March 18, 2011 Added by:Headlines
"Our investigation has led us to believe that the attack is in the category of an APT... and revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is specifically related to RSA's SecurID two-factor authentication products..."
March 04, 2011 Added by:Robert Siciliano
According to the ITRC, there were at least 662 data breaches in 2010, which exposed more than 16 million records. Nearly two-thirds of breaches exposed Social Security numbers, and 26% involved credit or debit card data. The majority of these attacks were malicious hacks or insider theft...
March 01, 2011 Added by:Dan Dieterle
New research shows that secure erase programs used on standard hard drives to wipe important data do not completely erase solid-state (SSD) drives and USB thumb drives. As much as 75 percent of the data could remain after a successful secure wipe...
February 28, 2011 Added by:Headlines
Attrition.org has been highly critical of both LIGATT and the company's principal Gregory Evans, the self-proclaimed "world's greatest hacker" who has been the subject of well documented allegations of plagiarism, among other scathing criticisms...
February 17, 2011 Added by:Scot Terban
What Barr seemed to not comprehend is that the Internet is a stochastic system, and it is impossible to do what he wanted with any kind of accuracy. At least in the way he wanted to do it, you see, it takes some investigation skills to make the connections that a scripted process cannot...
February 15, 2011 Added by:Lee Mangold
Lush operates many web portals around the world providing beauty supplies. After their last breech, I decided to find out a little more about the company out of genuine interest about the company (rather than the breech). The first thing I noticed was that their lush.co.uk site was offline...
February 03, 2011 Added by:Rafal Los
Even if your customers don't hold you accountable for a breach - how long will you be down as a result, and how much will that cost you in sales? Compare that against the cost of doing the right thing and applying proper security to the sites you build - I bet the ROI is there...
January 29, 2011 Added by:Anthony M. Freed
Heartland Payment Systems (HPY) and Federal investigators have released more details about the nature of the massive data breach made public last week, but have refused to pinpoint the exact date that Heartland first became aware there may have been a problem with their network security...
January 29, 2011 Added by:Headlines
When the smart card is inserted into a compromised PC, the hackers use the opportunity to attempt to access the server. When the system requests a digital token, the attackers redirect the request to the compromised PC, which provides the token and password stolen with the keylogger...
January 26, 2011 Added by:Robert Siciliano
The talk show pundits buzz that with the release of thousands of additional secret government documents, it leads to the conclusion that there is no way to protect sensitive data. If the government can’t even prevent a Private in the Army from stealing confidential data, what hope is there?
January 24, 2011 Added by:Headlines
"Website owners should declare if they store your passwords using strong hashing. This is a simple process and not any more expensive to implement, however unfortunately websites not using this method of cryptography is something we see all too often..."
January 20, 2011 Added by:Headlines
The EU Emissions Trading Scheme has suspended all carbon emissions trading until January 26th after hackers breached networks and pilfered millions in pollution credits. The credits stolen form the Czech accounts are estimated to be worth as much as seven million Euros, according to reports...
January 15, 2011 Added by:Rafal Los
Apparently through a combination of social engineering of casino floor workers, and "a software glitch" (affectionately referred to as a bug) this group of people was able to steal some very real money. The short of is that they were caught because they got greedy, as they always do...
January 13, 2011 Added by:Headlines
The breadth and volume of personal data collected by universities, coupled with high turnover and a financially un-savvy population, makes the problem of data loss at these institutions nearly epidemic in nature...
January 12, 2011 Added by:Headlines
IBM's DeveloperWorks website was breached by hackers over the weekend. The messages left by the hacker(s) read: "Defaced by Hmei7," and, "You have been Hacked !!!, not because of your stupidity That's because we love you, and we want to warn you That your web still has large of vulnerability."
January 10, 2011 Added by:Headlines
Kevin Kelly, a former test engineer with EMC, has plead guilty to making off with almost one million dollars worth of equipment. Kelly concealed the hardware in a duffel bag and then he sold it on the internet. Most of the stolen goods were sold to BL Trading, a Massachusetts-based reseller...
Why Bother with Security? [If you’re going... Westley McDuffie on 12-12-2013
Are Security Professionals Exiting the Enter... Westley McDuffie on 12-12-2013
The Security Risks of Remote Support Tools ... Amanda Martin on 12-11-2013