Vulns & Alerts

A7290c5bd7bc2aaa7ea2b6c957ef639b

Federal Court Affirms Damages in RockYou Data Breach

April 29, 2011 Added by:David Navetta

Beyond litigation risk, treating personal information in the same manner as property could significantly impact the current quid pro quo of the Internet and how information is collected, used and transferred. It will be interesting to follow this case through the next round of discovery...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Reading Between the Lines: The Sony PSN Breach

April 28, 2011 Added by:Rafal Los

What are PSN gamers/users more worried about? Are PSN gamers more worried about their heard-earned trophies and status on their favorite games, or the fact that their personal information and maybe even their credit cards were pilfered?

Comments  (3)

27ef2e87221c355f517e2824b19f7ca6

Sony PlayStation Hack: 70 Million Users' Details Stolen

April 27, 2011 Added by:Jared Carstensen

What this means for those affected: Your name, date of birth, address, billing address and contact details are most likely not going to change - so this information could be as valuable in a year or two to these criminals, as it is now - potentially even more valuable...

Comments  (14)

B451da363bb08b9a81ceadbadb5133ef

Is Oracle Misleading Its Database Customers With CPUs?

April 26, 2011 Added by:Alexander Rothacker

Is Oracle misleading its database customers during its quarterly Critical Patch Updates (CPUs)? Unfortunately for its customers, Oracle has figured out a way to downplay the severity of its vulnerabilities and water down the Common Vulnerability Scoring System (CVSS) scoring...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Hackers Go After Points, Credits, and Virtual Currency

April 25, 2011 Added by:Robert Siciliano

These virtual dollars and virtual goods have real value. Virtual currency includes the points customers receive from retailers, merchants, airlines, hotels, and credit card companies through loyalty programs. These points are the second most traded currency on the planet...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

WikiLeaks Releases Guantanamo Prisoner Files

April 25, 2011 Added by:Headlines

The revelations in those documents range from intelligence on the whereabouts of Al Qaeda leaders to the individual stories of often-innocent detainees to the ugly and ineffective improvisations on intelligence gathering within Guantanamo’s operations...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hackers Overtake Insiders as Leading Cause of Data Loss

April 22, 2011 Added by:Headlines

The responsibility for protecting personal identifying information is on those who request and store it. All entities that collect personal information need to understand the concept that only they can safeguard our information, and that this safeguarding must be an urgent priority...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Epsilon Breach Will Impact Consumers for Years

April 19, 2011 Added by:Robert Siciliano

Consumers are receiving messages from trusted companies such as 1-800-Flowers, Chase, Hilton and others, letting them know that their e-mail addresses have been exposed. This provides a perfect opportunity for cybercriminals who may try to take advantage of the breach...

Comments  (1)

B451da363bb08b9a81ceadbadb5133ef

What the Epsilon Data Breach Means To You

April 11, 2011 Added by:Alexander Rothacker

Organizations rely on third party providers for numerous responsibilities and often treat them as an extension of their organization. Allowing third party access to ANY information should REQUIRE that they provide the most stringent security measures...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Costly Malicious Data Breaches On the Rise

April 01, 2011 Added by:Bill Gerneglia

Those are some of the findings of the 2010 US Cost of a Data Breach study from the Ponemon Institute. The benchmark study looked at the experiences of 51 US companies in 15 industry sectors; it's the sixth annual such survey done by Ponemon...

Comments  (0)

B451da363bb08b9a81ceadbadb5133ef

Higher-Ed Breach Madness: The Data Breach Final Four

March 29, 2011 Added by:Alexander Rothacker

We thought it might be fun to take a look at which higher education institutions would make the “Data Breach Final Four”. Based on the number of reported records breached in 2010, we put together brackets for what we are calling the 2010 Higher Education Data Breach Madness...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

MySQL Website Hacked (Ironically) by Blind SQL Injection

March 28, 2011 Added by:Rafal Los

Allow me to point out a little bit of irony in this headline... a website for one of the more popular open-source database alternatives gets completely compromised using blind SQL Injection. Ouch. Someone going by the moniker "Jack Haxor" posted this to the Full Disclosure mailing list...

Comments  (0)

C6b9a422851928980389afe33c48e213

The RSA Hack: Don't Overreact

March 27, 2011 Added by:Eric Cissorsky

When IT Security panics, it causes ripple effects throughout the enterprise. In the event this turns out to be a serious breach, you will be credited with keeping your cool and weathering the storm. Overreacting to any security incident can undermine your department's credibility...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

EMC's Security Division Hacked

March 18, 2011 Added by:Headlines

"Our investigation has led us to believe that the attack is in the category of an APT... and revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is specifically related to RSA's SecurID two-factor authentication products..."

Comments  (0)

37d5f81e2277051bc17116221040d51c

Criminal Hackers Responsible For Most Data Breaches

March 04, 2011 Added by:Robert Siciliano

According to the ITRC, there were at least 662 data breaches in 2010, which exposed more than 16 million records. Nearly two-thirds of breaches exposed Social Security numbers, and 26% involved credit or debit card data. The majority of these attacks were malicious hacks or insider theft...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Data Remains on USB and SSDs After Secure Erase

March 01, 2011 Added by:Dan Dieterle

New research shows that secure erase programs used on standard hard drives to wipe important data do not completely erase solid-state (SSD) drives and USB thumb drives. As much as 75 percent of the data could remain after a successful secure wipe...

Comments  (1)

Page « < 18 - 19 - 20 - 21 - 22 > »