HOME     MENU     SEARCH     NEWSLETTER    
NEWS & INFORMATION FOR TECHNOLOGY PURCHASERS. UPDATED 6 MINUTES AGO.
You are here: Home / January 31, 2015
82% of the Fortune 500
Use BMC for innovative solutions & competitive business advantage.
Contact BMC to learn more.
Search NewsFactor Network
Sort by: Closest Match  |  Newest First
Results 1-10 of 193 for "data breach"
PUBLISHED: JANUARY 28, 2015
1
... In addition, the agency recommended that companies minimize how much data their devices gather and keep that information for only a short time. "Thieves cannot steal data that has been deleted after serving its purpose; nor can thieves steal data that was not collected in the first place," the FTC said. In some recent cases, it ...
PUBLISHED: JANUARY 28, 2015
2
...The Hague District Court clears the way for Vladimir Drinkman to be sent to New Jersey, where he is one of four Russians and a Ukrainian charged in a sophisticated data breach that netted at least 160 million credit and debit card numbers and resulted in losses of hundreds of millions of dollars over seven years. Drinkman's ...
PUBLISHED: JANUARY 20, 2015
3
...SQL injection vulnerabilities are identified and the software packages patched before hackers can exploit the vulnerability. DB Networks DBN-6300 is able to identify SQL injection vulnerabilities in commercial and custom database connected applications. With the average cost of a data breach approaching $6 million, it’s critical to identify and remediate vulnerabilities as quickly as possible. The ramifications ...
PUBLISHED: JANUARY 19, 2015
4
Microsoft’s Outlook e-mail service has apparently been the victim of a cyberattack over the weekend, this time perpetrated by the Chinese government. The hack took the form of a man-in-the-middle ...
PUBLISHED: JANUARY 15, 2015
5
...We also extend our congratulations to the other finalists,” said Brett Helm, CEO of DB Networks. “The DBN-6300 is field proven to provide intelligent continuous monitoring and behavioral analysis for database security in some of the world’s largest mission critical datacenters “From Home Depot to JP Morgan to Sony, cyber attackers showed new levels of sophistication and ...
PUBLISHED: JANUARY 12, 2015
6
...burned down the house," Michael Lynton, the movie studio's CEO, said in an interview with The Associated Press on Thursday. "They destroyed servers, computers, wiped them clean of all the data and took all the data More than six weeks later, the studio's network is still down -- and is expected to remain so for a few ...
PUBLISHED: JANUARY 12, 2015
7
President Barack Obama wants Congress to pass legislation requiring companies to inform customers within 30 days if their data has been hacked, a move that follows high-profile breaches at retailers including Target, Home Depot and Neiman Marcus. A White House official said Obama will announce ...
PUBLISHED: JANUARY 11, 2015
8
The U.S. government was not responsible for sustained electronic attacks that crippled North Korea's Internet infrastructure last month, just after President Barack Obama promised that his administration would respond to ...
PUBLISHED: JANUARY 9, 2015
9
...collect the stolen Sony files. The FBI previously said its evidence also included similarities to other tools developed by North Korea in specific lines of computer code, encryption algorithms and data deletion methods. "I have very high confidence about this attribution to North Korea, as does the entire intelligence community," Comey said. North Korea ...
PUBLISHED: JANUARY 7, 2015
10
...for allegedly stealing and trying to sell financial information about 350,000 clients -- or about 10% of customers at the Wall Street giant's wealth-management arm. The stolen data included names, account numbers, size of accounts and certain transaction information. There was no sign that Social Security numbers, passwords or credit-card information were taken, and ...
Result Page:[1]   2   3   4   5   6   7   8   9   10   ...

NETWORK SECURITY SPOTLIGHT
China has laid down some new rules requiring foreign firms to hand over proprietary source code and adhere to its encryption algorithms. U.S. businesses want "urgent discussions" on the new regs.
NEWSFACTOR.COM
NEWSFACTOR NETWORK SITES
NEWSFACTOR SERVICES
© Copyright 2015 NewsFactor Network, Inc. All rights reserved. Member of Accuserve Ad Network.