German MPs were outraged they weren’t notified they were targets in a cyber attack, which resulted in the public release of mobile phone numbers and credit card information.
A sign marks the location of a Chicago Marriott. In November 2018 the hotel chain said their guest reservation database was hacked, compromising the security of up to 500 million customers.
Scott Olson/AFP
The November 30, 2018, Marriott International announced a data breach concerning 500 million clients, the second biggest ever. With new data breaches announced nearly every day, how , everyone is now wondering how this was possible.
Nir Kshetri, University of North Carolina – Greensboro
As cyberattacks and hacking become more common, businesses and private individuals are realizing that cleaning up from digital destruction can be expensive.
Minuscule computer hardware could be spying on top tech firms.
graphicINmotion/ shutterstock
There is always a tension between usability and security. People want systems to be secure so that their identities aren’t stolen, but they want those same systems to be easily accessible.
Universities are uniquely placed to ensure that those who manage security of networks and data work closely with those who research and study the same problem.
Normal IT security practices might not protect you from malicious attacks that enter your system through everyday devices, such as USB keys.
Shutterstock
Malicious code or deliberate design faults can be inserted into everyday business products before they even leave the original manufacturer. Here’s how you can protect yourself.
With so many reports of data breaches, it is easy to tune out to what is happening.
Shutterstock
Data breaches are fact of modern life. It’s likely each of us will have our personal information compromised at some point. Here’s how to reduce the risk and limit the damage if and when it occurs.
Distributed Denial of Service (DDoS) attacks are up 16% in the last year.
Shutterstock
A new report highlights the worrying trends confronting security professionals – from more sophisticated hacking methods to hack-for-hire products and targeted attacks on tourism websites.