Items Tagged with "breach"


Ebb72d4bfba370aecb29bc7519c9dac2

Notes on the Verizon 2011 Data Breach Investigations Report

April 30, 2011 Added by:Anton Chuvakin

Log reviews detect breaches LESS OFTEN than “happenstance discovery by unrelated 3rd party”. Why? Because you ain’t doing that log review, and so random people stumbling on your weeks-old breach evidence is more "effective" than your log analysis. This is how bad things really are...

Comments  (0)

A7290c5bd7bc2aaa7ea2b6c957ef639b

Federal Court Affirms Damages in RockYou Data Breach

April 29, 2011 Added by:David Navetta

Beyond litigation risk, treating personal information in the same manner as property could significantly impact the current quid pro quo of the Internet and how information is collected, used and transferred. It will be interesting to follow this case through the next round of discovery...

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Reading Between the Lines: The Sony PSN Breach

April 28, 2011 Added by:Rafal Los

What are PSN gamers/users more worried about? Are PSN gamers more worried about their heard-earned trophies and status on their favorite games, or the fact that their personal information and maybe even their credit cards were pilfered?

Comments  (3)

27ef2e87221c355f517e2824b19f7ca6

Sony PlayStation Hack: 70 Million Users' Details Stolen

April 27, 2011 Added by:Jared Carstensen

What this means for those affected: Your name, date of birth, address, billing address and contact details are most likely not going to change - so this information could be as valuable in a year or two to these criminals, as it is now - potentially even more valuable...

Comments  (14)

69dafe8b58066478aea48f3d0f384820

PlayStation Breach Affects Over 70 Million Customers

April 27, 2011 Added by:Headlines

"We have discovered that between April 17 and April 19, 2011, certain PlayStation Network and Qriocity service user account information was compromised in connection with an illegal and unauthorized intrusion into our network..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

WikiLeaks Releases Guantanamo Prisoner Files

April 25, 2011 Added by:Headlines

The revelations in those documents range from intelligence on the whereabouts of Al Qaeda leaders to the individual stories of often-innocent detainees to the ugly and ineffective improvisations on intelligence gathering within Guantanamo’s operations...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Epsilon Breach Will Impact Consumers for Years

April 19, 2011 Added by:Robert Siciliano

Consumers are receiving messages from trusted companies such as 1-800-Flowers, Chase, Hilton and others, letting them know that their e-mail addresses have been exposed. This provides a perfect opportunity for cybercriminals who may try to take advantage of the breach...

Comments  (1)

314f19f082e69886c20e31c70fe6dceb

Epsilon: Be Wary of Phishing Attempts

April 18, 2011 Added by:Rod MacPherson

Another scam that they are running is a fake Epsilon breach news update site (copied from the actual press release site) that offers up a downloadable tool that they tell you to run to see if the hackers have your e-mail address. That tool is a Trojan...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

HBGary's Open Letter to Customers and the Defense Marketplace

April 15, 2011 Added by:Headlines

While some details seem to jibe with the information contained in the tens-of-thousands of leaked emails, the letter for the most part just comes off as a generic attempt to rewrite the record and further distance HBGary Inc. from the activities of Aaron Barr and HBGary Federal..

Comments  (0)

69dafe8b58066478aea48f3d0f384820

WordPress Hack Exposes Proprietary Source Code

April 14, 2011 Added by:Headlines

"Automattic had a low-level (root) break-in to several of our servers, and potentially anything on those servers could have been revealed... We presume our source code was exposed and copied. While much of our code is Open Source, there are sensitive bits of our and our partners’ code..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Security Provider Barracuda Networks Hit by SQL Injection

April 12, 2011 Added by:Headlines

The website of application security vendor Barracuda Networks was compromised by a SQL injection attack. The attack appears to have exposed confidential information regarding Barracuda's business partners as well as network login credentials of several employees...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Texas Exposes 3.5 Million Resident's Private Information

April 12, 2011 Added by:Headlines

The records contained the names and mailing addresses of individuals, Social Security numbers, and to varying degrees also contained other information such as dates of birth or driver’s license numbers...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hyundai Capital Suffers Unprecedented Data Loss Event

April 11, 2011 Added by:Headlines

Estimations indicated that the names, email addresses and telephone numbers of at least 420 thousand clients have been compromised, and that the login credentials, financial information, and credit scores for as many as thirteen thousand accounts may also have been exposed...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Epsilon Breach Deals Another Blow to Cloud Security

April 08, 2011 Added by:Headlines

“Any company that is privileged to manage the information that a company maintains about its customers should be paying attention... Customers will surely start to wonder if they can’t trust these firms with their email addresses..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

T.J.Maxx Hacker Claims Fed's Authorized Activities

April 08, 2011 Added by:Headlines

"I was acting on behalf of the United States Secret Service and that I was authorized and directed to engage in the conduct I committed as part of my assignment to gather intelligence and seek out international cybercriminals. I now know and understand that I have been used as a scapegoat..."

Comments  (0)

B451da363bb08b9a81ceadbadb5133ef

Has The Sun Set On LizaMoon?

April 08, 2011 Added by:Alexander Rothacker

If an organization didn’t catch the attack and the hackers covered their tracks, they might not know of the breach. What if the attackers set up backdoors to come back another time? Now they know exactly where to look for the organization’s critical data – who is to say they won’t be back?

Comments  (1)

Page « < 9 - 10 - 11 - 12 - 13 > »