April 29, 2011 Added by:David Navetta
Beyond litigation risk, treating personal information in the same manner as property could significantly impact the current quid pro quo of the Internet and how information is collected, used and transferred. It will be interesting to follow this case through the next round of discovery...
April 28, 2011 Added by:Rafal Los
What are PSN gamers/users more worried about? Are PSN gamers more worried about their heard-earned trophies and status on their favorite games, or the fact that their personal information and maybe even their credit cards were pilfered?
April 27, 2011 Added by:Jared Carstensen
What this means for those affected: Your name, date of birth, address, billing address and contact details are most likely not going to change - so this information could be as valuable in a year or two to these criminals, as it is now - potentially even more valuable...
April 27, 2011 Added by:Headlines
"We have discovered that between April 17 and April 19, 2011, certain PlayStation Network and Qriocity service user account information was compromised in connection with an illegal and unauthorized intrusion into our network..."
April 25, 2011 Added by:Robert Siciliano
These virtual dollars and virtual goods have real value. Virtual currency includes the points customers receive from retailers, merchants, airlines, hotels, and credit card companies through loyalty programs. These points are the second most traded currency on the planet...
April 25, 2011 Added by:Headlines
The revelations in those documents range from intelligence on the whereabouts of Al Qaeda leaders to the individual stories of often-innocent detainees to the ugly and ineffective improvisations on intelligence gathering within Guantanamo’s operations...
April 22, 2011 Added by:Headlines
The responsibility for protecting personal identifying information is on those who request and store it. All entities that collect personal information need to understand the concept that only they can safeguard our information, and that this safeguarding must be an urgent priority...
April 19, 2011 Added by:Robert Siciliano
Consumers are receiving messages from trusted companies such as 1-800-Flowers, Chase, Hilton and others, letting them know that their e-mail addresses have been exposed. This provides a perfect opportunity for cybercriminals who may try to take advantage of the breach...
April 19, 2011 Added by:Headlines
"There has been a shift in the threat landscape, and organized crime is targeting medium to small-sized businesses in the US. What we're seeing is the bad guys exploiting people who haven't taken basic security considerations into account in their small business..."
April 14, 2011 Added by:Headlines
"Automattic had a low-level (root) break-in to several of our servers, and potentially anything on those servers could have been revealed... We presume our source code was exposed and copied. While much of our code is Open Source, there are sensitive bits of our and our partners’ code..."
April 12, 2011 Added by:Headlines
The website of application security vendor Barracuda Networks was compromised by a SQL injection attack. The attack appears to have exposed confidential information regarding Barracuda's business partners as well as network login credentials of several employees...
April 12, 2011 Added by:Headlines
The records contained the names and mailing addresses of individuals, Social Security numbers, and to varying degrees also contained other information such as dates of birth or driver’s license numbers...
April 11, 2011 Added by:Alexander Rothacker
Organizations rely on third party providers for numerous responsibilities and often treat them as an extension of their organization. Allowing third party access to ANY information should REQUIRE that they provide the most stringent security measures...
April 11, 2011 Added by:Headlines
Estimations indicated that the names, email addresses and telephone numbers of at least 420 thousand clients have been compromised, and that the login credentials, financial information, and credit scores for as many as thirteen thousand accounts may also have been exposed...
April 08, 2011 Added by:Headlines
"I was acting on behalf of the United States Secret Service and that I was authorized and directed to engage in the conduct I committed as part of my assignment to gather intelligence and seek out international cybercriminals. I now know and understand that I have been used as a scapegoat..."
April 05, 2011 Added by:Headlines
As the Epsilon data breach continues to grow to epic proportion, with the latest reports estimating that the client data of at least fifty major company's has been compromised, Tom Brewster has published an article with his list of the top ten most embarrassing data breaches to date...
White House Website Includes Unique Non-Cook... makejoh makejoh on 07-28-2014
EBS Encryption: Enhancing the Amazon Web Ser... makejoh makejoh on 07-28-2014
Security and the Internet of Things... makejoh makejoh on 07-28-2014