Stolen TARGET Credit Cards and the Black Market: How the Digital Underground works By Ken Westin

29/12/2013 07:19
With the Target data breach, many are wondering how criminals can profit from the use of the stolen credit cards. The card holders themselves will not be responsible for any of the charges, so how is...

Barclays fined $3.75m after record-keeping failure

29/12/2013 07:03
Barclays has been fined $3.75m (£2.28m) by a US regulator for allegedly failing to keep proper electronic records, emails and instant messages. The shortcomings occurred between 2002 and 2012, said...

From online hacks to plastic fakes: The strange life of a stolen credit card - By Keith Wagstaff NBC News

28/12/2013 10:14
   Sven Hoppe / Sven Hoppe/picture-alliance/dpa/ A police officer holds a confiscated counterfeit credit card in Hamburg, Germany, in April 2013, after arresting four people...

Insurance Questions, Lawsuits Arise in Wake of Target’s Data Breach - By Young Ha

24/12/2013 21:07
U.S. retail giant Target Corp. is busy dealing with the aftermath of the massive data breach that exposed account details of some 40 million credit and debit cards. Already, at least two...

2013: The Year of Privacy - By Omer Tene

22/12/2013 11:33
  If there ever was a “year of privacy,” surely it was 2013. A year that ends with selecting“privacy” as “word of the year;” with privacy making front-page headlines...

Target Data Breach Insurance Case Study - By Christine Marciano

20/12/2013 21:59
Target was targeted by data thieves starting on Black Friday during the most busiest holiday shopping season of the year (between Nov. 27 and Dec.15). It seems that data thieves did some shopping...

Target says 40 million credit, debit card accounts may be affected by data breach

19/12/2013 20:49
MINNEAPOLIS –  Target says that about 40 million credit and debit card accounts may have been affected by a data breach that occurred just as the holiday shopping season shifted into high...

Cyber criminals hack into wealth managers to steal millions

17/12/2013 07:00
by Dylan Lobo on Dec 16, Tech-savvy criminals have stolen millions by hacking into wealth managers systems, according to the Financial Times. The paper, which cites research from...

How Could a Data Breach Affect Me?

17/12/2013 06:34
It seems there's a new data breach in the news every few weeks, with personal details expose for thousands or millions of victims. Just how could such a breach affect you? By Neil...

Massive Cyber Bust A Score For Cyber Monday

15/12/2013 23:35
As Cyber Monday ‘scores’ go, it was a pretty big one but certainly not the kind of bargain shoppers were seeking. Law enforcement experts from around the globe shut down over 700 websites...

Is 10 Hours Too Long To Spot A Data Breach?

15/12/2013 23:30
“If you’re in a fight, you need to know that while it’s happening, not after the fact.” These compelling words jump off the page in Needle in a Datastack, a new and chilling report from...

Beazley Breach Response Services 1000th Breach

14/12/2013 20:20
Innovative Insurer becomes the first to manage 1,000 breaches.Beazley, the pioneer in breach response insurance, is currently managing its 1,000th breach. This marks the 1,000th time that...

EU tightens Data Protection Rules

13/12/2013 06:21
Compelling companies to notify supervisory authorities when a breach occurs will drive the growth of cyber insurance in the EU. The Civil Liberties, Justice and Home Affairs (LIBE)...

Data Breach Insurance: Will It Help Or Hurt Your Privacy?

12/12/2013 00:00
If someone steals your credit card number, the issuer doesn't make you pay. They get their money back through user fees and insurance. When I first heard about Beazley's security breach insurance, I...

Cyber Outlook: The must-know sectors for new business

11/12/2013 08:34
The frequency, sophistication and severity of data breaches is set to explode in 2014, according to two new industry reports.  For the savvy insurance producer, that means an increased...
<< 42 | 43 | 44 | 45 | 46

  Bachelor's in Cybercrime


CEO & C-Level Executives 

Role in 

Data Breach Management

click here