The funds were pilfered from nine accounts spread among Mizuho Bank, eBank Corp. and Japan Net Bank, after a malicious attacker used spyware to gain eventual access to the accounts. The institutions are currently wrestling with how to compensate the customers for their losses, the report noted.
You're never too young to market to, apparently. San Francisco Chronicle columnist David Lazarus wrote his column on Wednesday about the privacy perils even tots face in this increasingly consumerized digital world. He talked to the mother of two children, ages 7 and 9, who went to a Build-A-Bear Workshop at an outlet in Santa Clara, Calif., to order customized teddy bears. While entering information into a computer at the store for "birth certificates" for the bears, the kids were asked to provide their name, birth date, gender, home address and e-mail address. Boxes giving the company … Read more
Blue Security is solliciting Internet users to participate in its complaint campaign. Users who sign up will have to install a client on their PC that, when Blue Security receives spam, will follow the links contained in the message and look for forms that accept text. The software then automatically fills out the fields with … Read more
Never heard of "phlooding" before? It's a new catchphrase coined by Wireless LAN security vendor AirMagnet for what it says is a new type of attack on businesses that (ab)uses wireless networks. Not coincidentally AirMagnet's latest 6.0 product, released on Tuesday, protects against such attacks.
Companies with a central authentication server are especially vulnerable to a phlooding attack, according to AirMagnet. In such an attack, miscreants in various locations bombard wireless access points with login requests, causing a flood of authentication requests that could impact performance of the authentication server, according to AirMagnet.
At least it is a hassle for IT admins, writes Corey Nachreiner, of security vendor WatchGuard in a blog posting. It is tough enough to keep up with Microsoft's patches. If other software makers release their fixes on the same day, the chance that a critical patch might be overlooked becomes greater, he writes.
Maybe it was … Read more
This blog has been corrected. It originally gave an outdated job title for Shahine. He currently is a lead program manager for Hotmail.
Microsoft's antispam boffins think they're onto something fairly intuitive and yet unique enough to be patentable, and they're using the term "boomerang" to describe it.
According to the blog of Omar Shahine, a lead program manager for Hotmail, the service now examines whether e-mail messages are replies in determining whether or not they're spam.
While procedures at the data broker needed to be improved, individuals at the companies did not make any mistakes, ChoicePoint's Carol DiBattiste told the Associated Press.
ChoicePoint revealed in February that scam artists had gotten access to personal data on tens of thousands of Americans, resulting in at least 750 cases of identity theft. The scandal has prompted calls for new legislation to protect consumers' privacy rights.
The Alpharetta, … Read more
New York Times columnist John Tierney must think it is much too light. In a column on Tuesday he says that he is almost convinced by a theory that society might benefit more from executing a virus writer than from giving a lethal injection to a murderer.
The guide was distributed last month to more than 3,500 school counselors, administrators and educators at education conferences and has been made available online, the International Information Systems Security Certification Consortium, or (ISC)2, said this week.
Microsoft sponsored the 35-page guide, which is titled "Decoding the Information Security Profession." The booklet offers a description of information security, typical jobs, titles, industries and organizations, professional requirements, certification options, typical … Read more
For Majoras, her credit card information was stolen, along with approximately 1.4 million other customers in the company's database. Majoras, in her role with the FTC, is responsible for such tasks as safeguarding consumers from such hazards as fraud, misleading advertising, antitrust violations and, yes, identity theft.
The fight against malicious … Read more