Google Knows What You Did Last Summer

It’s no secret that Google knows a lot about you.

The company tracks almost everything you do on the Internet, including your searches, music you listen to, videos you watch, and even the places you travel to, and it does this for targeting relevant ads to its users and better improve its service.

Now the technology giant has a plan to make it easier to control all the data the company collects throughout all your different devices.

Continue Reading…

Noodles & Company Provides Notice of Data Security Incident

Noodles & Company today announced that a recent data security incident may have compromised the security of payment information of some guests who used debit or credit cards at certain Noodles & Company locations between January 31, 2016 and June 2, 2016. Credit and debit cards used at the affected locations are no longer at risk from the malware involved in this incident.

Continue Reading…

How To Prepare For A Data Breach

According to a recent article by Dark Reading with strategies courtesy of Stroz Friedberg, these five from-the-trenches strategies will help you win the fight against today’s sophisticated, conniving attackers.

Breaches are common, and there is no single, one-size-fits-all approach to breach responses. However, there are some common practices to get started if you don’t know where to begin. To become prepared for a breach, your company must create a Preparedness Plan, an Incident Response Plan, and a Post Assessment and Action Plan.

It is important you plan these steps BEFORE you need them, and don’t just put them on a shelf. Review them, update them, and educate your team with them.
Continue Reading…

4 Ways Organizations Should Respond to Data Breaches

Cyber criminals try to hack organizations for a variety of reasons – they may want personal medical records; associated information of value such as debit and credit cards numbers and Social Security numbers; and even research for intellectual property theft. A new report from KPMG, “The Day After,” examines a four-phase approach to remediation that organizations can use in the hectic hours after discovering a data breach or cyberattack. Those phases include react, respond, transform and sustain.

Continue Reading…

VerticalScope Hacked, Over 40 Million Users Exposed

VerticalScope, which hosts 1,100 websites and forums, was hacked earlier this year, with the details of around 45 million users later leaked online.

Some of the most popular online communities hosted by VerticalScope include,,, and, all of which were impacted by data leak. Apparently, the data was stolen during a breach in February this year, according to paid search engine LeakedSource, which broke the news on the incident.

Continue Reading…

Page 48 of 72« First...102030...4647484950...6070...Last »