Technology Get the latest on technology, electronics and software…

The Official Internet/Computer Security News Discussion Thread

Thread Tools
 
Old 02-16-2011, 01:02 AM
  #161  
Sanest Florida Man
Thread Starter
 
#1 STUNNA's Avatar
 
Join Date: Aug 2007
Location: Florida
Posts: 43,375
Received 10,117 Likes on 6,107 Posts
So everyone knows how I recommend ninite.com and MSE, right? Well, I finally got my computer back up and running after being offline for almost four months and one of the first things I did was go to ninite.com to get everything update to date in one fell swoop.

Thankfully I had already updated MSE to v 2.0 and had the latest definitions. Because while installing I believe it was Filezilla MSE popped up a warning saying that it had detected a low level threat. It's called Open Candy. So I did some research and saw that OpenCandy was added to MSE definitions for the 1st time on Feb 12th. OpenCandy is as they say on their website

Q: What is OpenCandy?

A: OpenCandy runs a moderated recommendation network that enables software developers to recommend other software during installation of their application they believe will be valuable to their users. We were started by a passionate group of people who were determined to help users discover software and change the way software developers make money and reach new users. That’s why OpenCandy-powered recommendations are clearly labeled and why we allow only the best software into our network.
Basically it's :ghey:. I guess one of the programs I was installing tried to install the OCSetuphlp.dll and MSE caught that shit! I think it was Filezilla or may have been WinSCP. Either way their pretty well known and respected apps so it kinda sucks that they'd resort to something ghey like OpenCandy!

Thanks MSE! Good thing I didn't switch to Norton!

So just a heads up guys watch out for this shit!

http://www.opencandy.com/faqs/
Old 02-16-2011, 01:34 AM
  #162  
uʍop ǝpısdn ǝdʎʇ uɐɔ ı
 
thelastaspec's Avatar
 
Join Date: Apr 2010
Posts: 1,363
Received 47 Likes on 41 Posts
Originally Posted by #1 STUNNA
So everyone knows how I recommend ninite.com and MSE, right? Well, I finally got my computer back up and running after being offline for almost four months and one of the first things I did was go to ninite.com to get everything update to date in one fell swoop.

Thankfully I had already updated MSE to v 2.0 and had the latest definitions. Because while installing I believe it was Filezilla MSE popped up a warning saying that it had detected a low level threat. It's called Open Candy. So I did some research and saw that OpenCandy was added to MSE definitions for the 1st time on Feb 12th. OpenCandy is as they say on their website



Basically it's :ghey:. I guess one of the programs I was installing tried to install the OCSetuphlp.dll and MSE caught that shit! I think it was Filezilla or may have been WinSCP. Either way their pretty well known and respected apps so it kinda sucks that they'd resort to something ghey like OpenCandy!

Thanks MSE! Good thing I didn't switch to Norton!

So just a heads up guys watch out for this shit!

http://www.opencandy.com/faqs/
run both lol
Old 03-01-2011, 07:05 PM
  #163  
Team Owner
 
doopstr's Avatar
 
Join Date: Jan 2001
Location: Jersey
Age: 52
Posts: 25,330
Received 2,049 Likes on 1,135 Posts
If you don't want anyone finding your deleted porn, delete it from an SSD instead of an HD!
SSD firmware destroys digital evidence, researchers find
http://news.techworld.com/security/3...earchers-find/
After examining an SSD for traces of data after it had been quick formatted, the team expected the purging routines to kick in around 30-60 minutes later, a process that must happen on SSDs before new data can be written to those blocks. To their surprise, this happened in only three minutes, after which only 1,064 out of 316,666 evidence files were recoverable from the drive.
Going a stage further, they removed the drive from the PC and connected a ‘write blocker’, a piece of hardware designed to isolate the drive and stop any purging of its contents. Incredibly, after leaving this attached for only 20 minutes, almost 19 percent of its files had been wiped for good, a process the researchers put down the ability of SSDs to initiate certain routines independent of a computer.
"The fact that data has been purged does not mean that a human knowingly tried to destroy evidence (e.g. 'accidentally appearing guilty'). [But] SSD data purging can destroy the evidence needed to demonstrate guilt (e.g. accidentally seeming innocent)," says Bell.
I like SSD technology better everyday.

