Fifty-three Times employees' computers were hacked after the paper launched an investigation into the vast wealth of some of China's most influential families.
The PlayStation Network breach exposed 77 million customers' personal information, forcing some three million UK customers to change their bank account details and obtain new credit cards.
A vulnerability in a school records system could reveal the home address, social insurance number, telephone number and class schedule of any student enrolled, but when Hamed Al-Khabaz revealed and tested the flaw, he was expelled.
After a laptop breaks, where does it go? Your old work laptop, perhaps too slow to keep up with the growing pace of the Internet, is retired to the IT department, which issues you a nice, shiny new one. But what about all of your old files? Your data? Your client information?
The rise in global security incidents, diminished budgets and downsized security programs have left organizations to deal with security risks that are neither well-understood nor consistently addressed. Executives around the world feel confident that they’re winning the high-stakes game of information security despite the growing number of obstacles, according to The Global State of Information Security® Survey2013 by PwC U.S. in conjunction with CIO and CSO magazines.