Data Breach

Data Breach: A data breach is an incident where information, typically data that is sensitive, proprietary or confidential in nature, is stolen or taken from a system without the knowledge or authorization of the system’s owner.
Read more
The hacker group that stole user data from adult network Ashley Madison dumped 10GB of files, revealing client information. But it's not just about infidelity, but more about privacy.
A surveillance software company gets breached, exposing files that include an exploit for a zero-day. Several exploit kits have been updated to include the exploit that affects all versions of Adobe Flash player.
  • Passwords: Not Going Away Anytime Soon

    While it’s true that passwords are not the most convenient way of authenticating yourself and they are inherently insecure, we should not be so quick to dismiss them. Here's why.
  • Fingerprint Scans, Passwords, and Managing Online Accounts

    How new mobile technology, such as the Touch ID sensor on the iPhone 5S, is addressing the "password problem"
  • The Trouble With Passwords

    Password security has always been about balancing what people can remember and what’s difficult for attackers to guess. Today's computing environment is making it harder to balance.
  • Password (In)security, Revisited

    These latest data breach incidents teach us that people are still using woefully insecure passwords. Here are a few tips on how to improve your password security.
Trend Micro CTO Raimund Genes shares his insights on how companies and law enforcement agencies should act together to prevent more data breach incidents from happening in the future.
Securing an organization's network takes more than just technology. While employees are still a company's biggest asset, they can also become the weakest link in terms of security.
    Between 2012 and 2014, the cyber-attacks on the healthcare industry caused it to suffer more than business, government, and military sectors. Attacks have only gotten bigger since then. What makes healthcare such ideal targets?
    A closer look at a one-man operation that managed to steal more than 22,000 credit card numbers in a month using PoS malware. Learn more about the changing dynamics of the underground PoS malware economy in this research paper.
    This research paper discusses how PoS RAM scrapers infect systems and exfiltrate stolen data, and provides a list of strategies and techologies that can be used to defend against the threat.

    Connect with us on