MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 
Similar Articles
Fast Company
Steven Melendez
Not So Kawaii! Researcher Reports More Than 3M Hello Kitty Fans Exposed In Data Breach Data on more than 3 million users of HelloKitty.com and other sites related to the popular character was exposed to the Internet through an insecure database, security researcher Chris Vickery reported. mark for My Articles similar articles
Fast Company
Alice Truong
Passwords For 5 Million Google Accounts Leaked A database reportedly containing 4.93 million Google user names and passwords was uploaded late Tuesday to a Russian bitcoin forum, according to reports from Russian news outlets. mark for My Articles similar articles
Fast Company
Chris Gayomali
The Celeb Photo Leak: Is Using ICloud Safe? Right now, the safest way to send a salacious photo is to literally never take one. Security is still not a top priority for everyone from established Fortune 500 companies to new and trendy startups. It is an afterthought. mark for My Articles similar articles
InternetNews
May 26, 2006
Clint Boulton
Sacred Heart Data Hacked Sacred Heart University became the latest school to fall victim to a computer hack, which exposed the personal information of as many as 135,000 students and alumni. mark for My Articles similar articles
InternetNews
April 16, 2009
Alex Goldman
Security Lapses Aplenty Despite Growing Threats A study by Verizon Business's RISK team reveals some disconcerting shortcomings in companies' security. mark for My Articles similar articles
InternetNews
September 29, 2005
Tim Gray
Another University System Suffers Breach Crackers continue to exploit American universities' computer weaknesses. mark for My Articles similar articles
Fast Company
John Paul Titlow
Google Is Gearing Up To Kill Your Email Password The company is testing a new, multi-device method for letting people log into their accounts without using a password, according to TechCrunch. mark for My Articles similar articles
CRM
March 2, 2012
Raul Ortega
Lessons Learned from the Zappos Breach Don't make these mistakes. When CRM is your life, customer data is your lifeblood. And your blood likely ran cold when you heard that as many as 24 million Zappos customer records had been obtained by hackers. mark for My Articles similar articles
InternetNews
January 28, 2009
Richard Adhikari
Monster Breach Shows Security Needs Rethinking Is corporate security fighting yesterday's war with last decade's weapons? mark for My Articles similar articles
InternetNews
June 9, 2009
Alex Goldman
T-Mobile Hacked? Although a blog reported yesterday that T-Mobile was hacked, all the hackers actually seemed to have was a list of T-Mobile server names. mark for My Articles similar articles
The Motley Fool
June 18, 2011
Anders Bylund
How to Thwart Digital Thieves and Stay Safe Online You wouldn't give your keys to a stranger on the street, right? Then don't do it online. mark for My Articles similar articles
CRM
June 2015
Leonard Klie
In Data Security, It's a Numbers Game Requiring multifactor authentication makes it harder for hackers to access information mark for My Articles similar articles
InternetNews
December 12, 2006
David Needle
UCLA Database Hole Exposed 800,000 to ID Theft UCLA Web site touted the school's IT security the same day it discovered hackers had broken into its computer system. mark for My Articles similar articles
Wall Street & Technology
June 29, 2005
Paul Allen
Is It Safe? Given the virtual nature of much of our modern world, in which financial transactions are predominantly about electronic flows of data rather than hard cash, information has become a key source of risk. As a result, the new security focus is on information management. mark for My Articles similar articles
Wall Street & Technology
April 27, 2005
Jim Middlemiss
CIO Challenge: Two-Factor Authentication The rising incidence of account hijacking and identity theft has created a challenge for financial organizations that want to secure their data, but still allow clients and staff to conduct transactions online. Two-factor authentication may provide a solution. mark for My Articles similar articles
InternetNews
April 5, 2011
Epsilon Data Breach Exposes Customer Emails Another high-profile data breach has occurred that could expose users to risk - what should you do to protect yourself? mark for My Articles similar articles
InternetNews
March 18, 2011
RSA Hit By Security Breach for SecurID Security vendor RSA admits a breach, should you be worried? mark for My Articles similar articles
Wall Street & Technology
April 18, 2008
Melanie Rodier
Financial Institutions Evaluate Biometrics While financial institutions aren't yet ready for consumer-facing biometrics deployments, these technologies are gaining popularity for behind-the-scenes authentication. mark for My Articles similar articles
InternetNews
November 10, 2010
Data Breach Blindsides First Responders A hacker managed to weasel his or her way into an unsecured database housing the SSNs and other personal information of thousands of Louisiana EMTs. mark for My Articles similar articles
PC World
September 2004
Andrew Brandt
Privacy Watch: Two Passwords Double Your Privacy 'Two-factor authentication' is the computer equivalent of the security provided by a safety deposit box: Neither you nor the bank alone can open the box; both parties need to use their keys at the same time. mark for My Articles similar articles
Registered Rep.
