Security News

The other hacking scandal: Suppressed report reveals that law firms, telecoms giants and insurance companies routinely hire criminals to steal rivals' information
2013-06-25 07:26

http://www.independent.co.uk/news/uk/crime/the-other-hacking-scandal-suppressed-report-reveals-that-law-firms-telecoms-giants-and-insurance-companies-routinely-hire-criminals-to-steal-rivals-inform...

Confidential report lists U.S. weapons system designs compromised by Chinese cyberspies
2013-05-28 06:40

http://www.washingtonpost.com/world/national-security/confidential-report-lists-us-weapons-system-designs-compromised-by-chinese-cyberspies/2013/05/27/a42c3e1c-c2dd-11e2-8c3b-0b5e9247e8ca_story.htm...

Chinese military cyberattacks targeting civil sectors: report
2013-04-29 05:27

http://focustaiwan.tw/news/aall/201304270016.aspx By Wen Kuei-hsiang and Elizabeth Hsu Focus Taiwan 2013/04/27

SQL injection flaws easy to find and exploit, Veracode report finds
2013-04-09 07:19

http://news.techworld.com/security/3440950/sql-injection-flaws-easy-find-exploit-veracode-report-finds/ By John E Dunn Techworld 08 April 2013

University of Florida reports patient identity theft ring
2013-04-05 07:51

http://healthitsecurity.com/2013/04/04/university-of-florida-reports-patient-identity-theft-ring/ By Patrick Ouellette Health IT Security April 4, 2013

Y-12 security breach detailed by former contractor in report
2013-03-18 06:54

http://www.wbir.com/news/article/259768/2/Y-12-security-breach-detailed-by-former-contractor-in-report WBIR.com Mar 15, 2013

PA health system reports 144-patient data, identity theft
2013-03-14 08:10

http://healthitsecurity.com/2013/03/13/pa-health-system-reports-144-patient-data-identity-theft/ By Patrick Ouellette Health IT Security March 13, 2013

Hitachi and Siemens data-stalking firm not bugged by security bods' report
2013-03-13 06:19

http://www.theregister.co.uk/2013/03/12/open_source_monitoring_software_bug/ By John Leyden The Register 12th March 2013

Cyber-Attackers Most Often Target Nine Business Apps: Research Report
2013-02-25 10:11

http://www.eweek.com/security/cyber-attackers-most-often-target-nine-business-apps-research-report/ By Robert Lemos eWEEK.com 2013-02-23

Firms struggling to secure trust infrastructure,	finds Ponemon report
2013-02-21 06:21

http://news.techworld.com/security/3427453/firms-struggling-secure-trust-infrastructure-finds-ponemon-report/ By John E Dunn Techworld 20 February 2013