Pages

Wednesday, June 01, 2005

'Phishing' scams $1.2 billion in credit and debit fraud

A Honolulu pediatrician last week unknowingly gave his Social Security, credit card and pin numbers to an online scam artist.

Dr. Watson's Longhorn Makeover Raises Eyebrows

Dr. Watson's Longhorn Makeover Raises Eyebrows

NYSE trading halts before close on tech glitch - Jun. 1, 2005

NYSE trading halts before close on tech glitch - Jun. 1, 2005

Virtual Lock-Down

Physical vaults are no longer enough to protect bank customers' assets.

Study: U.S. residents at risk for online exploitation

The Heavy Lifter - CSO Magazine - June 2005

The Heavy Lifter - CSO Magazine - June 2005

Security Lessons Learned

Processor Editorial Article - Security Lessons Learned

One of our disc drives is missing | The Register

One of our disc drives is missing | The Register

How to make management accountable for risk

How to make management accountable for risk

Tuesday, May 31, 2005

Health Agency Demotes Staffer After Breach ; Computer Holding Private Data Stolen

http://security.ittoolbox.com/news/dispnews.asp?i=129695#

Used hard drives betray company secrets - vnunet.com

Used hard drives betray company secrets - vnunet.com

Laptop with credit card info for 80,000 DOJ workers stolen

FBI and Fairfax, Va., police are investigating the theft of a laptop that contained the names and credit card numbers of about 80,000 U.S. Department of Justice workers.

Bank of America

Debtor Claims Account Problems Because of NJ Bank Breach

Debtor Claims Account Problems Because of NJ Bank Breach: http://www.financetech.com/feed/showArticle.jhtml?articleID=163701814

Device-driven

Run, don't walk, toward IPS security

Run, don't walk, toward IPS security

MCI Data Theft Intensifies Encryption Debate

MCI Data Theft Intensifies Encryption Debate

How to crack passwords, and why you should - ZDNet UK Insight

How to crack passwords, and why you should - ZDNet UK Insight

Bank of America to use two-factor system to beat phishers

You May Not Take the Phish Bait, but are You Giving Away the Pharm?

After theft, bank tightens online security

Security best practices

---------------------------------
Security best practices
Network protection requires striking the right balance between risk and cost.

SEC fails own security and accounting tests

Hacker teenager pleads guilty (phillyBurbs.com)

Hacker teenager pleads guilty (phillyBurbs.com)

eBay hacker jailed

eBay hacker jailed

ID Theft Alleged at D.C. Blockbuster

End ID Theft.com - Sponsored by the Maricopa County Attorney's Office

SecurityFocus HOME News: Fraud expert becomes victim of credit card crime

SecurityFocus HOME News: Fraud expert becomes victim of credit card crime

Private records discovered on server

Private records discovered on server

IT Observer - Using a Network Analyser as a Security Tool

IT Observer - Using a Network Analyser as a Security Tool