Vulns & Alerts

37d5f81e2277051bc17116221040d51c

Criminal Hackers Responsible For Most Data Breaches

March 04, 2011 Added by:Robert Siciliano

According to the ITRC, there were at least 662 data breaches in 2010, which exposed more than 16 million records. Nearly two-thirds of breaches exposed Social Security numbers, and 26% involved credit or debit card data. The majority of these attacks were malicious hacks or insider theft...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Data Remains on USB and SSDs After Secure Erase

March 01, 2011 Added by:Dan Dieterle

New research shows that secure erase programs used on standard hard drives to wipe important data do not completely erase solid-state (SSD) drives and USB thumb drives. As much as 75 percent of the data could remain after a successful secure wipe...

Comments  (1)

7fef78c47060974e0b8392e305f0daf0

HBGary Federal: Algorithms, Social Networks, and COMINT

February 17, 2011 Added by:Infosec Island Admin

What Barr seemed to not comprehend is that the Internet is a stochastic system, and it is impossible to do what he wanted with any kind of accuracy. At least in the way he wanted to do it, you see, it takes some investigation skills to make the connections that a scripted process cannot...

Comments  (9)

Af2769c2480db78c589b811b428782b0

Lush Suffers Another Predictable Compromise

February 15, 2011 Added by:Lee Mangold

Lush operates many web portals around the world providing beauty supplies. After their last breech, I decided to find out a little more about the company out of genuine interest about the company (rather than the breech). The first thing I noticed was that their lush.co.uk site was offline...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Real Business Impact of Being Hacked

February 03, 2011 Added by:Rafal Los

Even if your customers don't hold you accountable for a breach - how long will you be down as a result, and how much will that cost you in sales? Compare that against the cost of doing the right thing and applying proper security to the sites you build - I bet the ROI is there...

Comments  (19)

6d117b57d55f63febe392e40a478011f

Did Heartland CEO Make Insider Trades?

January 29, 2011 Added by:Anthony M. Freed

Heartland Payment Systems (HPY) and Federal investigators have released more details about the nature of the massive data breach made public last week, but have refused to pinpoint the exact date that Heartland first became aware there may have been a problem with their network security...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Putting an End to Data Breaches as We Know Them

January 26, 2011 Added by:Robert Siciliano

The talk show pundits buzz that with the release of thousands of additional secret government documents, it leads to the conclusion that there is no way to protect sensitive data. If the government can’t even prevent a Private in the Army from stealing confidential data, what hope is there?

Comments  (21)

0a8cae998f9c51e3b3c0ccbaddf521aa

Exploiting Software Defects for Profit is Still Illegal

January 15, 2011 Added by:Rafal Los

Apparently through a combination of social engineering of casino floor workers, and "a software glitch" (affectionately referred to as a bug) this group of people was able to steal some very real money. The short of is that they were caught because they got greedy, as they always do...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Retraction: White House Strategy to Prevent Leaks is Leaked

January 07, 2011 Added by:Infosec Island Admin

The document cited in this article, "M-11-08, Initial Assessments of Safeguarding and Counterintelligence Postures for Classified National Security Information in Automated Systems", was in fact not "leaked", as the article states...

Comments  (3)

959779642e6e758563e80b5d83150a9f

WikiLeaks Breach – Trusted Insiders Not Hackers

January 04, 2011 Added by:Danny Lieberman

Of course there is an insider threat and of course it is immune to anti-virus and firewalls and of course the US Federal government is way behind the curve on data security – installing host based security which was state of the art 7 years ago...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Honda Motors Company Customer Info Exposed

December 27, 2010 Added by:Rafal Los

The Honda FAQ site tells the users not to worry but does seem to hint subtly that you should change your password if you have a login on one of these sites... oddly even though the original letter the user posted appears to stress that the password was not stolen, only the user ID...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Hospital Data Breaches Cost $6 Billion Annually

November 16, 2010 Added by:Bill Gerneglia

The Benchmark Study on Patient Privacy and Data Security also said hospitals place a low priority on protecting patient data, that enormous vulnerabilities exist, and that many breaches go undetected...

Comments  (1)

37d5f81e2277051bc17116221040d51c

Live ATM Skimming Video Confiscated

November 09, 2010 Added by:Robert Siciliano

In both cases, the criminals need to obtain the 4-digit cardholder PIN to allow for fraudulent cash withdrawal. The video shows criminals installing a micro camera above an ATM PIN pad and then placing a skimming device over the card reader throat...

Comments  (0)

44fa7dab2a22dc03b6a1de4a35b7834a

Data Breaches Continue to Cost Companies Millions

November 06, 2010 Added by:Bill Gerneglia

The reason for the breaches vary; sometimes it's thanks to a hacker, sometimes just human error. Thirty-five percent involved outsourced data provided to third parties, while 36 percent were caused by hackers, according to the survey...

Comments  (0)

Why I think Microsoft’s claims that breaches are down are seriously confounded

October 16, 2010

Ever since yesterday morning when I read that Microsoft reported that breaches involving data loss are down, it’s been a puzzlement because all of the data I’ve seen this year suggest that the number of breach reports are up.  I think I’ve figured out how they came to what I see as an erroneous statement.

Comments  (0)

C787d4daae33f0e155e00c614f07b0ee

Coping with the Inevitability of a Data Breach

October 13, 2010 Added by:Robb Reck

While an attacker will eventually figure out a way around your firewall, as soon as they do a good SIEM can alert the NOC and send technicians rushing to respond. In a perfect world, we will keep attackers, both external and internal, from having the opportunity to exploit our systems. But the reality is that breaches do occur...

Comments  (0)

Page « < 18 - 19 - 20 - 21 - 22 > »