Last edited by doopstr; 03-01-2011 at 07:08 PM.
Old 03-01-2011, 07:06 PM
  #164  
nnInn
 
jupitersolo's Avatar
 
Join Date: Mar 2006
Posts: 37,670
Received 1,084 Likes on 646 Posts
I bet stogie will find it.
Old 03-02-2011, 12:40 PM
  #165  
1919
 
Scottman111's Avatar
 
Join Date: Mar 2005
Age: 38
Posts: 21,467
Likes: 0
Received 162 Likes on 134 Posts
Hmm, my teacher was talking about that last semester in my Forensics class. Nice read
Old 03-02-2011, 12:46 PM
  #166  
1919
 
Scottman111's Avatar
 
Join Date: Mar 2005
Age: 38
Posts: 21,467
Likes: 0
Received 162 Likes on 134 Posts
In other news, my boss's friend lugs his computer in here yesterday so my boss can fix it. Guy is a complete clueless trash ball.

He says something popped up on his screen, saying he had to pay them to clean all of the viruses off of his computer. So, according to him, he calls the number and gives them his credit card number, and then a few days later his computer won't even function. Said they "sounded like a bunch of damn foreigners on the phone!!"

My first reaction was and then
Old 03-02-2011, 02:05 PM
  #167  
Team Owner
 
doopstr's Avatar
 
Join Date: Jan 2001
Location: Jersey
Age: 52
Posts: 25,330
Received 2,049 Likes on 1,135 Posts
Old 03-02-2011, 02:41 PM
  #168  
Sanest Florida Man
Thread Starter
 
#1 STUNNA's Avatar
 
Join Date: Aug 2007
Location: Florida
Posts: 43,375
Received 10,117 Likes on 6,107 Posts
I bet he sends money to Nigerian Ministers of Finance a buys viagra prescriptions via spam email.

It's because of people like him that we have spam mail, there's always someone dumb enough to click on it that makes it worthwhile to the spammers.

Please tell him I said that too....
Old 03-02-2011, 03:04 PM
  #169  
1919
 
Scottman111's Avatar
 
Join Date: Mar 2005
Age: 38
Posts: 21,467
Likes: 0
Received 162 Likes on 134 Posts
Originally Posted by #1 STUNNA
I bet he sends money to Nigerian Ministers of Finance a buys viagra prescriptions via spam email.

It's because of people like him that we have spam mail, there's always someone dumb enough to click on it that makes it worthwhile to the spammers.

Please tell him I said that too....

Yeah, he's just a complete lost cause. Nice guy, his brain has just been fried from years and years of substance abuse. He's like 40 but should've died at 30.

With that said, my boss has fixed his PC no less than 15 times in the past 3 years or so. Always a virus, usually from pr0n or trying to play casino games online. My boss tries explaining why it keeps happening and how to avoid it but it's always met with a blank stare.

Reason number 8 billion I don't volunteer to work on people's stuff....you feed it once and now it stays
Old 03-02-2011, 05:59 PM
  #170  
Sanest Florida Man
Thread Starter
 
#1 STUNNA's Avatar
 
Join Date: Aug 2007
Location: Florida
Posts: 43,375
Received 10,117 Likes on 6,107 Posts
So he's been dead for 10 years.....
Old 03-04-2011, 01:20 AM
  #171  
Sanest Florida Man
Thread Starter
 
#1 STUNNA's Avatar
 
Join Date: Aug 2007
Location: Florida
Posts: 43,375
Received 10,117 Likes on 6,107 Posts
Originally Posted by doopstr
If you don't want anyone finding your deleted porn, delete it from an SSD instead of an HD!
SSD firmware destroys digital evidence, researchers find
http://news.techworld.com/security/3...earchers-find/




I like SSD technology better everyday.
I've been meaning to respond to this.

