Sophisticated cyber thieves behind Epsilon attack
An online marketing firm hit by what may be one of the biggest data thefts ever was the victim of "highly sophisticated cyber thieves," according to its parent company.
An online marketing firm hit by what may be one of the biggest data thefts ever was the victim of "highly sophisticated cyber thieves," according to its parent company.
Internet
Apr 7, 2011
3
0
(AP) -- Nasdaq OMX Group Inc. on Tuesday announced a rebalancing of the Nasdaq-100 Index next month that will significantly reduce Apple Inc.'s weighting in the index.
Business
Apr 5, 2011
0
0
(PhysOrg.com) -- Internet security researchers at Indiana University and Microsoft Research have exploited software flaws in leading online stores that use third-party payment services PayPal, Amazon Payments and Google Checkout ...
Computer Sciences
Mar 31, 2011
1
0
(PhysOrg.com) -- The idea that someone can get into your car without your permission isn't a new one. It's about as old as the coat hanger, but that was back in the days when you locks had a pull up button. We tend to think ...
The National Institute of Standards and Technology (NIST) has published the final version of a special publication that can help organizations to more effectively integrate information security risk planning into their mission-critical ...
Other
Mar 2, 2011
0
0
(PhysOrg.com) -- Macs have, for the most part, been considered to be more secure than their PC counterparts due to the lack of developments of viruses and other malicious codes that are created for them. Most of the authors ...
(AP) -- China appealed Thursday to Washington for fairness as American officials decide whether to block Chinese telecom giant Huawei's purchase of a U.S. computer company on security grounds.
Business
Feb 17, 2011
0
0
(AP) -- Hackers operating from China stole sensitive information from Western oil companies, a U.S. security firm reported Thursday, adding to complaints about pervasive Internet crime traced to the country.
Internet
Feb 10, 2011
8
0
(PhysOrg.com) -- Researchers at a system security group at ETH Zurich in Switzerland were able to access ten automobiles from eight manufactures and drive them away.
Two new draft publications from the National Institute of Standards and Technology provide the groundwork for a three-tiered risk-management approach that encompasses computer security risk planning from the highest levels ...
Other
Jan 6, 2011
0
0