Items Tagged with "breach"


69dafe8b58066478aea48f3d0f384820

Space Agencies Confirm Network Intrusions

May 10, 2012 Added by:Headlines

“NASA security officials detected an intrusion into the site on April 20... The agency takes the issue of IT security very seriously and at no point was sensitive or controlled information compromised. NASA has made significant progress to better protect the agency’s IT systems..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hackers Post Thousands of Twitter Account Logins

May 09, 2012 Added by:Headlines

Analysis of the data dump indicates that of the fifty-five thousand sets of account logins, around twenty-thousand were duplicates, and a large percentage were associated with accounts that were already suspended for violations of terms of service...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hacktivists Claim Government and Military Systems Breach

May 03, 2012 Added by:Headlines

A new hacktivist group claims to have breached the systems of multiple government, military and private organizations. The hackers posted screenshots of their intrusions to support their claims, as well as posting what is characterized as military files for access on MediaFire...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

VMware Confirms Older Hypervisor Source Code Exposed

April 27, 2012 Added by:Headlines

"Our security team became aware of the public posting of a single file from the VMware ESX source code and the possibility that more files may be posted in the future. The posted code and associated commentary dates to the 2003 to 2004 timeframe..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Nissan Confirms Cyber Attack and Network Breach

April 25, 2012 Added by:Headlines

"We have detected an intrusion into our company's global information systems network... we believe that our systems are secure and that no customer, employee or program data has been compromised. However, we believe that user IDs and hashed passwords were transmitted..."

Comments  (0)

16443e0c6f6e4a400fd0164b3c406170

Four Steps to Follow when Your Credit Card is Compromised

April 23, 2012 Added by:Christopher Burgess

Certification of compliance demonstrates that at that given point of time the entity was in adherence to the PCI standards. The threat landscape is dynamic and ever changing requiring those entrusted with our data to take steps beyond compliance to protect that data...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Update on the Visa - MasterCard - GPN Breach

April 03, 2012 Added by:Pierluigi Paganini

Global Payments' announced that Track 2 data was stolen, which is used by the bank. Track 1 data generally refers to the information reported on the front of a bank card. So if this information was stolen along with that contained in Track 2, it is possible to clone a card...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Visa and MasterCard Alert Banks of Massive Processor Breach

March 30, 2012 Added by:Headlines

"Visa Inc. is aware of a potential data compromise incident at a third party entity... Visa has provided payment card issuers with the affected account numbers so they can take steps to protect consumers through independent fraud monitoring and, if needed, reissuing cards..."

Comments  (0)

Ba829a6cb97f554ffb0272cd3d6c18a7

Panda Security Suffers the Wrath of AntiSec

March 07, 2012 Added by:Kevin McAleavey

The defacement also show tremendous amounts of sensitive corporate information including internal accounts, passwords, server and cloud configurations, access information to the antivirus lab's Teamviewer as well as alternate means of accessing their internals via "logmein"...

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

AntiSec, Stratfor, WikiLeaks, and Much Ado about Nothing

February 29, 2012 Added by:Infosec Island Admin

Some of us out there know a little bit about how intelligence works. While the likes of WikiLeaks rail about how some are using money and perhaps even sex to sway their sources, the reality is that this game has always been played this way. Intelligence is a dirty business...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Remote Attack Code for Symantec's pcAnywhere in the Wild

February 23, 2012 Added by:Headlines

"A surprising amount of the core code originates from... 10 years ago with only a few added changes, mainly to accommodate changes in Windows versions. Many individual .exe or other files include an accompanying Word document with a detailed developer description of how it functions.."

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Auditor IV: The Card Data Breach

February 17, 2012

When the unthinkable happens to a company, there's only one person they need to get to the bottom of the matter. The Auditor is back, but this time it's different...

Comments  (0)

58bc13ef5da5ac4fc32d41c3fbc0e460

Lessons from the Nortel Networks Breach

February 16, 2012 Added by:Suzanne Widup

Much is being published about how inappropriate the response to the Nortel incident was, but it demonstrates an important point for companies - how do you know when you’ve done enough? How do you tell when an incident is over, and you should go back to business as usual?

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Nortel: From Bankruptcy to Industrial Espionage Victim

February 15, 2012 Added by:Pierluigi Paganini

The damage is incalculable if we consider the enormous amount of data that may have been lost. Information on technological solutions, business reports, and other sensitive documents were stolen for years, seriously compromising the intellectual property of the company...

Comments  (3)

03b2ceb73723f8b53cd533e4fba898ee

KPN Hack: Why was Customer Notification Delayed?

February 13, 2012 Added by:Pierluigi Paganini

The login credentials were stored in plain text in the repository that had been exposed, and that is absurd. This is a failure of the basic security procedures that should be recognized internationally, and is an offense for which there should be heavy penalties...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hacker Boasts of Intel Corporation Network Breach

February 13, 2012 Added by:Headlines

A hacker who goes by the handles "WeedGrower" and "X-pOSed" claims to have breached tech giant Intel and to have gained access to an Intel.com subscriber database that contains sensitive information including passwords, social security and credit card numbers...

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »