Greenwich University has been fined £120,000 after a security breach at the university resulted in the leak of 19,500 students' data to the internet, according to Signavio.
New Spectre-style vulnerability affecting Intel chips uncovered by bug bounty programme. Intel has confirmed a new exploit - titled Variant 4 - that uses speculative execution, to potentially expose data through a side channel.
A cyber-espionage operation targeting Android users in the Middle East has been exfiltrating the data of unsuspecting users since June 2015.
To maximise the value of data and establish widespread data intelligence from an operational standpoint, organisations require a data governance framework to improve their data's quality, usability and reliability.
The Queen's Bench Division of The High Court of Justice ruled that a key part of the 2016 Investigatory Powers Act, which would force broadband ISPs to log the internet activity of all their customers for up to 12 months, is unlawful.
Unable to withstand the months-long scandal over its collection of data from millions of unsuspecting Facebook users, Cambridge Analytica, closed its doors yesterday, filing for bankruptcy.
Fitbit and Google have inked a deal that will have the fitness device vendor upload data to Google's Cloud Healthcare API so it can be made accessible by healthcare providers.
The massive data breach that compromised the data of 147.9 million Equifax customers last year has cost the company more than £175 million in related expenses.
Web trackers like Bandsintown are exploiting the "Login with Facebook" feature to gain access to data from the social media firm's users, according a report by security researchers at the Freedom to Tinker blog.
In the wake of the Facebook- CA scandal, social media data aggregation firm LocalBlox left an AWS bucket misconfigured revealing 48 million records gleaned from publicly available data on Facebook, LinkedIn and Twitter.
Facebook's recent announcement to update its data restriction policies has prompted some researchers to examine other social media platforms to review their data practices as well.
The nine US-indicted Iranians who stand accused of exfiltrating 31 terabytes of research and data from educational institutions, companies and government agencies, allegedly used phishing schemes to steal university credentials.
UK police are secretly deploying technology which allows them to download all of the content and data from someone's phone on a questionably legal basis due to a lack of clarity in the law, according to a recent report.
BJC HealthCare in the US said a data storage error potentially compromised 33,420 patient records when the information was accidentally made publicly available for nine months.
The UK-based digital watchdog organisation Open Rights Group is expressing concern that an age verification tool for pornography sites could potentially expose users' sensitive data, according to a report from the BBC.
Faced with a shortage of skilled IT security staff, prioritising alerts can be an important strategy. By creating a set of defined processes and routines, security teams can review sets of data regularly in order to spot anomalies
Equifax has once again bumped up the estimated number of US consumers affected by its massive breach - now saying that data on 147.9 million was somehow exposed.
Even though enterprises across the world face varied cyber-threats in the form of ransomware attacks, phishing attacks, and attacks on unsecured data stored in the cloud, alarming levels of security inertia hold them back.
Data breach aficionado Troy Hunt has significantly updated his "Have I Been Pwned?" website in recent days, adding a data set of 2,844 breach incidents involving 80 million stolen records.
We are seeing a shift in people's perception of how their personal data is collected, stored and used. Large-scale data breaches have raised the level of awareness in the general public, and shone a light on the role of data aggregators.
Companies struggle to understand, let alone quantify, their data risk and exposure. A new approach unites data operators managing and securing data with data consumers who need data to do their job.
As typical with most breaches initially underestimating the overall impact of a cyber-security "incident," the hack of the Massachusetts Department of Revenue in the US was more than twice as large than originally anticipated.
Some 78 percent of organisations polled The Thales 2018 Data Threat Report plan on increasing their IT security spending in 2018, up from 73 percent globally in 2017, and including nearly 86 percent of US organisations.
Telecom giant Swisscom Wednesday disclosed that an unauthorised intruder misappropriated an unnamed sales partner's access to its data, thereby compromising basic information pertaining to approximately 800,000 customers.
Data controllers and processors are required to carefully think about the ways to effectively secure personal data and take all necessary steps in this respect to prevent possible infringements of the Regulation.
The Court of Appeal has found the UK's Data Retention and Investigatory Powers Act 2014, known as the Snoopers' Charter, unlawful as far as the prevention, investigation, detection and prosecution of serious crimes are concerned.
Many organisations have been investing in resources and processes to meet GDPR standards ahead of the May deadline according to Cisco's first Privacy Maturity Benchmark Study.
Apps on Google Play and others could steal money and personal data from victims. App stores are hosting 661 blacklisted Bitcoin apps which leave users open to hackers, accoriding to a recently published report.
Healthcare data has been stolen from more than half of Norway's population by a hacker or hacker group. The attack happened on 8 January according to BleepingComputer and came to light this week.
Many organisations need to implement technology upgrades and end-to-end protection to assist them in meeting GDPR's data privacy requirements.