1. 4.6 Million Snapchat Usernames, Partial Phone Numbers Leaked in Breach

    It didn't take long for hackers to exploit a previously disclosed vulnerability in the popular photo sharing application Snapchat. As yet unidentified hackers spent yesterday's New Year's holiday dumping 4.6 million of the service's usernames and partial phone numbers and posting them online for the public to peruse. The site that was hosting the slew of information, SnapchatDB.info, remains offli…Read More

  2. FTC – The New Sheriff in Town

    For any business, a security breach can be a complicated and costly disaster. Not only does a business face the issue of having brand equity damaged, IT systems compromised and customers' trust voided, but another likely outcome of any significant security breach is a lawsuit. Businesses have a duty of care to reasonably protect their customer data. If that duty is breached, say because a hacker o…Read More

  3. Half Million Users Affected in JP Morgan Ucard Data Breach

    An attack on the computer networks of banking giant JP Morgan Chase & Co. may have exposed sensitive information belonging to 465,000 prepaid cash-card holders, according to a Reuters report. JP Morgan said the attack targeted Web servers handling its Ucard program in mid-September and that the company has since remedied the underlying flaws that led to the breach and contacted law enforcement…Read More

  4. The Right Security Solutions for the Datacenter

    John Grady is a Research Manager for Security Products and Service at IDC The datacenter is the heart of the enterprise due to its central role across nearly all business processes. In some ways, there's been a reversion back to more centralized IT architecture, leveraging virtualization and cloud technologies to better enable overall business agility. As organizations look to deploy private cloud…Read More

  5. Poor Patching, Communication Facilitated July Dept. of Energy Breach

    The U.S. Department of Energy has thrown back the covers on a July breach that exposed the personal information of more than 104,000 individuals, painting a less than flattering portrait of IT and agency management failures around vulnerability management, access controls and a general lack of communication between decision makers. Hackers were able to penetrate a Web-facing application and steal …Read More

  6. Target Suffered Massive Data Breach; 40M Cards Accessed

    UPDATE – TJX and Heartland Payment Systems may soon have company atop the list of the worst retail data breaches in U.S. history after reports surfaced that Target Corp. was breached around Black Friday and millions of credit and debit cards were stolen. Target confirmed the breach this morning and in a statement said 40 million credit and debit cards were accessed starting the day before Thanks…Read More

  7. December #SecChat Recap – The Security Impact of Shadow IT

    The numbers don't lie—employees are increasingly circumventing IT, using unapproved Software-as-a-Service applications (SaaS) in their daily tasks. This dangerous habit, practiced by more than 80% of employees (known as Shadow IT), might seem harmless to some, but can, in fact, put sensitive corporate data at risk. Last week, Graham Clarke, the Senior Director of Network Security Product Managem…Read More

  8. Encrypted PIN Data Stolen in Target Breach

    Target confirmed this morning that encrypted PIN data was stolen in the Black Friday data breach that exposed 40 million accounts to fraud. Spokesperson Molly Snyder said the ongoing forensics investigation confirmed that PIN data was accessed as well, contrary to previous claims made by the retail giant. “We remain confident that PIN numbers are safe and secure,” Snyder said in a statement. …Read More

  9. Time To Float Your Business Up Into The Cloud?

      One of the biggest buzzwords being used right now is “the cloud.”  So, what is the cloud? There are many different definitions you can find, but for the small business owner it means essentially outsourcing your IT infrastructure (possibly including applications, servers, data storage, etc) remotely.  Why would you move to the cloud?  The most commonly cited reasons are focused upon the …Read More


    “They are aggressive at collecting sensitive data, embedding functionalities and capabilities to perform dangerous operations such as downloading and running new code on demand, and they are also plagued with various classes of vulnerabilities that enable attackers to turn their aggressive behaviors against users,” researchers, Yulong Zhang, Hui Xue, Tao Wei and Dawn Song wrote today on the co…Read More