Blog Posts Tagged with "breach"

69dafe8b58066478aea48f3d0f384820

Texas Exposes 3.5 Million Resident's Private Information

April 12, 2011 Added by:Headlines

The records contained the names and mailing addresses of individuals, Social Security numbers, and to varying degrees also contained other information such as dates of birth or driver’s license numbers...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hyundai Capital Suffers Unprecedented Data Loss Event

April 11, 2011 Added by:Headlines

Estimations indicated that the names, email addresses and telephone numbers of at least 420 thousand clients have been compromised, and that the login credentials, financial information, and credit scores for as many as thirteen thousand accounts may also have been exposed...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Epsilon Breach Deals Another Blow to Cloud Security

April 08, 2011 Added by:Headlines

“Any company that is privileged to manage the information that a company maintains about its customers should be paying attention... Customers will surely start to wonder if they can’t trust these firms with their email addresses..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

T.J.Maxx Hacker Claims Fed's Authorized Activities

April 08, 2011 Added by:Headlines

"I was acting on behalf of the United States Secret Service and that I was authorized and directed to engage in the conduct I committed as part of my assignment to gather intelligence and seek out international cybercriminals. I now know and understand that I have been used as a scapegoat..."

Comments  (0)

B451da363bb08b9a81ceadbadb5133ef

Has The Sun Set On LizaMoon?

April 08, 2011 Added by:Alexander Rothacker

If an organization didn’t catch the attack and the hackers covered their tracks, they might not know of the breach. What if the attackers set up backdoors to come back another time? Now they know exactly where to look for the organization’s critical data – who is to say they won’t be back?

Comments  (1)

65be44ae7088566069cc3bef454174a7

Health Net Incident Impacts 1.9 Million: Lessons Learned

April 07, 2011 Added by:Rebecca Herold

Health Net is clearly stating that IBM is responsible for the breach. Guess what? When you outsource business activities to a third party, you do not outsource your responsibility. What was Health Net doing to ensure, on an ongoing basis, that IBM had appropriate safeguards in place?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

WikiLeaks Source Manning Used Data-Mining Software

April 05, 2011 Added by:Headlines

The U.S. Army has confirmed that accused WikiLeaks source Bradley Manning had installed data-mining software on his SIPRnet-linked computer during the same period he is suspected of harvesting hundreds-of-thousands of classified government documents...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Adobe Flash Zero Day Bug Central to RSA Hack

April 04, 2011 Added by:Headlines

Hackers sent emails to a select group of RSA employees with a spreadsheet attachment which contained malware that exploited a flaw in the Adobe software that allowed them the opportunity to glean authentication credentials that enabled access to other systems in the network...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Epsilon Data Breach Affects Multiple Companies

April 04, 2011 Added by:Headlines

The company states that their systems experienced and unauthorized access event that has exposed the names and email addresses of the customers the company's clients serve. Initial reports indicate that no financial data was revealed in the breach...

Comments  (1)

Aecf1189abe745df32ec68f5864649a6

RSA Breach Long Term Impact for Security Professionals

March 30, 2011 Added by:Nick Owen

With the explosion of cloud-based services, organizations are relying on the security of their vendor's vendors. What lessons can we learn from the RSA and Comodo episodes, and how should it impact decision making? Here are some longer-term items to think about...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NSA Joins Nasdaq Breach Investigation

March 30, 2011 Added by:Headlines

“By bringing in the NSA, that means they think they’re either dealing with a state-sponsored attack or it’s an extraordinarily capable criminal organization,” said the former head of U.S. counterintelligence Joel Brenner...

Comments  (0)

C6b9a422851928980389afe33c48e213

The RSA Hack: Don't Overreact

March 27, 2011 Added by:Eric Cissorsky

When IT Security panics, it causes ripple effects throughout the enterprise. In the event this turns out to be a serious breach, you will be credited with keeping your cool and weathering the storm. Overreacting to any security incident can undermine your department's credibility...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

TripAdvisor Member Emails Stolen by Hacker

March 25, 2011 Added by:Headlines

"This is the second time a well known website has been breached this week – just a few days ago it was Play.com with egg on its face, now it’s TripAdvisor. It’s the regularity of these types of incident that suggest traditional approaches to IT security are no longer fit for purpose..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

HBGary's Hoglund: Anonymous are Criminal Hackers

March 22, 2011 Added by:Headlines

"They are going after people's family and children. They actually have all the family members listed. And they call them up on the phone. They harass them. There have been cases where death threats have been left. It's just ridiculous, and it's completely unacceptable," Hoglund said...

Comments  (0)

850c7a8a30fa40cf01a9db756b49155a

RSA Fail - Security Lessons Unlearned

March 18, 2011 Added by:J. Oquendo

Security pros have to wonder about the security state as a whole when the founders of "two factor" key fobs take a hit. One would believe that in the event someone compromised a machine inside of RSA, their own security - two factor key fobs - would have prevented escalation between other machines...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

EMC's Security Division Hacked

March 18, 2011 Added by:Headlines

"Our investigation has led us to believe that the attack is in the category of an APT... and revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is specifically related to RSA's SecurID two-factor authentication products..."

Comments  (0)

Page « < 9 - 10 - 11 - 12 - 13 > »