Tag Archive for: Investigations

GDPR Behind 42K Data Breach Notifications, 255 Investigations – BleepingComputer

  1. GDPR Behind 42K Data Breach Notifications, 255 Investigations  BleepingComputer
  2. Irish data protection authority reveals probe into Twitter data breach | TheHill  The Hill
  3. Twitter Data Breach Prompts GDPR Investigation  pymnts.com
  4. Irish data watchdog investigates Twitter over privacy rules breach  Reuters
  5. More than 95,000 data breach complaints since EU rules kicked in  ETTelecom.com
  6. View full coverage on read more

“data breach” – read more

Uber’s Cover-Up of Its Massive Data Breach May Lead to EU Investigations

  1. Uber’s Cover-Up of Its Massive Data Breach May Lead to EU Investigations  Fortune
  2. The FTC is looking into Uber’s latest data breach  Engadget
  3. Uber Told SoftBank About Data Breach Before Telling Public  U.S. News & World Report
  4. ANALYSIS: There are several reasons Uber has little to fear from class actions over data breach  Business Day
  5. Uber Paid Hackers to Delete Stolen Data on 57 Million People  Bloomberg
  6. Full coverage

data breach – Google News

Cyberespionage and ransomware attacks are on the increase warns the Verizon 2017 Data Breach Investigations Report – The Hans India


The Hans India

Cyberespionage and ransomware attacks are on the increase warns the Verizon 2017 Data Breach Investigations Report
The Hans India
MUMBAI, INDIA: Cyberespionage is now the most common type of attack seen in manufacturing, the public sector and now education, warns the Verizon 2017 Data Breach Investigations Report. Much of this is due to the high proliferation of propriety

and more »

data breach – Google News

IDG Contributor Network: What terrorism investigations can teach us about investigating cyber attacks

Having a military background, I tend to look at all security issues with the perspective of someone who’s served in the armed forces. That means using a thorough investigation process that doesn’t treat any action as accidental or an attack as a stand-alone incident and looking for links between seemingly unconnected events.

This method is used by law enforcement agencies to investigate acts of terrorism, which, sadly, are happening more frequently. While terror attacks that have occurred in the physical world are making headlines, the virtual world is also under attack by sophisticated hackers. However, not much is said about the similarities between investigating both types of attacks or what security researchers can learn from their law enforcement counterparts. I’ve had this thought for awhile and, fearing that I’d be seen as insensitive to recent events, debated whether to write this blog. After much thought, I decided that the stakes are too high to remain silent and continue treating each breach as a one-off event without greater security implications.

To read this article in full or to leave a comment, please click here

Network World Security