Items Tagged with "breach"


69dafe8b58066478aea48f3d0f384820

HBGary Federal Emails Reveal More Unreported Attacks

March 09, 2011 Added by:Headlines

Emails leaked in the HBGary Federal network breach reveal a spate of high level attacks targeting leading companies across multiple industries. The foreign-based attacks appear to be industrial espionage efforts intended to harvest sensitive trade secrets and intellectual property...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Anonymous Planning Media War in Support of Manning

March 07, 2011 Added by:Headlines

"The Internet is a weapon. It’s already weaponized, and those of us who know how to use this weapon have the advantage. I know who else was involved in turning [Manning] in. I'm not sure what to do on that yet, but we're speaking among ourselves about that..."

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Point-of-Sale Systems are Easy Target for Hackers

March 06, 2011 Added by:Dan Dieterle

Online systems are slowly becoming better at protecting data, mostly because they have been under constant attack for a long time. Hackers are very opportunistic, and cyber crime has become big business. Speed counts, and if it is faster just to target the POS system, you better believe they will...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

HBGary Federal Document on Manipulating Social Media

March 03, 2011 Added by:Headlines

A document in the leaked emails that outlines strategies to develop an army of sockpuppets, with sophisticated 'persona management' software that allows a small team of people to appear to be many for the purpose of manipulating social media and public opinion...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

HBGary Federal CEO Aaron Barr Resigns

March 01, 2011 Added by:Headlines

Debate has ensued about whether private security companies should be actively developing strategies that include potentially illegal acts, engaging in disinformation and propaganda campaigns on behalf of the government, and developing powerful cyber offensive weapons...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

LIGATT Security Sues Over Leaked Docs Coverage

February 28, 2011 Added by:Headlines

Attrition.org has been highly critical of both LIGATT and the company's principal Gregory Evans, the self-proclaimed "world's greatest hacker" who has been the subject of well documented allegations of plagiarism, among other scathing criticisms...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

More on the HBGary Federal Breach Revelations

February 25, 2011 Added by:Headlines

Revelations about the proposed tactics and operations set forth by HBGary Federal and the other security companies involved should be cause for concern amongst the information security community, as they largely portray security professionals as being techno mercenaries and hired guns...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

HBGary Federal: Algorithms, Social Networks, and COMINT

February 17, 2011 Added by:Infosec Island Admin

What Barr seemed to not comprehend is that the Internet is a stochastic system, and it is impossible to do what he wanted with any kind of accuracy. At least in the way he wanted to do it, you see, it takes some investigation skills to make the connections that a scripted process cannot...

Comments  (9)

Af2769c2480db78c589b811b428782b0

Lush Suffers Another Predictable Compromise

February 15, 2011 Added by:Lee Mangold

Lush operates many web portals around the world providing beauty supplies. After their last breech, I decided to find out a little more about the company out of genuine interest about the company (rather than the breech). The first thing I noticed was that their lush.co.uk site was offline...

Comments  (0)

6d117b57d55f63febe392e40a478011f

B of A Enlists Security Firms to Undermine WikiLeaks

February 10, 2011 Added by:Anthony M. Freed

The fallout from the HBGary Federal breach continues to spread as leaked documents reveal that BofA was soliciting proposals for strategies to undermine WikiLeaks. The proposed strategies suggested a variety of tactics which ranged from a disinformation campaign to outright cyber attacks...

Comments  (2)

10e258c8d23d441b915c1b2333b6996a

HIPAA Penalty: Vermont AG and Health Net

February 09, 2011 Added by:Jack Anderson

The Health Net breach is the gift that keeps on giving, to the state attorneys general, that is. This fine is just part of the long term ramifications of a data breach. I am sure that United wishes they hadn't acquired Health Net. Bad publicity rubs off...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

NASDAQ Issues Statement on Security Breach

February 09, 2011 Added by:Headlines

"We detected suspicious files on the U.S. servers unrelated to our trading systems and determined that our web facing application Directors Desk was potentially affected. We immediately conducted an investigation, which included outside forensic firms and U.S. federal law enforcement..."

Comments  (0)

2e7ceec8361275c4e31fee5fe422740b

Black Hats, White Hats, and LIGATT Security

February 07, 2011 Added by:Sam Bowne

I remain convinced that the world of infosec is really polarized. The "white hats" help protect society, obey the law, and can be trusted; while the "black hats" lie, steal, extort, hurt people, and cannot be trusted. There are exceptions, but that model describes the most common situations...

Comments  (5)

69dafe8b58066478aea48f3d0f384820

NASDAQ Network Systems Breached by Hackers

February 05, 2011 Added by:Headlines

"Many sophisticated hackers don't immediately try to monetize the situation; they oftentimes do what's called local information gathering, almost like collecting intelligence, to ascertain what would be the best way in the long term to monetize their presence..."

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

The Real Business Impact of Being Hacked

February 03, 2011 Added by:Rafal Los

Even if your customers don't hold you accountable for a breach - how long will you be down as a result, and how much will that cost you in sales? Compare that against the cost of doing the right thing and applying proper security to the sites you build - I bet the ROI is there...

Comments  (19)

6d117b57d55f63febe392e40a478011f

Did Heartland CEO Make Insider Trades?

January 29, 2011 Added by:Anthony M. Freed

Heartland Payment Systems (HPY) and Federal investigators have released more details about the nature of the massive data breach made public last week, but have refused to pinpoint the exact date that Heartland first became aware there may have been a problem with their network security...

Comments  (0)

Page « < 10 - 11 - 12 - 13 - 14 > »