We list the worst data breach incidents recorded by ITRC
data breach in pictures
It’s early but it has been a bad year for personal data exposure already
A new website allows Internet users to check if their usernames and passwords were exposed in some of the largest data breaches in recent years.
New attack campaigns have infected point-of-sale (PoS) systems around the world with sophisticated malware designed to steal payment card and transaction data.
Facebook, LinkedIn and other online services have been resetting accounts after 2 million login credentials, apparently stolen from users' computers, were discovered on a server in the Netherlands.
A new Trojan program that targets users of online financial services has the potential to spread very quickly over the next few months, security researchers warn.
A Boston-based company, Abine, is beefing its anti-tracking browser extension to let users shield their real credit card details, email addresses and phone numbers during web transactions.
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
A new report warns that the cost from lost productivity at work related to the new NFL season could add up to US$10.5 billion. And there we were, thinking the biggest waste of time at work came from fielding an endless stream of IT industry reports?
Thanks to all the fear over data security breaches, a computer recycling operation has morphed into something much bigger - and potentially more lucrative - for the Saraiva brothers.
Whitepapers about data breach
A study conducted by Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting & Information Security Service, Police Central e-Crime Unit and United States Secret Service. This year our DBIR includes more incidents, derived from more contributors, and represents a broader and more diverse geographical scope. The number of compromised records across these incidents skyrocketed back up to 174 million after reaching an all-time low (or high, depending on your point of view) in last year’s report of four million. In fact, 2011 boasts the second-highest data loss total since we started keeping track in 2004. Read this report.
Latest News Articles
- On snooping disclosures, AT&T and Internet companies are like night and day
- Yahoo buys concert live-streaming startup Evntlive
- Wall Street Beat: Tech stocks hit 13-year high
- DARPA makes finding software vulnerabilities fun
- Mobile chip speed wars have to end, Broadcom chairman says
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Laser vs. inkjet printers: which is better?
- 3 How do I connect my TV to the Internet?
- 4 Windows 7 Home Premium vs. Windows 7 Professional
- 5 Samsung’s 2013 Smart TVs: everything you need to know
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
Best Deals on PCWorld
- Networking, Wireless & VoIPView all »
- NotebooksView all »
- TabletsView all »
- Mobile PhonesView all »
- Printers & ScannersView all »