The Biggest and Most Impactful Data Breaches of 2016
There was no shortage of data breaches making news last year – let’s take a look back at some of the biggest and most damaging data breaches of 2016.
For Data Thieves, the Internet of Easy Pickings
Leaks of data from the U.S. Military’s Special Operations Command (SOCOM) show that many data breaches are just a matter of picking low hanging fruit.
You’ve already been victimized by Yahoo!’s massive breach
The theft of an estimated one billion user accounts from Yahoo! was big news on Wednesday. But for Yahoo! users, the damage from the 2013 incident has almost certainly already been done.
Court Sides with Insurer: Credit Card Data isn’t Lost Property
A court in Alabama threw out a suit brought by a breached grocery store chain, saying that stolen credit card data doesn’t count as “damaged property.”
Cyber Needs More Perp Walks
The arrest of a 29-year-old man in Prague for suspected involvement in the 2012 hack of LinkedIn is a big victory for law enforcement. Even more important: viral video of the arrest.
Sign Up with the Usual Suspects: Consumer Breach Response is Broken and How to Fix It
The scourge of data breaches and identity theft is more than a decade old. But our tools for dealing with these common incidents are outdated and ineffective. Why?
Circle in Hell Awaits Habitat for Humanity Hackers
The Colorado branch of Habitat for Humanity says a long-running and “malicious” data breach started with ransomware in June, and is making it hard to even conduct business.
Yahoo Breach: User Data Considered Toxic
Computer science and security rely on precision for the descriptions of their constructs and concepts. But there are some things that defy description in these realms, and the Yahoo data breach is one of them.
Rarely is the (Breach) Question asked: Is Our IT Pros Learning?
A new survey by The SANS Institute suggests that companies are worried about data breaches – but aren’t doing much to prevent them.
Once More Into the Breach Response
Reasonable people can, and often do, disagree about what constitutes a proper public response to a data breach. Some people want immediate and full disclosure of all of the details of the event, while others tend to favor a more measured approach, releasing some information at the beginning and more data as things shake out.
Don't Fall Behind
Get the latest security insights
delivered to your inbox each week.
Thank you for subscribing!