May 24, 2011
Lauren Barack
Cyber-Hackers: Faster, Better Equipped Than You Security should be the responsibility of all employees - not just the chief technology officer, or the principal of an advisory firm. mark for My Articles similar articles
InternetNews
December 23, 2004
Brian Livingston
Protect Your Passwords -- Part 2 USB keys may free us from having to remember passwords at all. mark for My Articles similar articles
CIO
September 18, 2012
Jeff Vance
Free Mobile Apps Put Your BYOD Strategies at Risk When it comes to the BYOD trend, CIOs worry over their lack of control of mobile apps. However, it's not only about rogue mobile apps packing malware that trouble them. IT leaders are also concerned by the risks posed by malware-free mobile apps. mark for My Articles similar articles
PC Magazine
April 19, 2006
Robert Lemos
Password Policies A simple password could be the weak link that leaves your data open to attack. mark for My Articles similar articles
InternetNews
January 14, 2010
Hacker Breaches N.Y. Bank Long Island bank notifying 8,000 customers that their accounts have been compromised. mark for My Articles similar articles
InternetNews
May 1, 2009
Kenneth Corbin
Twitter's Security Woes Continue Celebrity profiles exposed as hacker gains access to Twitter's admin account. mark for My Articles similar articles
CRM
May 2015
Leonard Klie
Data Security Should Be in Everyone's Job Description Protecting valuable customer information should begin in the contact center and end in the executive suite. mark for My Articles similar articles
InternetNews
December 13, 2010
Data Breach Exposes Wisconsin Students' Data The University of Wisconsin became the latest U.S. college to endure a major data breach this year, putting the personal information of 60,000-plus former students and staff members at risk. mark for My Articles similar articles
InternetNews
January 19, 2010
Lincoln Financial Breach Puts 1.2M Users at Risk The financial services company admitted last week that the sharing of usernames and passwords among employees created a security breach that compromised more than 1.2 million customers' personal data. mark for My Articles similar articles
InternetNews
December 17, 2004
Brian Livingston
Protect Your Passwords The plunging cost of memory gives rise to a possible solution to the password-recall problem. mark for My Articles similar articles
The Motley Fool
July 6, 2010
Anders Bylund
Apple Gets Hacked Apple wipes egg off its face and makes one Fool think about safer online security standards. mark for My Articles similar articles
PC Magazine
March 16, 2004
Leon Erlanger
The Weakest Link Even the best-protected networks are vulnerable if employees unwittingly divulge sensitive information. mark for My Articles similar articles
PC Magazine
February 8, 2007
Matthew D. Sarrel
Access Smart Power LogOn Password Manager-USB Card Reader The Access Smart Power LogOn Password Manager bundle will make log-in security relatively pain-free once the interface improves. mark for My Articles similar articles
InternetNews
March 4, 2005
Clint Boulton
ChoicePoint Stops Selling Some of Your Info ChoicePoint scales back its business after a major database breach that exposed the personal information of 145,000 people. Lawmakers are taking action. mark for My Articles similar articles
InternetNews
March 17, 2009
Alex Goldman
Comcast Hustles to Respond After Password Leak Comcast is looking for clues after a hacker - or a bot - leaked customers' account data to Scribd. mark for My Articles similar articles
Bank Systems & Technology
August 30, 2005
Maria Bruno-Britz
Maximum Security Although all industries are susceptible to data theft, the costs in terms of reputation and dollars are particularly steep in financial services, and most banks are taking measures to reduce the risks associated with handling consumer data. mark for My Articles similar articles
CRM
September 2012
Kelly Liyakasa
Cracking the Code on Cyber Crimes Despite efforts to proactively protect customer data, computer intrusions and online fraud are on the rise. mark for My Articles similar articles
Wall Street & Technology
June 13, 2006
Authentication Gets Deeper Deepnet Unified Authentication is a single integrated authentication platform that provisions, manages and verifies all types of authentication, form factors and user credentials that are used for user authentication with Internet services, remote access and enterprise network access. mark for My Articles similar articles
InternetNews
December 20, 2005
Jim Wagner
Guidance Software Investigating Stolen Data Computer forensic specialist Guidance Software found itself on the receiving end of a malicious hacking attack that managed to swipe sensitive information on reportedly thousands of customers. mark for My Articles similar articles
InternetNews
July 20, 2005
Tim Gray
Hackers Head to School in Droves Universities appear to be the new favorite target of hackers, as the University of Southern California becomes the latest to get hit. mark for My Articles similar articles
CIO
March 15, 2002
Sarah D. Scalet
How to Plan for the Inevitable Knowing how to respond to a security incident can save companies time, money and even their reputation. Think you can't afford to create an incident response plan? Think again. Here's a budget-conscious guide to getting started... mark for My Articles similar articles
The Motley Fool
October 23, 2010
Sophia Meng
Google Admits Street View Cars Grabbed Personal Info The search leader is deleting the info and beefing up security measures. mark for My Articles similar articles
The Motley Fool
April 28, 2011
Dayana Yochim
Aaack! My PlayStation's Been Hacked! Sony's massive leak of customers' private information from the PlayStation Network is a reminder that you should watch for signs that you've been the victim of identity theft. If you are a victim, what should you do? mark for My Articles similar articles
InternetNews
May 15, 2009
Alex Goldman
Facebook Attacks Threaten All Web Sites Why would users want your user name and password? Perhaps because it could give them access to your money and your e-mail. mark for My Articles similar articles
Investment Advisor
June 2008
Irace & Mehta
Security in a New Age How to protect your firm from 21st century online criminals mark for My Articles similar articles
InternetNews
January 21, 2009
Richard Adhikari
Cyber Thieves Hit Payment Processor Heartland Experts warn that more attacks may be to come. Observers also say the breach highlights the current state of legislation regarding disclosure when data loss hits corporations. mark for My Articles similar articles
PC World
April 2003
Anne Kandra
Consumer Watch: Manage Passwords Safely -- and Simply Plagued by a plethora of passwords? Here's how to deal with them without driving yourself nuts. mark for My Articles similar articles
PC Magazine
August 31, 2010
Eric Griffith
Password Protection: How to Create Strong Passwords Every password you have is important. Every one. Here's how to make your passwords uncrackable. mark for My Articles similar articles
PC Magazine
November 30, 2004
Sharon Terdeman
AOL Beefs up Security AOL is offering its customers a new premium service -- a two-factor authentication system called PassCode. mark for My Articles similar articles
CRM
October 13, 2015
Oren Smilansky
Sparkcentral Launches Secure Authentication for Social Customer Support Message encryption functions aim to facilitate trusted service interactions on Twitter and Facebook. mark for My Articles similar articles