Data theft News
June 21, 2018
The DOJ has officially charged the accused CIA leaker, Joshua Schulte, with theft of government property and gathering national defense information in the Vault 7 case.
February 08, 2018
The U.S. Department of Justice announced the shutdown of the Infraud Organization, which authorities claim is responsible for global cyberfraud losses in excess of $530 million.
January 12, 2018
News roundup: The hacking group called Fancy Bears claims to have hacked the Olympics again. Plus, a former NSA contractor pleads guilty to stealing government data, and more.
December 19, 2017
Google Project Zero's Tavis Ormandy discovered a flaw in the Keeper password manager browser extension that could allow attackers to steal credentials.
Data theft Get Started
Bring yourself up to speed with our introductory content
Preparing to take the CCSP exam? This Domain 3 practice quiz tests your understanding of cloud risk assessment, threat analysis, infrastructure security and more. Continue Reading
Microsoft offers Windows Defender Antivirus as its native tool to prevent malware attacks. Discover how it works and what advanced protections it provides. Continue Reading
Database vendors have beefed up the security tools in their software -- and that's a good thing because attackers are increasingly targeting database systems to steal sensitive data. Continue Reading
Evaluate Data theft Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Industrial espionage is on the rise, and more data means more risk. Find out how to control the growth of data stores and secure your organization's most valuable assets. Continue Reading
Enterprises should broaden their threat monitoring to include dark web sites. Expert Matt Pascucci explains why it's important, and what enterprises can learn from the dark web. Continue Reading
There are many risks associated with data sharing across devices and services, which is why using data encryption in the cloud is so important. Continue Reading
Manage Data theft
Learn to apply best practices and optimize your operations.
IP theft is often committed by insiders or disgruntled employees who feel entitled to information. Peter Sullivan explains the threat and how to prevent these insider attacks. Continue Reading
Myles Bray of ForeScout compiled IoT security predictions from Ayelet Kutner, Jon Connet and Bob Reny, revealing what security threats organizations may see over the next year. Continue Reading
Expert Judith Myerson explains how IP theft can happen despite the cryptographic protections in IEEE standard P1735, as well as what can be done to protect intellectual property. Continue Reading
Problem Solve Data theft Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The proof-of-concept PINLogger attack exploits mobile device sensors to steal PINs. Nick Lewis explains how the attack works and offers advice on how to stop it. Continue Reading
Criminals have turned encryption technology against businesses, and IT ops have to fight and sidestep ransomware attacks with basic best practices. Continue Reading
Pegasus malware used to only target iOS devices, but a variant called Chrysaor now goes after Android devices, too. Expert Michael Cobb explains what users need to know about it. Continue Reading