Websense Security Labs Blog

Websense Security Labs discovers, investigates and reports on advanced Internet threats that traditional security
research methods miss.

Latest Blog Posts

View all posts > 

Data loss tagged in these posts

Eight Security Predictions for 2014

Posted: 14 Nov 2013 03:18 PM | Elisabeth Olsen | no comments

2013 was not an easy year in cybersecurity—and we expect 2014 attacks will be even more complex. In a new report out today, Websense Security Labs researchers collectively outlined eight predictions and recommendations for 2014. To read the full report, please visit www.websense.com/2014predictions...


Filed under: , , , , , , ,

2013 Threat Report: More Than Scary Stats and Chilling Charts

Posted: 13 Feb 2013 08:30 AM | Carl Leonard | no comments

The 2013 Threat Report from the Websense® Security Labs™ is now available.


The report details mobile, social, email and web-based threats, and while it is full of ominous data points, it is a very interesting read. The report is designed to help security professionals keep current with threat trends and improve the effectiveness of existing security solutions. It can also be used to identify and prioritize security gaps that may require new approaches and more innovative strategies.


Creating the report began with the ThreatSeeker® Network, composed of big data clusters used by the WSL to collect and manage up to 5 billion inputs each day from 900 million global endpoints. Malware samples, mobile applications, email content, web links and other information were then passed through deep analysis processes including our Advanced Classification Engine (ACE), which applied over 10,000 different analytics.




Filed under: , , , , , , , , , , , , , ,

Reports of 6.4 Million Stolen LinkedIn Passwords

Posted: 06 Jun 2012 03:44 PM | Carl Leonard | 1 comment(s)

LinkedIn is investigating reports that approximately 6.4 million user passwords have been posted on the Web. While the breach is still unconfirmed by LinkedIn (as of the time that we wrote this blog), they have acknowledged on their Twitter feed that their investigations have begun.

If you're a LinkedIn user, Websense® Security Labs recommends that you change your password immediately to help prevent your password from falling into the wrong hands.


After retrieving the password files that are being distributed on forums in the .ru TLD space, it appears that the passwords are hashed. However, based on samples seen by us, it is easy to translate them into clear text. Our initial investigations reveal that a password of "linkedin" features heavily.

It is uncertain how the hackers retrieved the stolen passwords; however, the passwords that users are finding in the hashed files do appear to be real.



Filed under: , , ,

Chinese Internet Suffers the Most Serious User Data Leak in History

Posted: 27 Dec 2011 03:23 AM | Xue Yang | no comments

Last week, China's largest software programmers' Web site CSDN (China Software Developer Network) was hacked, and account information for more than 6 million users was leaked and quickly spread via the Internet. One day later, Tianya, the biggest Chinese online forum, was reportedly hacked for the account information of 40 million users. This cyber attack has continued, with several well-known sites like the Duowan game, the 7k7k game, the e-commerce sites 360buy and Dangdang, the popular dating sites like Zhenai being hacked and user data leaked. Some sites' databases have been published on the Internet and can be easily downloaded.



Filed under: , ,

Epsilon Data Breach

Posted: 04 Apr 2011 09:25 AM | Carl Leonard | 1 comment(s)

On Friday 1 April 2011 Epsilon, a marketing services firm, notified their customers of "unauthorised entry into email system" .  Their press release can be seen here.

The press release advises that the information stolen during the attack included only customer email addresses and customer names.

In the wrong hands however even this limited amount of information can have consequences for those to whom the data pertains.  We shall explore some typical scenarios.



Filed under: , ,