The hacker behind the T-Mobile hack told the Wall Street Journal their wireless data security is awful. That is a powerful statement, which painted a bullseye on the back of T-Mobile to hackers worldwide. Wireless users, whether business customers, families or individuals must be...
More than 40 million former, current and prospective T-Mobile US customers were impacted by a cyberattack
Following a cyberattack initially disclosed on Aug. 17 that resulted in customer data being accessed by an unauthorized party, T-Mobile US said today that it is "confident that we...
Web applications are increasingly under attack as valuable enterprise data moves to the cloud, according to Verizon's annual Data Breach Investigations Report.
Web application attacks doubled from last year, to 43%. In terms of actual breaches, cloud assets were involved in about 24% of breaches,...
If you want the quickest take on this year's 78-page Verizon Data Breach Investigations Report, skip the executive summary and go straight to page 53.
In a discussion on email compromise attacks targeting executive staff, the report authors muse in their typical irreverent style:...
If it seems like you're hearing more about ransomware attacks, it's not just that more high-profile attacks -- like the recent takeover of some city government systems in Atlanta, Ga.-- are making the news. Ransomware attacks have increased significantly in the last couple of...
What are security holes?
Applying patches to operating systems is pivotal to network security. A software vulnerability is typically a security hole discovered in an operating system or software program, which hackers target with a specific code clothed as malware. In the interest of taking...
IBM Corp. debuted Monday the encryption capabilities of its new z14 mainframe, otherwise known as IBM Z, which is focused on combating the growing threat of data breaches.
The number of data breaches within the U.S. is on the rise. IBM purports universal encryption --...