Roman is the former News Writer for Information Security Media Group. Having worked for multiple publications at The College of New Jersey, including the College's newspaper "The Signal" and alumni magazine, Roman has experience in journalism, copy editing and communications.
Web-hosting provider DreamHost reset all FTP/shell passwords for its customers after a hacker gained access to certain unencrypted passwords. The company hosts more than 1 million domains.
The hacker group Anonymous claims it's responsible for denial of service attacks on U.S. Justice Department websites after federal authorities shut down file-sharing websites, including Megaupload.com, and arrested some of its leaders.
Recently discovered viruses, consisting of Trojans and other malware, at City College of San Francisco have stolen personal banking information and other data from perhaps tens of thousands of students, faculty and administrators, says John Rizzo, president of the board of trustees.
Zappos.com and its parent company Amazon.com face a class action lawsuit stemming from a recent data breach that affected more than 24 million customers.
Improved collaboration and communication between small businesses and financial institutions is the first step toward improving online security, says Mark Patterson, an ACH fraud victim. What else would help?
A group of Saudi Arabian hackers, identified as "Nightmare," conducted distributed denial-of-service attacks Jan. 16 against the Tel Aviv Stock Exchange and El Al, Israel's national carrier.
Online shoe and clothing retailer Zappos.com has issued an e-mail alert to more than 24 million customers regarding a newly-discovered data breach of an internal network.
Intel CISO Malcolm Harkins explains why Intel embraced the bring-your-own-device trend and made it part of a strong mobile technology policy that revolves around employee accountability.
Financial institutions still have a long way to go to fight fraud and mitigate online banking vulnerabilities. But what exactly are the top vulnerabilities, and what can institutions do about them?
When the Commonwealth of Pennsylvania suffered a major security breach a few years back, vulnerabilities in a Web application were to blame. CISO Erik Avakian explains how the state developed a process to correct flaws in application code.
The current breach notification landscape is rocky, with 47 U.S. states each having different notification requirements, as well as conflicting global breach legislation causing further disharmony. How can global organizations overcome these breach notification challenges in their compliance efforts?
Having a breach response team in place at your organization is a necessity in today's threat environment. But how - before a breach occurs - do you know if your team is truly effective?
More than 200,000 payment card accounts have been compromised in a data breach at Restaurant Depot, a food service wholesaler. How did the breach occur, and what have customers been told about the incident?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.eu, you agree to our use of cookies.