Browsing Category: Social Engineering

[img_assist|nid=2639|title=|desc=|link=none|align=right|width=100|height=100]Google said in a blog post today
that it will consider shutting down its site in China and closing its
offices, following a large scale attack on its corporate infrastructure
originating from China that resulted in the theft of Google’s
intellectual property.  Read the full story [ZDNet]

Read more...

[img_assist|nid=2615|title=|desc=|link=none|align=left|width=100|height=100]In 2009, the Identity Theft Resource Center recorded 498 breaches, less than the 657 in 2008, more than the 446 in 2007. Are data breaches increasing or decreasing? That is the question no one can answer. Read the full article. [Help Net Security]

Read more...

[img_assist|nid=2588|title=|desc=|link=none|align=left|width=100|height=100]A phisher hoping to harvest bank login details managed to smuggle his app onto the Android app store. Malicious apps posted by Droid09 were quickly identified, prompting a warning to legitimate users and a ban for the VXer. Read the full article. [The Register]

Read more...

[img_assist|nid=2580|title=|desc=|link=none|align=left|width=152|height=52]Heartland Payment Systems on Jan. 8 announced that it has agreed to pay up to $60 million to Visa to cover losses to credit and debit cardholders affected by the massive data breach Heartland suffered in 2008. Read the full article. [eWEEK]

Read more...

[img_assist|nid=2546|title=|desc=|link=none|align=left|width=100|height=100]On January 1, 2010, two important state data security and privacy laws
took effect in Nevada and New Hampshire that create new
obligations for most companies that do business in Nevada and for
health care providers and business associates in New Hampshire. Read the full article. [Hunton & Williams Law Blog]

Read more...