The Identity Theft Resource Center, which tracks data breaches, has counted 204 of them from January 1 to March 27.
data breach in pictures
Many companies have felt the effects of data theft over the last several years. It's 2014 and it doesn't look like the going is getting any easier. The technology sector seems most at risk with every week bringing the world another reported data breach. Here we look at the largest breaches in the last year.
We list the worst data breach incidents recorded by ITRC
It’s early but it has been a bad year for personal data exposure already
The U.S. Securities and Exchange Commission has charged 32 defendants with fraud in an international scheme that used stolen, yet-to-be-published press releases from hacked websites to conduct stock trades.
Nine people face criminal charges in the U.S. for allegedly hacking three press release distributors and stealing yet-to-be-published announcements in a stock trading scheme that authorities say generated about US$30 million in illegal profits.
Retailer Fred's said Monday it found malware that collected payment card details on two of its servers, but it doesn't appear the data was removed from its systems.
Travel industry software maker Sabre is the latest company said to have been hit by the same hackers who recently attacked U.S. health insurer Anthem and the U.S. Office of Personnel Management (OPM), while American Airlines has been investigating it...
A group of Israeli researchers have improved on a way to steal data from air-gapped computers, thought to be safer from attack due to their isolation from the Internet.
Police in Austin, Texas, set up sting operations with cars they have under surveillance, watching for thieves to break into them. Marcus J. Carey's Web service, HoneyDocs -- born in the same city -- uses the same concept, only with computer files.
A new report warns that the cost from lost productivity at work related to the new NFL season could add up to US$10.5 billion. And there we were, thinking the biggest waste of time at work came from fielding an endless stream of IT industry reports?
Thanks to all the fear over data security breaches, a computer recycling operation has morphed into something much bigger - and potentially more lucrative - for the Saraiva brothers.
Whitepapers about data breach
Eight breaches in 2013 provided a painful reminder that cybercrime remains prevalent. This year’s report once again covers the wide-ranging threat landscape, with data collected and analysed by security experts, while calling out seven areas that deserve special attention.
Most Popular Reviews
- 1 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 2 Sony Xperia XZ review: turbo-charged last-gen phone
- 3 Hisense Series 7 ULED 4K UHD TV review
- 4 Sony X9300D and X8500D UHD 4K TV review
- 5 Moto X Force review: Leading features from a mid-range phone
Join the PC World newsletter!
Latest News Articles
- Samsung sales, profits dive on Note 7 recall
- Dyn DDoS attack came from 100,000 infected devices
- These are the 3 big reveals from Microsoft's Surface event
- AI and robots aren't gunning for your job, White House economist says
- DDoS attacks from webcams, routers hit Singapore's StarHub
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Google Pixel XL full, in-depth smartphone review: The new best Android phone
- Japan Robot, gadget and car expo slideshow
- Panasonic DX900U UHD 4K smart TV review: Best all-round TV ever?
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- FTSenior Business Analyst - Telco - Melbourne CBDVIC
- CCProject AdministratorVIC
- CCICT Project Reporting Planning CoordinatorNSW
- FTDynamics CRM DeveloperWA
- CCBusiness Consultant - CPM SoftwareVIC
- TPSenior Data AnalystVIC
- CCContract Systems Analyst (SQL/Web) 161027/SA/842Asia
- FTEmbedded Software EngineerSA
- CCSolution Architect - BRISBANE BASEDVIC
- FTApplication Programmer - Software - HealthVIC
- FTData Governance Project Manager | 6 month ContractNSW
- CCPHP DeveloperNSW
- CCNetwork and Security Design EngineerNSW
- FTSenior Python DeveloperNSW
- CCContract IT Assistant (PC LAN Support) 161020/ITA/652Asia
- TPTest AnalystQLD
- FTLevel 2 Application SupportVIC
- FTSOE ArchitectNSW
- CCSenior C# .Net EngineerNSW
- CCBusiness Analyst - Identity Access ManagementACT
- CCSolutions Architect (Power of Choice)QLD
- CCSenior Project Manager - IT Solutions - GovernmentNSW
- FTSENIOR .Net DEVELOPERQLD
- CCIT Senior Systems Administrator- Server Patching RemediationNSW
- TPSenior Analyst|Progress ProgrammerQLD