Privacy issues in the Philippines have become headline news as 2017 gets underway. In January, the National Privacy Commission (NPC) in that country issued a statement placing the blame for a data breach that put the personal information of millions of voters at risk squarely at the feet of the Commission on Elections (COMELEC) and its Chairman Andres Bautista.
A hacker is claiming to have stolen over one billion user records, but security researchers are not convinced that this came from a legitimate TikTok hack or that account takeovers were involved.
1.6 million unemployment claimants in Washington may have just received an identity theft headache. A hack of the State Auditor's office has exposed extremely sensitive personal information.
Hackers used data from 2015 Ashley Madison data breach to conduct cyber extortion scams, asking users to pay more than $1,000 worth of Bitcoin.
Data privacy came into public consciousness in 2018. Yet, even with new regulations to protect personal privacy, it’s clear that there is still a long way to go in 2019 before personal data is truly protected.
FlexBooker, a commonly used appointment scheduling and calendar service, is apologizing to its customers after 3.7 million records appeared on a dark web hacker forum following a DDoS attack.
Combining elements of information security, business continuity, and organizational resilience, a cyber resilience strategy can enable rapid recovery from an inevitable attack with little to no operational disruption.
Among the major highlights of the Verizon Cyber Espionage Report: criminal organizations and former employees play a trivial role in overall attempts, the overwhelming majority come from states.
“Many Americans are lost” when it comes to dealing with data breaches. According to a new survey by Lexington Law, many do not even check whether or not they are victims.
Recent data breaches at Under Armour and Panera Bread has been making headlines. But the approach taken to mitigate the threat to consumers could not have been more different. One is a lesson on best practice and the other is a cautionary tale on how not to handle malicious attacks aimed at seizing consumer data.