April 12, 2011 Added by:Headlines
The records contained the names and mailing addresses of individuals, Social Security numbers, and to varying degrees also contained other information such as dates of birth or driver’s license numbers...
April 11, 2011 Added by:Alexander Rothacker
Organizations rely on third party providers for numerous responsibilities and often treat them as an extension of their organization. Allowing third party access to ANY information should REQUIRE that they provide the most stringent security measures...
April 11, 2011 Added by:Headlines
Estimations indicated that the names, email addresses and telephone numbers of at least 420 thousand clients have been compromised, and that the login credentials, financial information, and credit scores for as many as thirteen thousand accounts may also have been exposed...
April 08, 2011 Added by:Headlines
"I was acting on behalf of the United States Secret Service and that I was authorized and directed to engage in the conduct I committed as part of my assignment to gather intelligence and seek out international cybercriminals. I now know and understand that I have been used as a scapegoat..."
April 05, 2011 Added by:Headlines
As the Epsilon data breach continues to grow to epic proportion, with the latest reports estimating that the client data of at least fifty major company's has been compromised, Tom Brewster has published an article with his list of the top ten most embarrassing data breaches to date...
April 04, 2011 Added by:Headlines
Hackers sent emails to a select group of RSA employees with a spreadsheet attachment which contained malware that exploited a flaw in the Adobe software that allowed them the opportunity to glean authentication credentials that enabled access to other systems in the network...
April 04, 2011 Added by:Headlines
The company states that their systems experienced and unauthorized access event that has exposed the names and email addresses of the customers the company's clients serve. Initial reports indicate that no financial data was revealed in the breach...
April 01, 2011 Added by:Bill Gerneglia
Those are some of the findings of the 2010 US Cost of a Data Breach study from the Ponemon Institute. The benchmark study looked at the experiences of 51 US companies in 15 industry sectors; it's the sixth annual such survey done by Ponemon...
March 30, 2011 Added by:Headlines
“By bringing in the NSA, that means they think they’re either dealing with a state-sponsored attack or it’s an extraordinarily capable criminal organization,” said the former head of U.S. counterintelligence Joel Brenner...
March 29, 2011 Added by:Alexander Rothacker
We thought it might be fun to take a look at which higher education institutions would make the “Data Breach Final Four”. Based on the number of reported records breached in 2010, we put together brackets for what we are calling the 2010 Higher Education Data Breach Madness...
March 28, 2011 Added by:Rafal Los
Allow me to point out a little bit of irony in this headline... a website for one of the more popular open-source database alternatives gets completely compromised using blind SQL Injection. Ouch. Someone going by the moniker "Jack Haxor" posted this to the Full Disclosure mailing list...
March 28, 2011 Added by:Headlines
The supposed lone-hacker now claiming responsibility, who dubbed him or herself "Comodohacker", said in their statement that the attack on Comodo was in retaliation for the release of the Stuxnet virus that damaged equipment at Iran's Natanz uranium enrichment facility...
March 27, 2011 Added by:Eric Cissorsky
When IT Security panics, it causes ripple effects throughout the enterprise. In the event this turns out to be a serious breach, you will be credited with keeping your cool and weathering the storm. Overreacting to any security incident can undermine your department's credibility...
March 25, 2011 Added by:Headlines
"This is the second time a well known website has been breached this week – just a few days ago it was Play.com with egg on its face, now it’s TripAdvisor. It’s the regularity of these types of incident that suggest traditional approaches to IT security are no longer fit for purpose..."
March 23, 2011 Added by:Headlines
Forty-five percent of K-12 schools suffered network downtime from malware outbreaks between two and five times per year, while another thirteen percent are impacted between six and ten times per year, and six percent experience more than ten incidents in the same period...
March 18, 2011 Added by:Headlines
"Our investigation has led us to believe that the attack is in the category of an APT... and revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is specifically related to RSA's SecurID two-factor authentication products..."
Good Security Starts at Home... jlukeadan jlukeadan on 04-23-2014
Join Trend Micro & SecurityWeek in Belle... Barbara Daft on 04-23-2014
Mobile Security: Tips for Using Personal Dev... jlukeadan jlukeadan on 04-23-2014