This is interesting because just a few days ago there was another report going around from UC San Diego saying that they tested a bunch of SSDs and a lot of them didn't work well with secure erase and a lot of the data was recoverable and that the best way to keep data secure on an SSD was to encrypt it from the get go.

http://news.techworld.com/security/3...earchers-find/

Researchers at UC San Diego found that the normal methods we use to securely wipe magnetic drives aren’t as useful on solid-state drives. After testing twelve SSDs, they found that only four were securely erased with whole-drive erasure methods. Trying to securely wipe a single file was even less successful, and more often than not a good portion of the file was recoverable.

The best way to keep your data secure on an SSD, the researchers said, was to encrypt the entire disk from the get-go, as soon as you’ve installed your operating system. Then, when you’re done with the drive, you can delete the encryption keys and do a regular full-drive erasure. They note that securely erasing unencrypted SSDs is very difficult, and in some cases impossible.
There's an AskArs Article about it too:
http://arstechnica.com/ask-ars/2011/...-ssd-drive.ars
Old 03-04-2011, 01:31 AM
  #172  
Sanest Florida Man
Thread Starter
 
#1 STUNNA's Avatar
 
Join Date: Aug 2007
Location: Florida
Posts: 43,375
Received 10,117 Likes on 6,107 Posts
And you want to know what makes this even weirder is that the original article that I'm quoting was also from techworld a few days before yours.

Actually they mention it at the end of the article you posted

Paradoxically, only last week researchers in California uncovered a separate but related problem with SSDs, namely that it could be hard to securely wipe data from them in a guaranteed, controlled way.

Although at first it sounds as if this finding contradicts the Australian research (i.e that data is constantly being wiped by SSDs in order to maintain performance), it is more concerned with the difficulty of guaranteeing that data has really been erased from the portion of the drive it is located on from the point of view of software erase programs
Old 03-09-2011, 01:33 AM
  #173  
Sanest Florida Man
Thread Starter
 
#1 STUNNA's Avatar
 
Join Date: Aug 2007
Location: Florida
Posts: 43,375
Received 10,117 Likes on 6,107 Posts
Pwn2Own contest starts today! For those that don't know Pwn2Own is a contest where hackers come and are challenged with showing off new unpublished security vulnerabilities that allow someone to get complete control of a system. If said hacker can compromise the system using a zero day exploit then they can win a free laptop and up to $10k in cash money. So if you know an exploit in OS X using Safari that allows complete control of the OS then you can win a MBP and a bunch of cash.

For the past 3 years a man named Charlie Miller has put a beatdown on OS X and exploits the system in a matter of seconds and wins $10k and a new laptop every year. He says this year shouldn't be any different

Google is very confident in the security of their browser (last year no one bothered trying to hack it since it was so difficult) and they are offering $20k to any hacker that can show off a vulnerability that can get through Chrome's sandbox on a Windows 7 machine on the first day of the contest.
Old 03-09-2011, 01:52 AM
  #174  
Sanest Florida Man
Thread Starter
 
#1 STUNNA's Avatar
 
Join Date: Aug 2007
Location: Florida
Posts: 43,375
Received 10,117 Likes on 6,107 Posts
It seems that browser vendors are trying to get out all security patches they can before Pwn2Own starts. Google released Chrome 10 yesterday and that had 24 security patches most of them rated "high risk" and a few days before that the released another round of updates that fixed 18 vulnerabilities in Chrome.

Firefox released 3.6.14 with 10 vulnerabilities patch of which 8 are rated "critical".

Apple released an update to iTunes that patched 57 security flaws, of which 50 where in the webkit engine which is the same engine that safari uses. Not sure when these patches will be applied to Safari, it was rumored it would be before pwn2OWn but it seems that time has passed.
Old 03-09-2011, 12:40 PM
  #175  
Sanest Florida Man
Thread Starter
 
#1 STUNNA's Avatar
 
Join Date: Aug 2007
Location: Florida
Posts: 43,375
Received 10,117 Likes on 6,107 Posts
Well Apple updated Safari to 5.0.4 today....
Old 03-09-2011, 01:08 PM
  #176  
Needs more Lemon Pledge
 
stogie1020's Avatar
 
Join Date: Mar 2005
Location: Phoenix, AZ
Age: 51
Posts: 52,768
Received 2,000 Likes on 1,173 Posts
I have not vetted (nor will I) any of the concepts on this page, but if you like to tinker some of these articles may be of interest:


http://www.aagneyam.com/blog/?cat=708
Old 03-09-2011, 02:34 PM
  #177  
Sanest Florida Man
Thread Starter
 
#1 STUNNA's Avatar
 
Join Date: Aug 2007
Location: Florida
Posts: 43,375
Received 10,117 Likes on 6,107 Posts
iOS 4.3 was set to be launched on march 11th but they launched it early today. Since Pwn2Own started focusing on smartphones last year I think they released it early to give it the best chance of not being hacked. Especially since iOS 4.3 implements ASLR.
Old 03-09-2011, 06:27 PM
  #178  
Sanest Florida Man
Thread Starter
 
#1 STUNNA's Avatar
 
Join Date: Aug 2007
Location: Florida
Posts: 43,375
Received 10,117 Likes on 6,107 Posts
Despite last minute updates and like it's done every year before Mac OS X was the first to fall in the Pwn2Own challenge. Running the latest version of Safari and x64 OS X Snow leopard the system was compromised in a matter of seconds. The user just had to visit a malicious website and in seconds that hacker had complete control of the system.

http://www.zdnet.com/blog/security/s...e_skin;content
Old 03-10-2011, 02:10 PM
  #179  
Drifting
iTrader: (1)
 
rza49311's Avatar
 
Join Date: Feb 2006
Location: Southern VA
Age: 45
Posts: 3,072
Received 8 Likes on 6 Posts
http://www.eweek.com/c/a/Windows/Mic...elease-773282/

"Microsoft's Internet Explorer 9 will be available starting March 14 at 9 p.m. PST. Microsoft hopes the new browser will draw users over Firefox and Google Chrome."

Old 03-10-2011, 02:16 PM
  #180  
Banned
 
CocheseUGA's Avatar
 
Join Date: Mar 2009
Location: Kennesaw, GA
Age: 44
Posts: 18,761
Received 960 Likes on 593 Posts
The reviews are pretty decent.
Old 03-10-2011, 02:28 PM
  #181  
Team Owner
 
doopstr's Avatar
 
Join Date: Jan 2001
Location: Jersey
Age: 52
Posts: 25,330
Received 2,049 Likes on 1,135 Posts
Originally Posted by #1 STUNNA
Despite last minute updates and like it's done every year before Mac OS X was the first to fall in the Pwn2Own challenge. Running the latest version of Safari and x64 OS X Snow leopard the system was compromised in a matter of seconds. The user just had to visit a malicious website and in seconds that hacker had complete control of the system.
The "first to fall" and "in a matter of seconds" is misleading. The hackers spent two weeks developing the exploit.
Old 03-10-2011, 03:22 PM
  #182  
Sanest Florida Man
Thread Starter
 
#1 STUNNA's Avatar
 
Join Date: Aug 2007
Location: Florida
Posts: 43,375
Received 10,117 Likes on 6,107 Posts
yes but I believe they have all day or a period of a few hours to exploit the machine. It only took 5 seconds. Also the reason they say that it took two weeks to find the vulnerability was not because of difficulty but because 64bit OS X exploits where undocumented.

exploitation was complicated by the fact that exploit techniques for 64-bit Safari are not widely documented. The techniques that the researchers used to bypass operating system protections like Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) are well-known, but the specific use and adaptation of these techniques on 64-bit Safari is unusual and required developing tools and attack code from scratch.
So unlike other browsers in which a lot of info on how to exploit is freely available 64bit safari doesn't have that yet so they had to figure it out themselves.

Last edited by #1 STUNNA; 03-10-2011 at 03:35 PM.
Old 03-10-2011, 03:28 PM
  #183  
Sanest Florida Man
Thread Starter
 
#1 STUNNA's Avatar
 
Join Date: Aug 2007
Location: Florida
Posts: 43,375
Received 10,117 Likes on 6,107 Posts
Also IE8 on W7 Sp1 fell after Safari and it also only took a few seconds. The hacker had to use a combination of 3 zero day exploits, 2 to get remote code execution and 1 to bypass the protected mode sandbox. This is only the 2nd known exploit to bypass protected mode the other was posted earlier in this thread.

Like the Safari exploit this hacker said he spent 6 weeks working on the exploit and that hardest part was getting out of the protected mode sandbox.

Here's an interview with Stephen Fewer at CanSecWest

<object style="height: 390px; width: 640px"><param name="movie" value="http://www.youtube.com/v/0Ju7GtFzBX8?version=3"><param name="allowFullScreen" value="true"><param name="allowScriptAccess" value="always"><embed src="http://www.youtube.com/v/0Ju7GtFzBX8?version=3" type="application/x-shockwave-flash" allowfullscreen="true" allowScriptAccess="always" width="640" height="390"></object>


http://www.zdnet.com/blog/security/p...e_skin;content
Old 03-10-2011, 03:32 PM
  #184  
Sanest Florida Man
Thread Starter
 
#1 STUNNA's Avatar
 
Join Date: Aug 2007
Location: Florida
Posts: 43,375
Received 10,117 Likes on 6,107 Posts
It appears even though Google offered $20k to anyone that could exploit Chrome no one even tried it. Someone was scheduled to attempt it but they never showed up. I'm pretty sure if they had a working exploit they would've found a way to get there.
Old 03-10-2011, 03:38 PM
  #185  
Sanest Florida Man
Thread Starter
 
#1 STUNNA's Avatar
 
Join Date: Aug 2007
Location: Florida
Posts: 43,375
Received 10,117 Likes on 6,107 Posts
Stephen Fewer said a similar thing in the interview above

The time taken to develop working exploits shows that operating system-level protections like DEP and ASLR are useful tools. Finding security flaws in the browser is one thing; turning it into a useful attack that will succeed on up-to-date systems is quite another. But though the protection mechanisms make the job of exploiting flaws harder, they're plainly not impervious. Motivated attackers will find a way through the protection. The days of overnight hacks may be behind us—at the first pwn2own in 2007, an exploitable Safari flaw was discovered in five hours and a reliable exploit developed in just four hours—but successful hacks will continue to be an issue.
http://arstechnica.com/security/news...challenged.ars

Last edited by #1 STUNNA; 03-10-2011 at 03:45 PM.
Old 03-10-2011, 05:38 PM
  #186  
Sanest Florida Man
Thread Starter
 
#1 STUNNA's Avatar
 
Join Date: Aug 2007
Location: Florida
Posts: 43,375
Received 10,117 Likes on 6,107 Posts
Famous OS X hacker Charlie Miller was able to exploit iOS on the iPhone 4 and access the phone's entire address book by visiting as website in mobile safari.

The thing is it won't work on iOS 4.3 as I stated earlier Apple added ASLR to 4.3 and that stops his exploit.

Historically, the competition has required competitors to use the newest version of the browser and operating system. Perhaps aware of this, Apple released Safari 5.0.4 a day ahead of the competition, patching some 60 security holes in the browser. However, this year the rules have been altered: the configuration was frozen a week ago, hence the competition being run against Safari 5.0.3. Under the new rules, pwning (and hence owning) only needs to succeed on the frozen version.
Same thing with iOS the contest was on 4.2.1. Ars says that in order to get the monies and the device that the flaw also has to work on 4.3 which it doesn't but ZDnet is at the conference and says that Charlie Miller did win the monies even though the exploit doesn't work on 4.3


In an interview with ZDNet, Miller said the attack works perfectly against an iPhone running iOS 4.2.1 but will fail against the newest iOS 4.3 update.

Apple has quietly added ASLR (address space layout randomization) to iOS 4.3, a key mitigation that puts up an extra roadblock for hackers.

“If you update your iPhone today, the [MobileSafari] vulnerability is still there, but the exploit won’t work. I’d have to bypass DEP and ASLR for this exploit to work,” Miller said.

Miller’s winning exploit used ROP (return oriented programming) techniques to bypass DEP.

This is not the first time Miller has successfully broken into a fully patched iPhone. In 2007, Miller exploited the new iPhone’s Safari browser to launch code that read the log of SMS messages, the address book, the call history, and the voicemail data. Then in 2009, Miller teamed up with Colin Mulliner to exploit a memory corruption bug in the way the iPhone handles SMS messages.

Over the years, Miller said the iPhone’s security posture has improved significantly.

“The first one [in 2007] was really, really easy. They had nothing, no sandboxing. Everything was running as root. It was super easy. The SMS one [in 2009] was harder because of DEP but there were no sandbox issues because the process that controlled SMSes wasn’t in a sandbox.”

“As of 4.3, because of the new ASLR, it will be much harder,” Miller added.
http://www.zdnet.com/blog/security/c...e_skin;content

Last edited by #1 STUNNA; 03-10-2011 at 05:43 PM.
Old 03-10-2011, 07:03 PM
  #187  
Sanest Florida Man
Thread Starter
 
#1 STUNNA's Avatar
 
Join Date: Aug 2007
Location: Florida
Posts: 43,375
Received 10,117 Likes on 6,107 Posts
Blackberry OS 6 was hacked today at the contest as well. Since OS 6 uses a webkit browser engine the hackers where able to uses a vulnerability there and string together a few more to gain access to the contacts and images of the phone. Like Safari x64 there isn't any documentation on hacking blackberries so that made it difficult.

While the research team acknowledged that the BlackBerry benefits from obscurity, Iozzo said the absence of ASLR, DEP and code signing has put the device “way behind the iPhone” from a security perspective.

“The advantage for BlackBerry is the obscurity. It makes it a bit harder to attack a system if you don’t have documentation and information,” Iozzo said.
That's not good for the future of blackberries in teh workplace. Windows Phone 7 came out the gate with DEP, ASLR and Sandbox so BB gonna have to step it's game up fast to fight of Apple and Microsoft.....

http://www.zdnet.com/blog/security/p...e_skin;content

Last edited by #1 STUNNA; 03-10-2011 at 07:05 PM.
Old 03-10-2011, 07:14 PM
  #188  
Team Owner
 
doopstr's Avatar
 
Join Date: Jan 2001
Location: Jersey
Age: 52
Posts: 25,330
Received 2,049 Likes on 1,135 Posts
lol, I thought the one thing Blackberry had going for it was that it was more secure than iPhone.
Old 03-10-2011, 07:17 PM
  #189  
Sanest Florida Man
Thread Starter
 
#1 STUNNA's Avatar
 
Join Date: Aug 2007
Location: Florida
Posts: 43,375
Received 10,117 Likes on 6,107 Posts
I think it's email connection is secure, which is important. The device itself, I guess not so much. No code signing?
Old 04-03-2011, 08:22 AM
  #190  
Team Owner
 
doopstr's Avatar
 
Join Date: Jan 2001
Location: Jersey
Age: 52
Posts: 25,330
Received 2,049 Likes on 1,135 Posts
more spam for me!
I received this email from Disney Destinations and a similar email from Tivo.

In short, I never heard of Epsilon, they hold email lists, they got haxored.


Dear Guest,

We have been informed by one of our email service providers, Epsilon,
that your email address was exposed by an unauthorized entry into that
provider's computer system. We use our email service providers to
help us manage the large number of email communications with our
guests. Our email service providers send emails on our behalf to
guests who have chosen to receive email communications from us.

We regret that this incident has occurred and any inconvenience this
incident may cause you. We take your privacy very seriously, and we
will continue to work diligently to protect your personal information.

We want to assure you that your email address was the only personal
information we have regarding you that was compromised in this
incident.

As a result of this incident, it is possible that you may receive spam
email messages, emails that contain links containing computer viruses
or other types of computer malware, or emails that seek to deceive you
into providing personal or credit card information. As a result, you
should be extremely cautious before opening links or attachments from
unknown third parties or providing a credit card number or other
sensitive information in response to any email.

If you have any questions regarding this incident, please contact us
at (407) 560-2547 during the hours of 9:00 am to 7:00 pm (Eastern Time)
Monday through Friday, and 9:00 am through 5:00 pm (Eastern Time)
Saturday and Sunday.

