Items Tagged with "breach"
March 18, 2011 Added by:J. Oquendo
Security pros have to wonder about the security state as a whole when the founders of "two factor" key fobs take a hit. One would believe that in the event someone compromised a machine inside of RSA, their own security - two factor key fobs - would have prevented escalation between other machines...
March 18, 2011 Added by:Headlines
"Our investigation has led us to believe that the attack is in the category of an APT... and revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is specifically related to RSA's SecurID two-factor authentication products..."
March 16, 2011 Added by:Headlines
"Kayla played a crucial role, posing as Barr to an IT administrator... to gain access to the company’s servers... [Kayla] and four other hackers broke into his company’s servers... defacing his Web site, purging data and posting more than 50,000 of his emails online for the world to see..."
March 15, 2011 Added by:Headlines
The DMHC has opened an investigation into the the security practices of Health Net after the company reported that they can not locate nine network server drives from the Rancho Cordova data center that contain as many as 1.9 million current and former customer records...
March 09, 2011 Added by:Headlines
Emails leaked in the HBGary Federal network breach reveal a spate of high level attacks targeting leading companies across multiple industries. The foreign-based attacks appear to be industrial espionage efforts intended to harvest sensitive trade secrets and intellectual property...
March 07, 2011 Added by:Headlines
"The Internet is a weapon. It’s already weaponized, and those of us who know how to use this weapon have the advantage. I know who else was involved in turning [Manning] in. I'm not sure what to do on that yet, but we're speaking among ourselves about that..."
March 06, 2011 Added by:Dan Dieterle
Online systems are slowly becoming better at protecting data, mostly because they have been under constant attack for a long time. Hackers are very opportunistic, and cyber crime has become big business. Speed counts, and if it is faster just to target the POS system, you better believe they will...
March 03, 2011 Added by:Headlines
A document in the leaked emails that outlines strategies to develop an army of sockpuppets, with sophisticated 'persona management' software that allows a small team of people to appear to be many for the purpose of manipulating social media and public opinion...
March 01, 2011 Added by:Headlines
Debate has ensued about whether private security companies should be actively developing strategies that include potentially illegal acts, engaging in disinformation and propaganda campaigns on behalf of the government, and developing powerful cyber offensive weapons...
February 28, 2011 Added by:Headlines
Attrition.org has been highly critical of both LIGATT and the company's principal Gregory Evans, the self-proclaimed "world's greatest hacker" who has been the subject of well documented allegations of plagiarism, among other scathing criticisms...
February 25, 2011 Added by:Headlines
Revelations about the proposed tactics and operations set forth by HBGary Federal and the other security companies involved should be cause for concern amongst the information security community, as they largely portray security professionals as being techno mercenaries and hired guns...
February 17, 2011 Added by:Scot Terban
What Barr seemed to not comprehend is that the Internet is a stochastic system, and it is impossible to do what he wanted with any kind of accuracy. At least in the way he wanted to do it, you see, it takes some investigation skills to make the connections that a scripted process cannot...
February 15, 2011 Added by:Lee Mangold
Lush operates many web portals around the world providing beauty supplies. After their last breech, I decided to find out a little more about the company out of genuine interest about the company (rather than the breech). The first thing I noticed was that their lush.co.uk site was offline...
February 10, 2011 Added by:Anthony M. Freed
The fallout from the HBGary Federal breach continues to spread as leaked documents reveal that BofA was soliciting proposals for strategies to undermine WikiLeaks. The proposed strategies suggested a variety of tactics which ranged from a disinformation campaign to outright cyber attacks...
February 09, 2011 Added by:Jack Anderson
The Health Net breach is the gift that keeps on giving, to the state attorneys general, that is. This fine is just part of the long term ramifications of a data breach. I am sure that United wishes they hadn't acquired Health Net. Bad publicity rubs off...
February 09, 2011 Added by:Headlines
"We detected suspicious files on the U.S. servers unrelated to our trading systems and determined that our web facing application Directors Desk was potentially affected. We immediately conducted an investigation, which included outside forensic firms and U.S. federal law enforcement..."