Items Tagged with "breach"


37d5f81e2277051bc17116221040d51c

Epsilon Breach Will Impact Consumers for Years

April 19, 2011 Added by:Robert Siciliano

Consumers are receiving messages from trusted companies such as 1-800-Flowers, Chase, Hilton and others, letting them know that their e-mail addresses have been exposed. This provides a perfect opportunity for cybercriminals who may try to take advantage of the breach...

Comments  (1)

314f19f082e69886c20e31c70fe6dceb

Epsilon: Be Wary of Phishing Attempts

April 18, 2011 Added by:Rod MacPherson

Another scam that they are running is a fake Epsilon breach news update site (copied from the actual press release site) that offers up a downloadable tool that they tell you to run to see if the hackers have your e-mail address. That tool is a Trojan...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

HBGary's Open Letter to Customers and the Defense Marketplace

April 15, 2011 Added by:Headlines

While some details seem to jibe with the information contained in the tens-of-thousands of leaked emails, the letter for the most part just comes off as a generic attempt to rewrite the record and further distance HBGary Inc. from the activities of Aaron Barr and HBGary Federal..

Comments  (0)

69dafe8b58066478aea48f3d0f384820

WordPress Hack Exposes Proprietary Source Code

April 14, 2011 Added by:Headlines

"Automattic had a low-level (root) break-in to several of our servers, and potentially anything on those servers could have been revealed... We presume our source code was exposed and copied. While much of our code is Open Source, there are sensitive bits of our and our partners’ code..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Security Provider Barracuda Networks Hit by SQL Injection

April 12, 2011 Added by:Headlines

The website of application security vendor Barracuda Networks was compromised by a SQL injection attack. The attack appears to have exposed confidential information regarding Barracuda's business partners as well as network login credentials of several employees...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Texas Exposes 3.5 Million Resident's Private Information

April 12, 2011 Added by:Headlines

The records contained the names and mailing addresses of individuals, Social Security numbers, and to varying degrees also contained other information such as dates of birth or driver’s license numbers...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hyundai Capital Suffers Unprecedented Data Loss Event

April 11, 2011 Added by:Headlines

Estimations indicated that the names, email addresses and telephone numbers of at least 420 thousand clients have been compromised, and that the login credentials, financial information, and credit scores for as many as thirteen thousand accounts may also have been exposed...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Epsilon Breach Deals Another Blow to Cloud Security

April 08, 2011 Added by:Headlines

“Any company that is privileged to manage the information that a company maintains about its customers should be paying attention... Customers will surely start to wonder if they can’t trust these firms with their email addresses..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

T.J.Maxx Hacker Claims Fed's Authorized Activities

April 08, 2011 Added by:Headlines

"I was acting on behalf of the United States Secret Service and that I was authorized and directed to engage in the conduct I committed as part of my assignment to gather intelligence and seek out international cybercriminals. I now know and understand that I have been used as a scapegoat..."

Comments  (0)

B451da363bb08b9a81ceadbadb5133ef

Has The Sun Set On LizaMoon?

April 08, 2011 Added by:Alexander Rothacker

If an organization didn’t catch the attack and the hackers covered their tracks, they might not know of the breach. What if the attackers set up backdoors to come back another time? Now they know exactly where to look for the organization’s critical data – who is to say they won’t be back?

Comments  (1)

65be44ae7088566069cc3bef454174a7

Health Net Incident Impacts 1.9 Million: Lessons Learned

April 07, 2011 Added by:Rebecca Herold

Health Net is clearly stating that IBM is responsible for the breach. Guess what? When you outsource business activities to a third party, you do not outsource your responsibility. What was Health Net doing to ensure, on an ongoing basis, that IBM had appropriate safeguards in place?

Comments  (0)

69dafe8b58066478aea48f3d0f384820

WikiLeaks Source Manning Used Data-Mining Software

April 05, 2011 Added by:Headlines

The U.S. Army has confirmed that accused WikiLeaks source Bradley Manning had installed data-mining software on his SIPRnet-linked computer during the same period he is suspected of harvesting hundreds-of-thousands of classified government documents...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Adobe Flash Zero Day Bug Central to RSA Hack

April 04, 2011 Added by:Headlines

Hackers sent emails to a select group of RSA employees with a spreadsheet attachment which contained malware that exploited a flaw in the Adobe software that allowed them the opportunity to glean authentication credentials that enabled access to other systems in the network...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Epsilon Data Breach Affects Multiple Companies

April 04, 2011 Added by:Headlines

The company states that their systems experienced and unauthorized access event that has exposed the names and email addresses of the customers the company's clients serve. Initial reports indicate that no financial data was revealed in the breach...

Comments  (1)

Aecf1189abe745df32ec68f5864649a6

RSA Breach Long Term Impact for Security Professionals

March 30, 2011 Added by:Nick Owen

With the explosion of cloud-based services, organizations are relying on the security of their vendor's vendors. What lessons can we learn from the RSA and Comodo episodes, and how should it impact decision making? Here are some longer-term items to think about...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NSA Joins Nasdaq Breach Investigation

March 30, 2011 Added by:Headlines

“By bringing in the NSA, that means they think they’re either dealing with a state-sponsored attack or it’s an extraordinarily capable criminal organization,” said the former head of U.S. counterintelligence Joel Brenner...

Comments  (0)

Page « < 9 - 10 - 11 - 12 - 13 > »