FACEBOOK TWITTER

receive privacy industry news

Email:

most commented

questions + feedback

Have a question or a privacy issue that you'd like us to investigate ? Send an to our editors with your comments.

hack attack


True Story: I Was Hacked on Home WiFi

Do you think your home wireless network is secure? That’s what Barb Angelova thought, until she got the scare of her life. What happened to Barb isn’t unusual. What’s more, it should be a wakeup call for anyone who uses home WiFi. Read More

  • PrintPrint
  • emailemail

Got an E-commerce Site? Back That Thing Up to Prevent a Hack Attack

Social networking sites typically suffer hack attacks the most, but e-commerce sites are not far behind when it comes to hacking and identity theft nightmares. If you run an e-commerce site, click to find out tips to safeguard your hard-earned money, prevent hacking on your site, and protect your data and computing environment from malicious hackers or crooks.

  Read More

  • PrintPrint
  • emailemail

Ponemon Institute Calculates What a Data Breach Really Costs Per Attack; Highest Costs in the U.S.

If you own your own business -- or work for a business that has suffered a data breach -- the damaging effects of even one breach can be long-lasting, according to a new Ponemon Institute report. Companies that suffer a data breach are not only facing expensive direct costs from cleaning up a data breach, but also a loss in customer confidence that has long-lasting ramifications. In fact, the global study shows the United States has the most expensive data-breach incidents caused by malicious or criminal attackers -- at $277 per record!

Click to learn the other true costs of data breaches -- and also check out a calculator that lets you determine your data-breach risk based on your organization's characteristics.

  Read More

  • PrintPrint
  • emailemail


Huffington Post Recommends Personal VPN to Encrypt All Online Activity, Personal Security

As an in-depth Huffington Post article points out, it's no wonder celebrities are often victimized by hackers. The reality is, it's just not that hard to hack celebrities -- or anyone else, for that matter.

Indeed, among the five security tips shared in the article, two are suggestions that this website has repeatedly recommended and warned about over the years. For example tip #4 warns about the dangers inherent in wireless networks and tip #5 warns about malicious spyware that can infect your computer and compromise security: Read More

7 COMMENTS
  • PrintPrint
  • emailemail

Hackers Work for ‘Highly Lucrative Payout’

Several interesting details have emerged from the "Global Risks for 2012" report -- which shows cyber attacks on governments and businesses are considered to be one of the top five risks in the world. Be it cybercrime, cyber-espionage or cyberwarfare -- they are on a steady rise.

The reason, according to this article, are the "highly lucrative payout hackers get from stealing data." Read More

  • PrintPrint
  • emailemail

Finding the Cleanup Crew After a Messy Hack Attack

The New York Times says being hacked is like someone invading your home, and more than anything else, time is of the essence. Read More

  • PrintPrint
  • emailemail

Researchers Release Attack Tool That Cripples Secure Websites

SSL -- the security layer used by banks and online retailers to secure communications between the website and the user -- is coming under fire yet again. A new report from Wired says there is a new hacking tool that exploits a known flaw in the SSL protocol by overwhelming the system with secure connection requests. As the article says, this quickly consumes server resources. Read More

  • PrintPrint
  • emailemail

CNN: Massive Hack Hit 760 Companies Including IBM, Intel, Google

CNN reports that more than 760 organizations -- including IBM, Intel, Facebook, Amazon, and Google -- had a breached "command and control" server, the name for a machine that hackers use to direct the fleets of compromised PCs that they have gained control over. As the CNN article notes, most companies don't like admitting that they've been compromised, but the fact is most companies are likely just finding out they've been hacked at all. Read More

  • PrintPrint
  • emailemail

Hollywood Hackers Stealing Nude Pics, Movie Scripts, and More

An even less-ethical TMZ? Have you heard of Hollywood Leaks, a new band of hackers that has been breaking into entertainment industry insiders' email accounts and leaking what they find, including nude photos, phone numbers, and movie scripts? The hackers aren't particularly skilled, according to this article on Gawker, which says they've broken into accounts mostly by guessing bad security questions. Read More

  • PrintPrint
  • emailemail

Over 43,000 Yale Faculty, Staff And Students Get Hacked

According to Business Insider, Yale University has become a victim of Google hacking -- also known as Google dorking -- when cybercriminals use Google search functions to access data on the Internet. The article explains that students and faculty at the Ivy League institution had their personal data -- including names and Social Security numbers -- available online for nearly 10 months. This sensitive information was stored on an FTP server accessible through a simple Web search. Read More

  • PrintPrint
  • emailemail