Report Details Widespread Network Security Breaches in 2014
An article by Network World magazine lists a dizzying array of cybercrimes corporate America and much more.
Framingham, Mass. – An article by Network World magazine provides an eye-popping account of the worst network data breaches reported so far this year. Among the most notorious cybercrimes is the hacking of Snapchat’s 4.6 million user database.
Many retailers have also been hit hard this year, including Neiman Marcus and Sally Beauty Holdings telling their customers how their payment card information had been hacked. The Home Depot said an employee with authorized access to its computer systems had gotten hold of 30,000 records on customer information associated with the tool-rental area and had provided some of it to unidentified third parties. That information included names, address, phone number, birth date, card brand, card account number and card expiration date.
The hacker group Syrian Electronic Army was also busy tormenting Microsoft. The Syrian Electronic Army, the hacker group believed to be loyal to Syrian President al_Assad, hacked the official Facebook and Twitter pages of Skype and the Web site’s blog telling users not to use Microsoft Outlook claiming Microsoft sells user information to the government.
As reported, there is plenty of other mischief, such as denial-of-service attacks and cyber-espionage to round out what’s only the first half of the year. Read the full article here.
Security Is Our Business, Too
For professionals who recommend, buy and install all types of electronic security equipment, a free subscription to Security Sales & Integration is like having a consultant on call. You’ll find an ideal balance of technology and business coverage, with installation tips and techniques for products and updates on how to add sales to your bottom line.
A free subscription to the #1 resource for the residential and commercial security industry will prove to be invaluable. Subscribe today!
Recommended For You
Cloud security can present a paradox: companies love the flexibility and versatility of cloud security management, but are unsure if the cloud itself is secure enough to house their vitally important systems.
From processing power to lens selection to proper positioning, here are 13 tips to help shed light on proper installation of cameras in low-light conditions.