TITLE

Global snapshots

PUB. DATE
January 2010
SOURCE
SC Magazine: For IT Security Professionals (UK Edition);Jan/Feb2010, p9
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
This section offers news briefs on global developments in information security. The British National Health Service experienced a data breach, losing data from 1,000 occupational therapy patients and staff members. German Internet users are suffering an online crime wave according to research from Bitkom, a German business information technology (IT) association. Russian criminals are suspected to be behind a syndicate of hackers found guilty of stealing from British bank accounts.
ACCESSION #
47640047

 

Related Articles

  • Figures reveal extent of data security lapses.  // Pulse;11/5/2008, Vol. 68 Issue 38, p2 

    The article features the data security breaches in the healthcare sector and National Health Service (NHS) in Great Britain. The Information Commissioner's Office received 75 reports of data breaches in these institutions. It mentions that the reported breaches include 27 lost computers, 18...

  • FROM REAL CYBER CONFLICT THROUGH WISHFUL CYBER SECURITY TO (UN) LIKELY CYBER PEACE. ARMENCHEVA, Ilina; SMOLENOV, Stefko // Revista Academiei Fortelor Terestre;2015, Vol. 20 Issue 3, p259 

    In nova days ICT progress and the daily life dependency on Internet leads to emergence of many new challenges and threats in cyber space. They can escalate from simple hacker's breach to more serious attacks that take effect over the great number of cyber terrorism victims and even to the cyber...

  • These goofs will make your mistakes seem minor. Altom, Tim // Indianapolis Business Journal;12/22/2008, Vol. 29 Issue 43, p24 

    The article focuses on data related to hacking listed by Dataloss DB. It is indicated that 8 million records lost to hackers from Best Western in August 2008, 47 million lost to hackers in January 2007 from TJX Cos. Inc. and 40 million to hackers in 2005. Many more losses were because of...

  • Twitter Trouble. Carr, John // Information Today;Feb2009, Vol. 26 Issue 2, p2 

    The article focuses on a security breach experienced by Twitter on January 5, 2009. A hacker accessed a Twitter employee's account, granting him or her access to administrative tools to reset the password on any other users' accounts. The hacker had access to the entire Twitter network. In the...

  • Hack Tivism. Davis, Adrian // ITNOW;Summer2012, Vol. 54 Issue 2, p30 

    Over the last two or so years, organisations have had to meet a new and highly specific online threat. That threat is hacktivism and Adrian Davis, Principal Research Analyst at the Information Security Forum, takes a look at the threat from an information security perspective, based on research...

  • RESEARCHERS FIND DATABASE OF 8,700 STOLEN CREDENTIALS. Prince, Brian // eWeek;3/3/2008, Vol. 25 Issue 7, p13 

    The article outlines the discovery of 8,700 stolen FTP server credentials by researchers at FinJan Inc. in the U.S. According to researchers, these FTP server credentials include passwords, user names and server addresses that could allow a hacker to compromise servers and they discovered that...

  • Cyber criminals steal $445 billion yearly.  // Flare (Pakistan);Jul2014, p57 

    The article discusses the Center for Strategic and International Studies' (CSIS) research which showed the impact of cyber crime to the global economy. Topics discussed include the cost of damage to business from theft of intellectual property, cyber crime as damaging to trade, competitiveness...

  • Mobile Encryption Alone Won't Banish Hackers. BENSON, BRANDON // ISO & Agent;Apr2014, p84 

    The author argues that mobile encryption alone would not prevent data security breaches. Topics discussed include the misconception among merchants, consumers and processors that encryption alone is secure, the vulnerability of the behind-the-scenes settings of application software, and the...

  • Threat Stats.  // SC Magazine: For IT Security Professionals (15476693);Jul2013, Vol. 24 Issue 7, p10 

    Several charts and graphs are presented that shows data on cyber security-related crimes and server breaches including malware, data loss in May 2013 and top 5 attacks used by foreign hackers.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics