Items Tagged with "breach"
February 07, 2011 Added by:Sam Bowne
I remain convinced that the world of infosec is really polarized. The "white hats" help protect society, obey the law, and can be trusted; while the "black hats" lie, steal, extort, hurt people, and cannot be trusted. There are exceptions, but that model describes the most common situations...
February 05, 2011 Added by:Headlines
"Many sophisticated hackers don't immediately try to monetize the situation; they oftentimes do what's called local information gathering, almost like collecting intelligence, to ascertain what would be the best way in the long term to monetize their presence..."
February 03, 2011 Added by:Rafal Los
Even if your customers don't hold you accountable for a breach - how long will you be down as a result, and how much will that cost you in sales? Compare that against the cost of doing the right thing and applying proper security to the sites you build - I bet the ROI is there...
January 29, 2011 Added by:Anthony M. Freed
Heartland Payment Systems (HPY) and Federal investigators have released more details about the nature of the massive data breach made public last week, but have refused to pinpoint the exact date that Heartland first became aware there may have been a problem with their network security...
January 29, 2011 Added by:Headlines
When the smart card is inserted into a compromised PC, the hackers use the opportunity to attempt to access the server. When the system requests a digital token, the attackers redirect the request to the compromised PC, which provides the token and password stolen with the keylogger...
January 26, 2011 Added by:Headlines
"Let the hacking begin: If facebook needs money, instead of going to the banks, why doesn’t Facebook let its users invest in Facebook in a social way? Why not transform Facebook into a ‘social business’ the way Nobel Price winner Muhammad Yunus described it? http://bit.ly/fs6rT3 What do you think?"
January 25, 2011 Added by:Headlines
If you have been parodied on the long running prime-time animated series The Simpsons, you can rest assured that you have finally arrived. The most recent member of the coveted Simpson parody club is, believe it or not, none other than the Insider Threat...
January 24, 2011 Added by:Headlines
"Website owners should declare if they store your passwords using strong hashing. This is a simple process and not any more expensive to implement, however unfortunately websites not using this method of cryptography is something we see all too often..."
January 22, 2011 Added by:Headlines
"The victims' vulnerabilities were probably obtained by SQL injection vulnerability automatic scanner and exploited in automatic manner, as the hacker published his methods in a post in some hacker forum – see screen shot and explanation..."
January 20, 2011 Added by:Headlines
The EU Emissions Trading Scheme has suspended all carbon emissions trading until January 26th after hackers breached networks and pilfered millions in pollution credits. The credits stolen form the Czech accounts are estimated to be worth as much as seven million Euros, according to reports...
January 19, 2011 Added by:Headlines
Information theft accounts for 42 percent of total external costs. Costs associated with disruption to business or lost productivity accounts for 22 percent of external costs... Tangential to these costs is the expense by damage from negative press and lost customer/shareholder confidence...
January 14, 2011 Added by:Headlines
A network server at Seacoast Radiology was illegally accessed by hackers intent on using it to host "Call of Duty: Black Ops" gaming sessions. The server provides storage for records for over 230,000 individuals...
January 12, 2011 Added by:Headlines
IBM's DeveloperWorks website was breached by hackers over the weekend. The messages left by the hacker(s) read: "Defaced by Hmei7," and, "You have been Hacked !!!, not because of your stupidity That's because we love you, and we want to warn you That your web still has large of vulnerability."
May 03, 2009 Added by:Anthony M. Freed
Heartland’s removal from the list of compliant payment processors had followed revelations that the company had suffered what may have been the largest data breach of payment card information to date, although details of the incident have not been made available due to ongoing investigations...
March 01, 2009 Added by:Anthony M. Freed
Billions of dollars are spent on security every year, and it can be trumped by one lapse in judgment. That is a tremendous amount of resources committed to security just to have it undermined by the whim of one individual, and it underscores the precariousness of secure systems...
January 25, 2009 Added by:Anthony M. Freed
The company issued statements Friday (1/23) in an effort at damage control in which the CEO compares the potential industry-wide impact of the breach to none other than that of the Tylenol poisonings of some twenty-five years ago that nearly brought down the drug maker...