Category: Data Breach

Malware Removal

Why Website Reinfections Happen

We all know someone who’s been in a difficult position following a security breach. They are rushing to assess the damage, while simultaneously repairing website functionality to limit the compromise. It’s a stressful situation, especially if you’ve had to deal with a compromise more than once. Unfortunately for some website owners this is a reality — shortly after the initial security breach, the website becomes compromised again. It leaves the website owner asking why their website is being targeted and how the website re-infection is happening.

The short answer is that it’s most likely due to unresolved vulnerabilities. While it may seem like you’ve been singled out and targeted by some menacing hackers, most of the time that isn’t the case. The majority of website compromises are preceded by automated campaigns that locate websites vulnerable to a particular exploit the hacker wishes to employ. The bottom line is, you aren’t the target that the hacker is singling-out, it’s the software on your website. There are a couple main culprits for this scenario.

Read More

College_Data_Breaches

Prevent Data Breaches from Hitting Your College Campus

The new school semester has begun and is off to a great start. Your students are engaged, prepared and full of spirit. Ready for their first test, they log in to their online student portal to access the exam. Just as the test is about to begin, the website crashes. Panic ensues among the students, who instantly turn to twitter and email for help.

Here’s what happened: The school did not have proper website security in place and consequently was the target of a cyberattack that shut down its website. Higher education institutions are attractive and lucrative targets to cybercriminals. In 2015, the education sector was among the top three sectors breached, behind healthcare and retail. College campuses store a wealth of confidential student and faculty data, including medical records, financial information and intellectual property for products and prescription drugs. Some of the most common attacks cybercriminals use to breach higher education institutions are hacking, malware and DDoS attacks.

Read More

The Cost of a data breach

Calculating the Cost of a Data Breach [Infographic]

The cost of a data breach is rising globally. Learn how different countries and industries are impacted when they’re hit with one.

Read More

Data theft

Here’s How Cyber Criminals Profit From Your Personal Data

Did you know that stores are likely to keep your name, credit card number, address, email address, and even date of birth stored on file for long periods of time? With information like this sitting idle, it often becomes an easy target for cyber criminals. This month, SiteLock is supporting Data Privacy Day on January 28th to create awareness around the importance of privacy and protecting personal information.

Security breaches are on the rise and this trend is not slowing. Over 750 breaches occurred during 2015 with more than 170 million records exposed. The number of breached data records in 2015 nearly doubled the records breached in 2014.

Read More

Russian Hackers Caught With 1 Billion+ Stolen Passwords

Russian hackersSeems like just about everyone thought that the massive Target data breach earlier this year would be the biggest for a while. Yet only a matter of weeks later, eBay announced a data breach that was even bigger.

Now we’re learning of a hacker haul that makes those earlier breaches look like chump change. Security researchers in Milwaukee revealed that they’ve been monitoring a hacking gang operating from a small Russian town, and found the gang had managed to amass a database of more than 1.5 billion stolen credentials.

Here’s just a sample of what the investigators learned about the hackers, and the implications of their haul:

Read More

Don’t Turn Your Visitors Into Victims

identity theftIdentity theft is the number one crime in America, a crime that claims an average of more than a million new victims every 30 days. And many of those victims are as a result of businesses that leak their customer information, usually by accident, and often through their website.

Read More

Powered by WordPress & Theme by Anders Norén