The Boston Globe newspaper said on Feb. 1 that it accidentally released sensitive data on as many as 227,000 subscribers. Information on around 13,000 subscribers to the Worcester Telegram & Gazette was also accidentally released in the incident. Subscribers names, credit card numbers and bank routing numbers, were printed on the back of recycled paper […]
Oracle is advising its customers to quickly apply a critical database patch the company issued Jan. 17. Security experts warn the hole could allow even unsophisticated users to take control of Oracle databases. The patch, known as DB18, fixes a hole that affects most supported versions of the Oracle database software, including Oracle8i, Oracle9i and […]
IBM recorded more than 1 billion suspicious computer security events last year, despite a leveling off in the amount of spam e-mail and a decrease in major Internet worm and virus outbreaks. Enterprises should expect to see the same level of malicious traffic this year, even as online criminal groups shift to stealth attacks and […]
3Com unveiled a new IPS (intrusion prevention system) appliance for large enterprises and service providers on Jan. 30 called TippingPoint M60. The new appliance is the product of a 2003 joint venture between 3Com and Chinese networking equipment maker Huawei. It can stop denial of service attacks and block communications from worms, viruses, Trojan horse […]
A 45-year-old California man was arrested Jan. 25 and charged with operating an online phishing scheme that targeted America Online customers. Jeffrey Brett Goodin of Azusa, Calif., was arrested and charged with wire fraud and unauthorized use of a credit card. He could face 30 years in prison if convicted of both offenses. Goodin is […]
Oracle is advising its customers to quickly apply a critical database patch the company issued last week. Security experts warn the hole could allow even unsophisticated users to take control of Oracle databases. The patch, known as DB18, fixes a hole that affects most supported versions of the Oracle database software, including Oracle versions 8, […]
The recent move by Apple Computer to begin shipping Macintosh computers that use microprocessors from Intel could open the door to more attacks against computers running the companys OS X operating system, security experts warn. The shift to Intel processors from the Motorola Power PC processors will make it easier to create software exploits for […]
A survey of U.S. adults revealed that three times the number of respondents said they were more likely to be victimized in an online attack such as phishing or virus outbreaks than a physical crime. Twenty six percent of respondents said they think they will be a victim of a virtual crime in the next […]
A 20-year-old California man who was charged with operating a 400,000 strong “botnet” of compromised computer zombies pleaded guilty Jan. 23 and agreed to pay damages to the U.S. military and forfeit proceeds from the botnet operation, including a BMW. Jeanson James Ancheta of Downey, Calif., admitted using his botnet to launch DDoS (distributed-denial-of-service) attacks […]
Alumni and friends of Notre Dame University may have had their personal information snatched by hackers, according to a university spokesperson. This hack is the third in a series of compromises of fund-raising systems at other universities. A server containing social security numbers, credit card numbers and check images from donors to the South Bend, […]