Cyber Attacks

News and Articles About Cyber Attacks

'The Snappening' Really Happened: 100,000 Snapchat Photos and Videos Leak Online
Cyber Security

'The Snappening' Really Happened: 100,000 Snapchat Photos and Videos Leak Online

Because the 'The Fappening' wasn't horrifying enough, enter 'The Snappening,' reason number 1,729 not to snap selfies in the buff.
Kim Lachance Shandrow
Why a Dangerous Security Flaw in USB Devices Is Putting Computers Everywhere at Risk
Cyber Attacks

Why a Dangerous Security Flaw in USB Devices Is Putting Computers Everywhere at Risk

Thumb drives and other USB devices are vulnerable to malware that could let an attacker take over a user's computer.
Benjamin Kabin
Hot New Social Network Ello Knocked Out By Cyber Attack... Already
Social Media

Hot New Social Network Ello Knocked Out By Cyber Attack... Already

Just when we were saying our first hello to Ello, it said goodbye. Here's why. And, yes, the buzzing ad-free social magnet is back up and running.
Kim Lachance Shandrow
Another Hack: Jimmy John's Is the Latest Chain to Suffer a Data Breach
Hackers

Another Hack: Jimmy John's Is the Latest Chain to Suffer a Data Breach

Approximately 216 Jimmy John's stores have been affected in the latest of a growing number of hacking incidents.
Kate Taylor
Home Depot Reports Bigger Breach Than Target; Criminals Used Custom Malware
Hackers

Home Depot Reports Bigger Breach Than Target; Criminals Used Custom Malware

Home Depot's cyberattack put 56 million credit cards at risk, significantly more than Target's breach.
Kate Taylor
Why Uncovering a Network Security Breach Can Take Weeks or Months
Hackers

Why Uncovering a Network Security Breach Can Take Weeks or Months

The discreet methods of hackers make an incursion extremely hard to detect. Both large and small companies are at risk.
Eric Basu
Delivered by
Best Practices for Employees to Protect the Company From Hackers
Cyber Attacks

Best Practices for Employees to Protect the Company From Hackers

With employees working at home and visiting personal sites at work, their guard is often let down. Here's a guide to Internet browsing done safely.
Dirk Anderson
Delivered by
The Celebrity-Hacking Scandal Is a Rude Wake-Up Call on Cloud Security
Cyber Security

The Celebrity-Hacking Scandal Is a Rude Wake-Up Call on Cloud Security

As business owners, you have to take responsibility to protect your sensitive documents and photos.
John Ackerly
Home Depot Suffers Possible Data Breach, Tries to Ease Customer Fears
Security

Home Depot Suffers Possible Data Breach, Tries to Ease Customer Fears

The world's largest home improvement retailer may be the latest victim of a credit and debit card breach.
Kim Lachance Shandrow
Apple Confirms Some Celeb Accounts Were Breached in Nude Photo Scandal
Apple

Apple Confirms Some Celeb Accounts Were Breached in Nude Photo Scandal

The tech giant has broken its silence regarding its probe into the mass leak of naked celebrity images by cyber criminals. Here are the latest developments.
Kim Lachance Shandrow
8 Mostly Free Best Practices for Tightening Internal Data Security
Technology

8 Mostly Free Best Practices for Tightening Internal Data Security

Cybersecurity is a constant worry, but a few commonsense steps protect the company without hurting the bottom line.
Larry Alton
Watch Where You Swipe: Hackers Have Done More Damage Than You Realize
Hacking

Watch Where You Swipe: Hackers Have Done More Damage Than You Realize

More than 1,000 American businesses have been affected by in-store cash register breaches, estimates the Department of Homeland Security.
Laura Entis
Sony Suffers Cyber Attack, Bomb Threat
Cyber Attacks

Sony Suffers Cyber Attack, Bomb Threat

Sony's PlayStation network was shut down for several hours on Sunday while a flight carrying an executive at the company was diverted due to a bomb threat.
Laura Entis
UPS Stores In 24 States Hacked, Private Customer Data Possibly Exposed
Security

UPS Stores In 24 States Hacked, Private Customer Data Possibly Exposed

The shipping giant's retail franchise was hit by a malware attack, potentially jeopardizing customer's identifying and financial information. Here's what you need to know.
Kim Lachance Shandrow