Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Latest News
    • Blogs
    • Security Watch

    Big Names Still Recording Major Breaches

    By
    Matthew Hines
    -
    July 30, 2008
    Share
    Facebook
    Twitter
    Linkedin

      A lot of people are writing up IBM’s latest X-Force Threat Insight report, as the paper presents a stark portrait of continued malware acceleration, rootkit activity and general cyber-crime mayhem that has surfaced over the last month alone.

      But one of the less-reported and more interesting aspects of the research report is its list of major security/data breaches that have occurred since the end of June.

      There was a time when nearly every major breach garnered ink, but as audiences have become increasingly de-sensitized to the incidents over time, based mostly on their volume and unbending frequency, the media has stopped its highlighting of all but the most incredible of the attacks and accidents (hello TJX Companies!).

      However, lest anyone should think that serious incidents are not still occurring on a regular basis at organizations of all sizes, shapes and business models, one look at the IBM list reveals that the last month produced some fairly diverse and noteworthy events.

      And according to IBM researchers, the incidents are being carried out and/or caused by a number of different methods and factors.

      “In addition to the loss or misplacement of information, corporations and individuals are at risk to exposure via malware, hacking, phishing attacks and various social engineering tactics,” the company said in its report. “There are also non-cyber related methods such as stealing mail, dumpster-diving or obtaining information from employees or stolen records.”

      Here’s IBM’s list of major security events that have taken place since June:

      At deep-pocketed Citibank: a server that processes ATM withdrawals was breached. The incident resulted in hundreds of fraudulent withdrawals from New York City ATM machines.

      ATM-related incidents always seem ideal. No fence or middleman needed. Free money!

      Cotton Traders apparently got fleeced in: an attack against the company’s Web site that compromised the credit card details of as many as 38,000 customers.

      I’m noticing a common thread here. Ouch.

      Oy! At the Scottish Ambulance Service: a disc containing the records of close to 900,000 emergency calls, including the name and addresses of patients has “gone missing.”

      Gone missing? Is IBM quoting the directly from the Scottish crime report?

      Within the vaunted halls of Stanford University: a laptop containing sensitive information, including faculty members’, staffers’ and students’ names, addresses, Social Security numbers, birth dates, university ID and employee numbers was stolen, potentially compromising 72,000 records.

      Really, there aren’t too many school that could/would/should be more embarrassed about this, right? No security love from the alumni? No free consulting? All the goods were stored on ONE laptop people? MIT grads are laughing somewhere.

      At the recently-reaffirmed top party school in the U.S., the University of Florida: the sensitive information, including Social Security numbers, names and addresses of 11,000 current and former students was posted online.

      OK, that’s decidedly less surprising, but I’m pretty sure they’ve also got a better football team than Stanford… and parties.

      And at the University of Utah Hospital: some 2.2 million billing records containing the personal information of patients from the past 16 years have been stolen.

      I cannot think of a single thing to associate with UUH. UUH? 2.2 million! UUH! UUH!

      So, it’s still happening left and right. To big organizations with a lot of time and money to spend on security, or who themselves trained some of the most prolific IT security experts in the field today.

      And at the Scottish Ambulance Service — imagine being that CSO, that poor git.

      He looks like a half shut knife!

      Matt Hines has been following the IT industry for over a decade as a reporter and blogger, and has been specifically focused on the secuity space since 2003, including a previous stint writing for eWeek and contributing to the Security Watch blog. Hines is currently employed as marketing communications manager at Core Security Technologies, a Boston-based maker of security testing software. The views expressed herein do not necessarily represent the views of Core Security, and neither the company, nor its products and services will be actively discussed in the blog. Please send news, research or tips to SecurityWatchBlog@gmail.com.

      Matthew Hines
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×