Data breaches take time and a lot of effort to pull off, but successful breaches can affect not just organizations, but also millions of people. Learn what a data breach is, what types of data is usually stolen, and what happens to stolen data.
A decade's worth of breaches has led to this. Forward-looking threat researcher Numaan Huq analyzes what has happened to the stolen data affecting major US industries. We map out the probabilities; see where the information goes and how much it's sold. Read more
Between 2012 and 2014, the cyber-attacks on the healthcare industry caused it to suffer more than business, government, and military sectors. Attacks have only gotten bigger since then. What makes healthcare such ideal targets? Read more
A closer look at a one-man operation that managed to steal more than 22,000 credit card numbers in a month using PoS malware. Learn more about the changing dynamics of the underground PoS malware economy in this research paper. Read more
PoS malware has evolved rapidly over the past few years, targeting mostly big retail companies from which they could obtain large chunks of data. See how PoS systems—and how the malware that targets them—works, and how to defend against them. Read more
The most immediate security risk to businesses and customers lies in accepting payments through a PoS system. The information customers hand over, if captured, can be used by cybercriminals to commit credit card fraud. Read more