Blog Posts Tagged with "Epsilon"

69dafe8b58066478aea48f3d0f384820

Top Ten Biggest Cyber Attacks Of All Time

November 01, 2011 Added by:Headlines

The Original Logic Bomb: Without sending a missile or any other explosive device, the US blew up a Siberian gas pipeline which was described by an air force secretary as "the most monumental non-nuclear explosion and fire ever seen from space..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Top Ten Most Expensive Network Attacks in History

August 18, 2011 Added by:Headlines

Quantifying the cost of a cyber attack is admittedly subjective on some levels given that the scope of the impact may not be readily reportable and collateral damage is difficult to pinpoint, but the author does manage to assemble a viable list of the most devastating network attacks...

Comments  (0)

Fc152e73692bc3c934d248f639d9e963

What Can We Learn From The Epsilon Breach?

May 02, 2011 Added by:PCI Guru

Epsilon appears to have caught this breach quickly because they were monitoring their network systems. What this incident points out is that even when you are monitoring your environment, it still takes a while to recognize that a breach is in progress...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Epsilon Breach Will Impact Consumers for Years

April 19, 2011 Added by:Robert Siciliano

Consumers are receiving messages from trusted companies such as 1-800-Flowers, Chase, Hilton and others, letting them know that their e-mail addresses have been exposed. This provides a perfect opportunity for cybercriminals who may try to take advantage of the breach...

Comments  (1)

314f19f082e69886c20e31c70fe6dceb

Epsilon: Be Wary of Phishing Attempts

April 18, 2011 Added by:Rod MacPherson

Another scam that they are running is a fake Epsilon breach news update site (copied from the actual press release site) that offers up a downloadable tool that they tell you to run to see if the hackers have your e-mail address. That tool is a Trojan...

Comments  (0)

B451da363bb08b9a81ceadbadb5133ef

What the Epsilon Data Breach Means To You

April 11, 2011 Added by:Alexander Rothacker

Organizations rely on third party providers for numerous responsibilities and often treat them as an extension of their organization. Allowing third party access to ANY information should REQUIRE that they provide the most stringent security measures...

Comments  (0)

5e402abc3fedaf8927900f014ccc031f

Epsilon’s Email Breach Should Impact Future SLAs

April 10, 2011 Added by:Allan Pratt, MBA

What were the service level agreements, and did they outline precautions that Epsilon would take to prevent such incursions? If none of this information was included in the SLAs, perhaps, it’s time for data-driven companies to include their information security strategies in SLAs...

Comments  (1)

Fc152e73692bc3c934d248f639d9e963

Spear-Phishing Season Is Declared Open

April 08, 2011 Added by:PCI Guru

Post-Epsilon breach, it seems every merchant under the sun is notifying their customers of the expected onslaught of electronic mail messages asking for bank account and credit card numbers among other PII. As a result, a lot of credit card numbers will likely get exposed. Be prepared...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Epsilon Breach Deals Another Blow to Cloud Security

April 08, 2011 Added by:Headlines

“Any company that is privileged to manage the information that a company maintains about its customers should be paying attention... Customers will surely start to wonder if they can’t trust these firms with their email addresses..."

Comments  (0)

B451da363bb08b9a81ceadbadb5133ef

Has The Sun Set On LizaMoon?

April 08, 2011 Added by:Alexander Rothacker

If an organization didn’t catch the attack and the hackers covered their tracks, they might not know of the breach. What if the attackers set up backdoors to come back another time? Now they know exactly where to look for the organization’s critical data – who is to say they won’t be back?

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Epsilon Data Breach Affects Multiple Companies

April 04, 2011 Added by:Headlines

The company states that their systems experienced and unauthorized access event that has exposed the names and email addresses of the customers the company's clients serve. Initial reports indicate that no financial data was revealed in the breach...

Comments  (1)