MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
InternetNews
January 21, 2009
Richard Adhikari
Cyber Thieves Hit Payment Processor Heartland Experts warn that more attacks may be to come. Observers also say the breach highlights the current state of legislation regarding disclosure when data loss hits corporations. mark for My Articles similar articles
Bank Systems & Technology
August 18, 2009
Maria Bruno-Britz
Long Arm of the Law IDs Heartland Hackers An American and two Russians are charged with one of the largest cyber crimes ever. mark for My Articles similar articles
Bank Systems & Technology
September 3, 2010
Penny Crosman
Heartland and Discover Agree to $5 Million Data Breach Settlement Card payment processor hopes this will be the end of the legal fallout from its 2008 data breach. mark for My Articles similar articles
Bank Technology News
September 2009
Rebecca Sausner
Everything That Can Go Wrong The aftermath of the breach of Albert Gonzalez has had some positive effects. mark for My Articles similar articles
InternetNews
October 17, 2008
Richard Adhikari
Adobe Sites Hit by Malware Just weeks after a BusinessWeek Web site was hit by an SQL injection attack, comes news that Adobe has had to deal with two of its Web sites compromised the same way. mark for My Articles similar articles
InternetNews
January 29, 2009
Richard Adhikari
Class Action Suit Filed Over Heartland Breach Payment processor Heartland Payment Systems has been slapped with a class action lawsuit has been filed against the company over a data breach that observers say may be the largest class action suit ever. Other lawyers may be looking to file similar suits. mark for My Articles similar articles
The Motley Fool
August 24, 2009
Tim Beyers
The Uncomfortable Truth About Credit Cards Even if you can't stop a hacker, you can protect yourself. mark for My Articles similar articles
InternetNews
April 16, 2009
Alex Goldman
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. mark for My Articles similar articles
InternetNews
August 31, 2009
Heartland, TJX Hacker Will Plead Guilty Cases that may go down in history as warnings to businesses about security practices near their conclusion. mark for My Articles similar articles
InternetNews
July 14, 2009
LexisNexis Breach Linked to Mafia Business information provider LexisNexis is alerting customers that their personal information may have been obtained by a Mafia-connected criminal group. mark for My Articles similar articles
InternetNews
November 16, 2007
Sean Gallagher
Security Sweep Finds Retailer's Wi-Fi Networks At Risk A majority of the wireless network devices found at retailers are ripe for potential compromise, a recent survey by a wireless security firm has found. mark for My Articles similar articles
InternetNews
September 11, 2009
TJX Hacker Pleads Guilty to Ripping Off Millions 28-year-old hacker admits to role in largest identity-theft scam in U.S. history. mark for My Articles similar articles
InternetNews
December 5, 2007
Andy Patrizio
How TJX Became a Lesson In Proper Security Retailers suddenly get religion about securing their networks when they see a $1 billion bill facing retailer TJX. mark for My Articles similar articles
PC Magazine
September 26, 2008
Corinne Iozzio
The 10 Most Mysterious Cyber Crimes The best criminal hacker is the one that isn't caught or even identified. These are 10 of the most infamous unsolved computer crimes (that we know about). mark for My Articles similar articles
InternetNews
May 8, 2009
Alex Goldman
Heartland Hit With $12M Breach Tab The credit card payment processor is disputing fines from MasterCard and Visa, but the security breach turned what would have been a profitable quarter into a loss. mark for My Articles similar articles
InternetNews
March 29, 2007
David Needle
Numbers Are Out on TJX Breach In an SEC filing, TJX Companies said a record-breaking 47.5 million customer records were 'stolen.' mark for My Articles similar articles
Bank Technology News
March 2009
Rebecca Sausner
Heartland's Lonely Quest For Reform Heartland Payment Systems deals with perhaps the largest data breach ever. mark for My Articles similar articles
CRM
September 2012
Kelly Liyakasa
Cracking the Code on Cyber Crimes Despite efforts to proactively protect customer data, computer intrusions and online fraud are on the rise. mark for My Articles similar articles
InternetNews
April 17, 2009
Alex Goldman
Report: Credit Cards Plentiful in Crime Networks There are so many credit cards in criminal markets that their price has dropped, leading to a new target: PIN numbers. mark for My Articles similar articles
BusinessWeek
February 25, 2010
Breaching the Walls Dealing with cyber-attacks costs companies and governments billions of dollars a year and threatens national and economic security. Here are some recent incidents. mark for My Articles similar articles
InternetNews
October 16, 2007
Andy Patrizio
A New Way to Hack Yourself Core Security Technologies updates its intrusion detection software to simulate outside attacks on your network and see how far the bad guys can get. mark for My Articles similar articles
Registered Rep.
May 24, 2011
Lauren Barack
Cyber-Hackers: Faster, Better Equipped Than You Security should be the responsibility of all employees - not just the chief technology officer, or the principal of an advisory firm. mark for My Articles similar articles
Popular Mechanics
February 2006
Brian Krebs
It's 10 PM. Do You Know Where Your Identity Is? Global identity thieves may know their way around your computer better than you do. Learn how to protect yourself in the scary new world of zombies, RATs, Trojan horses and evil twins. mark for My Articles similar articles
U.S. Banker
September 2007
John Bingham
Data Breaches' Sophistication Prompt 'Digital Dozen' Standards Taking measures to prevent and deter data breaches is the best approach to avoiding the high cost of fraud. Collaborations among Visa, MasterCard, American Express, Discover Card and JCB created a common industry security requirement known as the Payment Card Industry Data Security Standard. mark for My Articles similar articles
U.S. Banker
March 2009
Glen Fest
The Emperor's Old Clothes Still Don't Fit With the potential to be the new poster child for data breach notoriety, Heartland Payment Systems of New Jersey responded quickly to its massive security breach. mark for My Articles similar articles
Bank Systems & Technology
June 30, 2009
Nathan Conz
Heartland Completes First Phase of Encryption Pilot Heartland Payment Systems announces it has successfully completed an AES-encrypted transaction process from a merchant card reader through to a processor network. mark for My Articles similar articles
InternetNews
March 2, 2009
Richard Adhikari
ID Theft Threat Grows With 1M Already Hit in '09 A new report shows identify theft is off to a rapid start this year - and the figures could be even worse than expected. mark for My Articles similar articles
Bank Technology News
April 2007
Rebecca Sausner
The New Red Menace Russian and eastern European hackers get all the glory these days, but their efforts to disrupt American financial services are a nuisance when compared to the nation-state threat that China's cyber army, and its rogue hackers, may pose. mark for My Articles similar articles
Entrepreneur
June 2010
Ericka Chickowski
Protect Your Small Business Against Cyber Attacks Cybercrime costs the economy more than $1 trillion per year, and crooks are increasingly setting their sights on small businesses. A look at the most destructive threats to your network - and what you need to do about them. mark for My Articles similar articles
InternetNews
February 5, 2010
SQL Injections Led to 60% of UK Data Breaches Malicious hackers are relying on growing numbers of increasingly complex SQL attacks to get at companies' data. mark for My Articles similar articles
CFO
March 1, 2009
Bob Violino
As the Economy Sinks, Data Breaches Rise Many companies still fail to address rudimentary security issues. Despite budget pressures, they can't afford to ignore them much longer. mark for My Articles similar articles
InternetNews
February 26, 2009
Richard Adhikari
Experts Push Guidelines to Halt Data Breaches After a series of high-profile attacks and security lapses, government and private sector experts pull together a list of recommendations. mark for My Articles similar articles
InternetNews
December 20, 2005
Jim Wagner
Guidance Software Investigating Stolen Data Computer forensic specialist Guidance Software found itself on the receiving end of a malicious hacking attack that managed to swipe sensitive information on reportedly thousands of customers. mark for My Articles similar articles
Search Engine Watch
January 20, 2010
Jason King
Google's New Approach to China: A Closer Look at the Attack Heard 'Round the Web Taking a look at the numerous security implications for Google users after last week's cyber attack on Google by China. mark for My Articles similar articles
Bank Systems & Technology
December 22, 2009
Melanie Rodier
