ITworld Data Protection http://www.itworld.com/taxonomy/term/19016/all en Apple blames leaked nude celebrity photos on 'targeted attack' http://www.itworld.com/security/434278/apple-blames-leaked-nude-celebrity-photos-targeted-attack A targeted attack focused on user names, passwords and security questions of Apple accounts gave hackers access to nude photos of celebrities that were then leaked over the weekend on the Internet, the company said Tuesday.<p><a href="http://www.itworld.com/security/434278/apple-blames-leaked-nude-celebrity-photos-targeted-attack" target="_blank">read more</a></p> http://www.itworld.com/security/434278/apple-blames-leaked-nude-celebrity-photos-targeted-attack#comments Data Protection Endpoint Security Security News Tue, 02 Sep 2014 19:17:35 +0000 IDGNS staff 434278 at http://www.itworld.com Home Depot breach could potentially be as big as Target's http://www.itworld.com/data-protection/434276/home-depot-breach-could-potentially-be-big-targets In what could turn out to be another huge data breach, Home Depot on Tuesday confirmed that it is investigating a potential compromise of credit card and debit card data belonging to an unspecified number of customers.<p><a href="http://www.itworld.com/data-protection/434276/home-depot-breach-could-potentially-be-big-targets" target="_blank">read more</a></p> http://www.itworld.com/data-protection/434276/home-depot-breach-could-potentially-be-big-targets#comments Data Protection Security News Wed, 03 Sep 2014 00:54:30 +0000 IDGNS staff 434276 at http://www.itworld.com Home Depot investigates possible payment data breach http://www.itworld.com/security/434262/home-depot-investigates-possible-payment-data-breach Home Depot said Tuesday it was investigating a possible breach of its systems holding customer payment information tied to credit and debit cards.<p><a href="http://www.itworld.com/security/434262/home-depot-investigates-possible-payment-data-breach" target="_blank">read more</a></p> http://www.itworld.com/security/434262/home-depot-investigates-possible-payment-data-breach#comments Data Protection Security News Tue, 02 Sep 2014 19:59:39 +0000 IDGNS staff 434262 at http://www.itworld.com Industrial software website used in watering hole attack http://www.itworld.com/data-protection/434193/industrial-software-website-used-watering-hole-attack AlienVault Labs has discovered a watering hole attack that&#039;s using a framework developed for reconnaissance as the primary infection vector.<p><a href="http://www.itworld.com/data-protection/434193/industrial-software-website-used-watering-hole-attack" target="_blank">read more</a></p> http://www.itworld.com/data-protection/434193/industrial-software-website-used-watering-hole-attack#comments Data Protection Security Software News Tue, 02 Sep 2014 20:35:15 +0000 IDGNS staff 434193 at http://www.itworld.com Why hackers may be stealing your credit card numbers for years http://www.itworld.com/security/434118/why-hackers-may-be-stealing-your-credit-card-numbers-years While conducting a penetration test of a major Canadian retailer, Rob VandenBrink bought something from the store. He later found his own credit card number buried in its systems, a major worry.<p><a href="http://www.itworld.com/security/434118/why-hackers-may-be-stealing-your-credit-card-numbers-years" target="_blank">read more</a></p> http://www.itworld.com/security/434118/why-hackers-may-be-stealing-your-credit-card-numbers-years#comments Data Protection Security News Tue, 02 Sep 2014 01:06:46 +0000 IDGNS staff 434118 at http://www.itworld.com Preventing Data Breaches with Data Access Governance http://www.itworld.com/data-protection/433810/preventing-data-breaches-data-access-governance <!--paging_filter--><p> Discover how a real-life data access scenario is solved. Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.</p> Data Protection IT Management Security Fri, 29 Aug 2014 15:47:34 +0000 433810 at http://www.itworld.com Preventing Data Breaches with Data Access Governance http://www.itworld.com/data-protection/433810/preventing-data-breaches-data-access-governance <!--paging_filter--><p> Discover how a real-life data access scenario is solved. Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.</p> Data Protection IT Management Security Fri, 29 Aug 2014 15:47:34 +0000 433810 at http://www.itworld.com Preventing Data Breaches with Data Access Governance http://www.itworld.com/data-protection/433810/preventing-data-breaches-data-access-governance <!--paging_filter--><p> Discover how a real-life data access scenario is solved. Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.</p> Data Protection IT Management Security Fri, 29 Aug 2014 15:47:34 +0000 433810 at http://www.itworld.com Preventing Data Breaches with Data Access Governance http://www.itworld.com/data-protection/433810/preventing-data-breaches-data-access-governance <!--paging_filter--><p> Discover how a real-life data access scenario is solved. Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.</p> Data Protection IT Management Security Fri, 29 Aug 2014 15:47:34 +0000 433810 at http://www.itworld.com Preventing Data Breaches with Data Access Governance http://www.itworld.com/data-protection/433810/preventing-data-breaches-data-access-governance <!--paging_filter--><p> Discover how a real-life data access scenario is solved. Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.</p> Data Protection IT Management Security Fri, 29 Aug 2014 15:47:34 +0000 433810 at http://www.itworld.com Preventing Data Breaches with Data Access Governance http://www.itworld.com/data-protection/433810/preventing-data-breaches-data-access-governance <!--paging_filter--><p> Discover how a real-life data access scenario is solved. Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.</p> Data Protection IT Management Security Fri, 29 Aug 2014 15:47:34 +0000 433810 at http://www.itworld.com Preventing Data Breaches with Data Access Governance http://www.itworld.com/data-protection/433810/preventing-data-breaches-data-access-governance <!--paging_filter--><p> Discover how a real-life data access scenario is solved. Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.</p> Data Protection IT Management Security Fri, 29 Aug 2014 15:47:34 +0000 433810 at http://www.itworld.com Preventing Data Breaches with Data Access Governance http://www.itworld.com/data-protection/433810/preventing-data-breaches-data-access-governance <!--paging_filter--><p> Discover how a real-life data access scenario is solved. Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.</p> Data Protection IT Management Security Fri, 29 Aug 2014 15:47:34 +0000 433810 at http://www.itworld.com Preventing Data Breaches with Data Access Governance http://www.itworld.com/data-protection/433810/preventing-data-breaches-data-access-governance <!--paging_filter--><p> Discover how a real-life data access scenario is solved. Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.</p> Data Protection IT Management Security Fri, 29 Aug 2014 15:47:34 +0000 433810 at http://www.itworld.com Preventing Data Breaches with Data Access Governance http://www.itworld.com/data-protection/433810/preventing-data-breaches-data-access-governance <!--paging_filter--><p> Discover how a real-life data access scenario is solved. Learn how to gain a clear picture of who has access to your data and avoid the risk of a data breach.</p> Data Protection IT Management Security Fri, 29 Aug 2014 15:47:34 +0000 433810 at http://www.itworld.com