How hackers stole the personal data of 37 million T-Mobile customers

The criminals took advantage of an API to grab personal details such as customer names, billing addresses, email addresses, phone numbers, dates of birth, and T-Mobile account numbers.
The post How hackers stole the personal data of 37 million T-Mobile… Continue reading How hackers stole the personal data of 37 million T-Mobile customers

Small Business Cybersecurity: What Will Be Different in 2022?

Every year, new tips come out about small business cybersecurity. But the advice for 2022 isn’t all that different from previous years.  For instance, the U.S. Small Business Administration (SBA) talks about phishing, viruses, ransomware, strong passwords and protecting confidential information this year. Their tips on staying safe are an excellent resource that businesses should […]

The post Small Business Cybersecurity: What Will Be Different in 2022? appeared first on Security Intelligence.

Continue reading Small Business Cybersecurity: What Will Be Different in 2022?

Roundup: Customer Data and Retail Security in the News

More people are shopping online than ever before due to the pandemic. Therefore, businesses had to take extra steps to protect customer data, combat fraud and implement the latest in online safety. In 2020, e-commerce retail sales jumped from 16% to 19%, according to data from United Nations trade and development experts from UNCTAD.  In the […]

The post Roundup: Customer Data and Retail Security in the News appeared first on Security Intelligence.

Continue reading Roundup: Customer Data and Retail Security in the News

What’s Behind the Leaks of Customer Data From Retailer Databases?

Retail data breaches involving customer data happen often today. However, they tend to be smaller insize than health care, finance or government breaches. So, the general public notices them less. Yet, they happen more often than realized. Why? And how can you defend against them?  Human Error in Customer Data Theft All types of retail […]

The post What’s Behind the Leaks of Customer Data From Retailer Databases? appeared first on Security Intelligence.

Continue reading What’s Behind the Leaks of Customer Data From Retailer Databases?

Is It Ethical To Buy Breached Data?

Research that’s done on malicious breaches of data presents a unique conundrum for the security professionals who are doing the investigating: should access to sets of breached raw data become available to public users and, if so, how? In light … Continue reading Is It Ethical To Buy Breached Data?

Getting Started With Cloud Data Protection

Warning: Businesses can get addicted to the cloud. It might start with a small experiment; just one application and no critical data. Next, scattered employees start messing around in the cloud, shadow IT-style. In the end, all your data has gone clou… Continue reading Getting Started With Cloud Data Protection

Pharma Giant Pfizer Leaks Customer Prescription Info, Call Transcripts

Hundreds of medical patients taking cancer drugs, Premarin, Lyrica and more are now vulnerable to phishing, malware and identity fraud. Continue reading Pharma Giant Pfizer Leaks Customer Prescription Info, Call Transcripts