

    By Thor Olavsrud | 20 February, 2013 16:09

    It's a common belief in the information security world that the Chinese government is behind many of the advanced persistent threats that target companies around the world in an effort to steal their IP and trade secrets. Now one security firm has come forward with years of evidence to link a prolific APT group to a unit inside the Chinese government.

Whitepapers about data breach