How to hack
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
Hacker hands
password typist
virtual private network (VPN)
Hacked’s Wiki
Trending Topics
Posts Tagged ‘Office of Personnel Management’
Most Recent
Read More
September 8, 2016

OPM Breach: How Officials Missed a Second Hacker

US officials were too focused on purging a hacker from government’s computers after closely monitoring the hacker’s online movements for months and were about to expel him that they failed to realize that there was another hacker entirely.

Read More
December 15, 2015

2015: The Year Of The Breach; Close To 200 Million Personal Records Exposed

This year will go down as the year of the personal data breach. Consumers all over the world are learning their personal information is not safe with businesses, health insurers, financial institutions, the government, and even the educational sphere. Estimates of the number of personal records exposed in 2015 range from 176 million to more than 193 million from about 730 breaches.

Research indicates hackers are concentrating on medical and health care sectors that store patient data that cannot be replicated like credit card data.

The Identity Theft Resource Center (ITRC) data breach report tracks seven types of data losses: hacking, data on the move, insider theft, [...]

Read More
September 23, 2015

Hackers Net 5.6 Million Fingerprint Records In U.S. Government Breach

The U.S. government reported hackers got away with about 5.6 million fingerprint records, 4.5 million more than first reported, according to Reuters. The hackers stole security clearance data on millions of Defense Department and other U.S. government employees.

The change in number was reported by the Office of Personnel Management (OPM) as a result of an analysis of the data breach. An estimated 21.5 million people had Social Security identification numbers and other information stolen in the hacking incident his spring, the OPM estimated. The recent discovery of additional missing fingerprints has not affected the total number of people affected by the breach.

Chinese [...]
How to Hack
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
Press Releases
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
SecurityScorecard Announces Data Science Partnership with Columbia University