Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Computer security
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
===Large corporations=== Large corporations are common targets. In many cases attacks are aimed at financial gain through [[identity theft]] and involve [[data breach]]es. Examples include the loss of millions of clients' credit card and financial details by [[Home Depot]],<ref>{{cite news |first=Melvin |last=Backman |date=18 September 2014 |title=Home Depot: 56 million cards exposed in breach |publisher=[[CNNMoney]] |url=https://money.cnn.com/2014/09/18/technology/security/home-depot-hack/ |url-status=live |archive-url=https://web.archive.org/web/20141218221105/https://money.cnn.com/2014/09/18/technology/security/home-depot-hack/ |archive-date=18 December 2014 }}</ref> [[Staples Inc.|Staples]],<ref>{{cite magazine |url=http://fortune.com/2014/12/19/staples-cards-affected-breach/ |title=Staples: Breach may have affected 1.16 million customers' cards |magazine=Fortune.com |date=19 December 2014 |access-date=21 December 2014 |url-status=live |archive-url=https://web.archive.org/web/20141221160612/http://fortune.com/2014/12/19/staples-cards-affected-breach/ |archive-date=21 December 2014 }}</ref> [[Target Corporation]],<ref>{{cite news|author=<!--Not stated.-->|title=Target: 40 million credit cards compromised|url=https://money.cnn.com/2013/12/18/news/companies/target-credit-card/index.html|access-date=29 November 2017|work=CNN|date=19 December 2013|url-status=live|archive-url=https://web.archive.org/web/20171201035530/https://money.cnn.com/2013/12/18/news/companies/target-credit-card/index.html|archive-date=1 December 2017}}</ref> and [[Equifax]].<ref>{{cite news|last1=Cowley|first1=Stacy|title=2.5 Million More People Potentially Exposed in Equifax Breach|url=https://www.nytimes.com/2017/10/02/business/equifax-breach.html|access-date=29 November 2017|work=The New York Times|date=2 October 2017|url-status=live|archive-url=https://web.archive.org/web/20171201054900/https://www.nytimes.com/2017/10/02/business/equifax-breach.html|archive-date=1 December 2017}}</ref> Medical records have been targeted in general identify theft, health insurance fraud, and impersonating patients to obtain prescription drugs for recreational purposes or resale.<ref>{{cite news|url=https://www.reuters.com/article/us-cybersecurity-healthcare-fbi-exclusiv-idUSBREA3M1Q920140423|title=Exclusive: FBI warns healthcare sector vulnerable to cyber attacks|first=Jim|last=Finkle|date=23 April 2014|newspaper=Reuters|access-date=23 May 2016|url-status=live|archive-url=https://web.archive.org/web/20160604120725/http://www.reuters.com/article/us-cybersecurity-healthcare-fbi-exclusiv-idUSBREA3M1Q920140423|archive-date=4 June 2016}}</ref> Although cyber threats continue to increase, 62% of all organizations did not increase security training for their business in 2015.<ref>{{Cite news|url=https://www.infosecurity-magazine.com/news/lack-of-employee-security-training/|title=Lack of Employee Security Training Plagues US Businesses|last=Seals|first=Tara|date=6 November 2015|work=Infosecurity Magazine|access-date=8 November 2017|url-status=live|archive-url=https://web.archive.org/web/20171109081033/https://www.infosecurity-magazine.com/news/lack-of-employee-security-training/|archive-date=9 November 2017}}</ref> Not all attacks are financially motivated, however: security firm [[HBGary Federal]] had a serious series of attacks in 2011 from [[Hacktivism|hacktivist]] group [[Anonymous (group)|Anonymous]] in retaliation for the firm's CEO claiming to have infiltrated their group,<ref>{{cite web |last=Bright |first=Peter |url=https://arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars/ |title=Anonymous speaks: the inside story of the HBGary hack |publisher=Arstechnica.com |date=15 February 2011 |access-date=29 March 2011 |url-status=live |archive-url=https://web.archive.org/web/20110327045801/http://arstechnica.com/tech-policy/news/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack.ars |archive-date=27 March 2011 }}</ref><ref>{{cite web |last=Anderson |first=Nate |url=https://arstechnica.com/tech-policy/news/2011/02/how-one-security-firm-tracked-anonymousand-paid-a-heavy-price.ars/ |title=How one man tracked down Anonymous{{snd}}and paid a heavy price |publisher=Arstechnica.com |date=9 February 2011 |access-date=29 March 2011 |url-status=live |archive-url=https://web.archive.org/web/20110329090824/http://arstechnica.com/tech-policy/news/2011/02/how-one-security-firm-tracked-anonymousand-paid-a-heavy-price.ars |archive-date=29 March 2011 }}</ref> and [[Sony Pictures]] was [[Sony Pictures hack|hacked in 2014]] with the apparent dual motive of embarrassing the company through data leaks and crippling the company by wiping workstations and servers.<ref>{{cite web |url=https://money.cnn.com/2014/12/24/technology/security/sony-hack-facts/ |title=What caused Sony hack: What we know now |first=Jose |last=Palilery |website=[[CNN Money]] |date=24 December 2014 |access-date=4 January 2015 |url-status=live |archive-url=https://web.archive.org/web/20150104195455/https://money.cnn.com/2014/12/24/technology/security/sony-hack-facts/ |archive-date=4 January 2015 }}</ref><ref>{{cite news |first=James |last=Cook |date=16 December 2014 |url=http://www.businessinsider.com/the-sony-hackers-still-have-a-massive-amount-of-data-that-hasnt-been-leaked-yet-2014-12 |title=Sony Hackers Have Over 100 Terabytes Of Documents. Only Released 200 Gigabytes So Far |work=[[Business Insider]] |access-date=18 December 2014 |url-status=live |archive-url=https://web.archive.org/web/20141217204735/http://www.businessinsider.com/the-sony-hackers-still-have-a-massive-amount-of-data-that-hasnt-been-leaked-yet-2014-12 |archive-date=17 December 2014 }}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)