Blog Posts Tagged with "breach"

6d1c762d9c16395a7e258d098091ee00

Cyber Defense Weekly: Hacks, Breaches, and Disclosures

February 08, 2012 Added by:Cyber Defense Weekly

"Us law firms have been penetrated both here and abroad. Firms with offices in China and Russia are particularly vulnerable, because the foreign security services are likely to own the people who handle the the firms' physical and electronic security..."

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Symantec Source Code Leak: The Real Elephant in the Room

February 08, 2012 Added by:Infosec Island Admin

Everyone is all over the fact that the Symantec code had been hacked back in 2006 right? I have not seen anything about the real elephant in the room. Where has the code been lo’ these many years? Who had it? Who hacked Symantec in the first place? Anyone? Anyone? Bueller?

Comments  (0)

6d117b57d55f63febe392e40a478011f

Symantec: Emails Part of Law Enforcement Sting Operation

February 07, 2012 Added by:Anthony M. Freed

"The e-mail string posted by YamaTough was actually between them and... law enforcement. YamaTough actually reached out to us, first, saying that if we provided them with money, they would not post any more source code. At that point... it was a clear cut case of extortion..."

Comments  (1)

6d117b57d55f63febe392e40a478011f

Update: Alleged Source Code Thieves Attempt to Extort Symantec

February 06, 2012 Added by:Anthony M. Freed

Anonymous-aligned hacker YamaTough, the spokesperson for the hacktivist group “The Lords of Dharmaraja”, falsely accused Symantec of attempting to bribe the group in order to prevent the release of source code for the company's PCanywhere product, among others...

Comments  (7)

03b2ceb73723f8b53cd533e4fba898ee

VeriSign Hacked - But Why?

February 03, 2012 Added by:Pierluigi Paganini

The impairment of these mechanisms could lead to the redirection of traffic to bogus sites with serious consequences - and not just that - the compromise of the Digital Certificate model itself raises the risk for the interception of emails and confidential documents...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Data Loss Doesn’t Always Mean Getting Hacked

February 03, 2012 Added by:Robert Siciliano

Recently UCLA announced 16,000 patients were potential victims of identity theft because a doctor’s home office was broken into and data stolen. Data breaches cost big bucks. Encryption in this scenario failed due to a password on a sticky note near the laptop...

Comments  (0)

296634767383f056e82787fcb3b94864

Did Symantec's 2006 Breach Impact These High Risk Customers?

February 01, 2012 Added by:Jeffrey Carr

As the world's largest vendor of security software, the breach puts all of its corporate and government customers at risk, because if Symantec didn't know the extent of its breach back then, how do Symantec's customers know that their current product line is safe to use?

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

All Out Cyber War: Analysis of the Middle-Eastern Conflict

January 29, 2012 Added by:Rafal Los

You just can't avoid it, so I had to write it. The escalation of rhetoric has gone past media hype and has spilled over into mainstream politics, and now onto the lips of people who should really know better than to perpetuate some of this madness...

Comments  (4)

37d5f81e2277051bc17116221040d51c

Five Tips on How to Prevent the Next Data Breach

January 28, 2012 Added by:Robert Siciliano

You may be aware of the uber techie bad boy hackers of Anonymous/LulzSec/AntiSec/WikiLeaks/ScriptKiddies and the organized web mobs of the world. Did you know they have wreaked havoc to the degree that almost a billion records have been compromised?

Comments  (0)

Ad5130e786d13531cc0f2cde32dacd0f

Restaurant Challenges US Bank and PCI DSS after Seizure of Funds

January 26, 2012 Added by:Andrew Weidenhamer

"The PCI system is less a system for securing customer card data than a system for raking in profits for the card companies via fines and penalties. Visa and MasterCard impose fines on merchants even when there is no fraud loss at all, simply because the fines are profitable...”

Comments  (1)

03b2ceb73723f8b53cd533e4fba898ee

Symantec: Too Many Doubts - Disable pcAnywhere Software

January 26, 2012 Added by:Pierluigi Paganini

"At this time, Symantec recommends disabling the product until Symantec releases a final set of software updates that resolve currently known vulnerability risks," Symantec said in the white paper...

Comments  (4)

F29746c6cb299c1755e4087e6126a816

Five Ways to Revamp Your Home-Based Business Security

January 26, 2012 Added by:Kelly Colgan

No matter how small your operation, or even if you only occasionally work from home, clients trust you to protect their data — and laws in 46 states requires that you do so. Businesses must notify clients whose information is compromised, and notification can be costly...

Comments  (2)

Af9c34417f8e5e0d240850bb353b5d40

pcAnywhere Source from 2006 Still Alive and Kicking

January 26, 2012 Added by:Keith Mendoza

Even if a complete software rewrite is done, it's not really a complete rewrite. Someone in the development team--usually the person who was working on the last version before the so-called rewrite--will copy parts of code from the old source code...

Comments  (0)

296634767383f056e82787fcb3b94864

The 2006 Theft of Symantec's Source Code - Response and Repercussions

January 26, 2012 Added by:Jeffrey Carr

Symantec has acknowledged that source code for multiple products was stolen in 2006. The worst part is that Symantec was clueless about the theft of its own source code for almost six years, which means that thousands of customers were clueless as well...

Comments  (1)

0a8cae998f9c51e3b3c0ccbaddf521aa

Designing Applications for Compromise

January 24, 2012 Added by:Rafal Los

Make sure you're thinking ahead and designing applications to be resilient in the face of a complete compromise - including the information therein and connected accounts - so your users can still get back to the application even after it's been ravaged by hackers...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Aaron Barr Terminated for Obsession with Anonymous

January 23, 2012 Added by:Headlines

"When I hired Aaron about eight months ago, it was under the perception that we were going to be able to help the NSA with some things relating to national security, not with Anonymous and social groups," John Sayres, the company's founder said...

Comments  (1)

Page « < 2 - 3 - 4 - 5 - 6 > »