Heartland To Settle Class Actions Over Cyber Breach The payment processor agreed to submit the report of an independent expert on its plans to improve the security of its computer system since the announcement of the cyber breach on January 20, 2009. mark for My Articles similar articles
CFO
January 1, 2006
John McPartlin
Hackers Find Backers Large organizations should prepare themselves for more-clever and more-targeted attacks against their security infrastructures this year. Computer crime is now a game for professionals. Are companies prepared to respond? mark for My Articles similar articles
InternetNews
August 26, 2004
Roy Mark
DoJ Nabs 103 in Online Crime Sweep Ashcroft says summer-long campaign known as Operation Web Snare reveals increasing internationalization of online crime. mark for My Articles similar articles
InternetNews
September 15, 2008
Richard Adhikari
Hackers Hit BusinessWeek With Malware The BusinessWeek.com site was hit by a SQL injection attack and connects users to a sleeper site. mark for My Articles similar articles
IEEE Spectrum
August 2008
Prachi Patel-Predd
Data Theft by Partner Companies on the Rise Data breaches involving trusted third parties -- business partners, vendors, suppliers, and contractors -- are alarmingly on the rise, according to a recent investigation by the security team at Verizon Business. mark for My Articles similar articles
Bank Technology News
November 2009
Rebecca Sausner
The End of the World Heartland Payment System's CEO predicts 2010 will be the year that the payments chain becomes significantly more secure. mark for My Articles similar articles
InternetNews
January 28, 2009
Richard Adhikari
Monster Breach Shows Security Needs Rethinking Is corporate security fighting yesterday's war with last decade's weapons? mark for My Articles similar articles
Commercial Investment Real Estate
Sep/Oct 2015
Alan Lyons
Cyber Scares Protect your real estate business from online security breaches. mark for My Articles similar articles
CRM
January 19, 2015
Maria Minsker
Cybersecurity Is Not Just About Protection, but Detection Too Enterprises must prepare to tackle inevitable breaches in 2015. mark for My Articles similar articles
CRM
May 2015
Leonard Klie
Data Security Should Be in Everyone's Job Description Protecting valuable customer information should begin in the contact center and end in the executive suite. mark for My Articles similar articles
PC Magazine
May 1, 2010
Albanesius & Rhey
Anatomy of a Hack In late March, a chapter was closed with little fanfare on the biggest case of online identity theft in U.S. history. mark for My Articles similar articles
Bank Director
4th Quarter 2010
Chris Costanzo
Don't Compromise Your Card Business Third parties can create a panoply of security challenges for card-issuing banks and the stakes today are higher than ever. mark for My Articles similar articles
Bank Technology News
February 2009
Daniel Wolfe
Another Processor Spills the Data Hackers have obtained payment card data from another processor, according to Visa Inc., though many of the details, including the name of the company, remain unclear. mark for My Articles similar articles
InternetNews
April 1, 2010
New Law Aims to Shore Up Retail Data Security Banks get a break in Washington, one of a growing number of states enabling them to recoup money lost from ID theft and data breaches. mark for My Articles similar articles
Fast Company
Daniel Terdiman
AP Report: U.S. Power Grid Subject To Repeated Foreign Hacks The U.S. power grid is subject to being hacked from abroad, and foreign hackers have gained remote access to American power operations about a dozen times over the last decade. mark for My Articles similar articles
InternetNews
July 8, 2009
Alex Goldman
U.S., South Korea Under Cyber Attack Governments and security firms are working together to fight an attack which, though massive, contains very primitive components. mark for My Articles similar articles