The inside job, affecting 40% of the country's population, has been traced back to one IT guy inside a credit bureau plus some dodgy data buyers, who've also been arrested.
Microsoft says it's fast-tracking the encryption of consumer data and moving toward greater source-code transparency. It sounds good on paper, though there are those who question why Skype, for one, was left off the list and how in the world we can trust a for-profit software maker.
JP Morgan Chase is the latest financial institution to own up to a data breach.
The details are still scanty, but it looks as though it happened back in July, wasn't noticed until September and was only owned up to in December...
Guess how many times "123456" was used as a password by users. If you answered "close to 2 million times," you win! Now guess which online dating site service has decided to encrypt customer records using salting and hashing in future.
Forum software vendor vBulletin has owned up to a username-and-password breach on its forum.
Guess which forum software the company uses?
Why shouldn't you store unencrypted credit card numbers? How can you squeeze a positive result from a password breach? What sort of pressure was on the cryptanalysts at Bletchley Park?
Find out the answers in just one minute!
A threat that doesn't just attack, but asks you to put in a password first?
Sounds weird, but the trick worked for malware in the past, and is now being used in phishing
Fraser Howard of SophosLabs explains...
Remote wiping? Encryption? Secure passcode? Here are 10 tips to ensure you keep your smartphone just as secure as your PC.
Google is stepping up efforts to toughen data encryption in an effort to limit unofficial snooping on user information in the wake of the revelations about the NSA and PRISM.
What happened to LastPass that it needed a patch? How do Philips wireless lights handle security? What will become of Bradley Manning? And what has Wikileaks been up to lately?
Take a look at 60 Second Security and find out!
The Internet Engineering Task Force is planning changes to the fundamental protocol that powers the web to make it more resistant to surveillance.
The company pre-emptively shut down Silent Mail in anticipation of the US government getting its hands on the metadata inevitably associated with email. The move came directly after Lavabit—former email service of whisteleblower Edward Snowden—shut down amidst legal wranglings.
If you're interested in webmail security, you've probably heard of Lavabit. It uses public key cryptography to keep your messages private even though they're stored "in the cloud."
At least, it used to. The operator of the service recently suspended it, citing legal issues he can't disclose...
News, opinion, advice and research: Chet and Duck bring you their unique and entertaining combination of all four in their regular quarter-hour podcast.
Why not give it a quick listen?
Vermont and North Dakota have recently bolstered their data breach notification laws to cover more organizations and additional types of personal information. Meanwhile Michigan lost 49,000 people's names, birth dates and cancer screening records and claims they aren't protected information.
The Cryptocat project is apologizing and urging users to update immediately.
Founder and developer Nadim Kobeissi took to a live stream to address questions from a show in Germany.
Lias Vaas investigates...
The sheriff's office in King's County, Seattle, was in the process of adding encryption software this past spring and as of March had done so on 60% of all computers.
The laptop that got stolen from a detective's truck, unfortunately, was in the 40%, and that's why 6,300 people are now looking at the potential of identity theft.
In a case that could have far-reaching implications for compelling criminal suspects to decrypt digital storage devices, a judge on Tuesday temporarily suspended a previous order that would have compelled the decryption of hard drives suspected of containing child pornography.