Join Us On LinkedIn
Join the Cybersecurity and Incident Response Group on LinkedIn
You are browsing the site archives by date.
By Securities Docket on April 9, 2014, 12:47 pm
Last year during Mardi Gras, a local parish’s sheriff’s department contacted the Louisiana State Analytical and Fusion Exchange (LA-SAFE) to ask for help. Its phone lines were being flooded with 200 calls per minute, leaving its 911 call center and dispatch unit unable to make or receive calls. Every time someone answered the phone, the […]
By Securities Docket on April 9, 2014, 12:44 pm
How did the sizeable data breach at Target that came to light in December occur? A recent U.S. Senate report, based on media reports and expert analysis, answered this question in part. via The Target Data Breach: A Risk Management Industry Perspective – The Epoch Times
By Securities Docket on April 9, 2014, 11:11 am
In the latest Symantec Internet Security Threat Report, it is report that the number of ‘mega data breaches’ went from 1 in 2012 to 8 in 2013, with a total of 552 million identities exposed in 2013. Symantec’s Internet Security Threat Report (ISTR), Volume 19, shows a significant shift in cybercriminal behaviour, revealing that cybercriminals […]
By Securities Docket on April 9, 2014, 8:55 am
Get caught up with the Cybersecurity Docket News Wire for April 8, 2014.
By Securities Docket on April 9, 2014, 8:08 am
Experian Plc is enmeshed in litigation over its 2012 purchase of the assets of data firm Court Ventures, which is at the center of a breach that exposed some 200 million American Social Security numbers to criminals. via Experian Dragged Into Litigation Over Purchased Business’ Data Breach– Claims Journal
By Securities Docket on April 9, 2014, 8:06 am
Security researchers say the threat, known as Heartbleed, is serious, partly because it remained undiscovered for more two years. Attackers can exploit the vulnerability without leaving any trace, so anything sent during that time has potentially been compromised. It’s not known, though, whether anyone has actually used it to conduct an attack. Researchers are advising […]