Sincerely,

Disney Destinations
Old 04-03-2011, 09:39 AM
  #191  
Sanest Florida Man
Thread Starter
 
#1 STUNNA's Avatar
 
Join Date: Aug 2007
Location: Florida
Posts: 43,375
Received 10,117 Likes on 6,107 Posts
Old 04-03-2011, 03:22 PM
  #192  
Team Owner
 
doopstr's Avatar
 
Join Date: Jan 2001
Location: Jersey
Age: 52
Posts: 25,330
Received 2,049 Likes on 1,135 Posts
http://technolog.msnbc.msn.com/_news...ecurity-breach
A major security breach exposed countless customer emails for a growing list of companies, including TiVo, JPMorgan Chase, Citi, Capital One, Marriott Rewards, Walgreens and more.

Epsilon, the world's largest permission-based email marketing services company, released a statement reporting an unauthorized entry in its clients' customer database on Friday. Email addresses and customer names were obtained. The list of client databases began with the grocery chain Krogers, but as the investigation continues, more companies are added.

Epsilon sends over 40 billion emails annually and counts over 2,500 clients, including 7 of the Fortune 10 to build and host their customer databases, reports Security Week:
The current list of companies affected include:
TiVo
US Bank
JPMorgan Chase
Capital One
Barclays Bank of Delaware
McKinsey & Company
Marriott Rewards
Ritz-Carlton Rewards
New York & Company
Walgreens
Brookstone
LL Bean
The College Board
Home Shopping Network (HSN)
Disney Destinations

Last edited by doopstr; 04-03-2011 at 03:24 PM.
Old 04-03-2011, 03:34 PM
  #193  
Sanest Florida Man
Thread Starter
 
#1 STUNNA's Avatar
 
Join Date: Aug 2007
Location: Florida
Posts: 43,375
Received 10,117 Likes on 6,107 Posts
Aww WTF! Everyone make new email addresses!
Old 04-04-2011, 10:15 AM
  #194  
Sanest Florida Man
Thread Starter
 
#1 STUNNA's Avatar
 
Join Date: Aug 2007
Location: Florida
Posts: 43,375
Received 10,117 Likes on 6,107 Posts
Awwww FUCK! I just got this email from BB!!

Dear Valued Best Buy Customer,

On March 31, we were informed by Epsilon, a company we use to send emails to our customers, that files containing the email addresses of some Best Buy customers were accessed without authorization.

We have been assured by Epsilon that the only information that may have been obtained was your email address and that the accessed files did not include any other information. A rigorous assessment by Epsilon determined that no other information is at risk. We are actively investigating to confirm this.

For your security, however, we wanted to call this matter to your attention. We ask that you remain alert to any unusual or suspicious emails. As our experts at Geek Squad would tell you, be very cautious when opening links or attachments from unknown senders.

In keeping with best industry security practices, Best Buy will never ask you to provide or confirm any information, including credit card numbers, unless you are on our secure e-commerce site, www.bestbuy.com. If you receive an email asking for personal information, delete it. It did not come from Best Buy.

Our service provider has reported this incident to the appropriate authorities.

We regret this has taken place and for any inconvenience this may have caused you. We take your privacy very seriously, and we will continue to work diligently to protect your personal information. For more information on keeping your data safe, please visit:
http://www.geeksquad.com/do-it-yours...data-safe.aspx.

Sincerely,

Barry Judge
Executive Vice President & Chief Marketing Officer
Best Buy
Old 04-06-2011, 12:31 AM
  #195  
Sanest Florida Man
Thread Starter
 
#1 STUNNA's Avatar
 
Join Date: Aug 2007
Location: Florida
Posts: 43,375
Received 10,117 Likes on 6,107 Posts
We should have a contest to see who has received the most emails about this Epsilon email breach! I'm up to 3 so far! Chase, BB and Amex...
Old 04-06-2011, 06:25 AM
  #196  
Team Owner
 
doopstr's Avatar
 
Join Date: Jan 2001
Location: Jersey
Age: 52
Posts: 25,330
Received 2,049 Likes on 1,135 Posts
Chase, 1800flowers, Citi, Tivo, Amex.
Old 04-06-2011, 06:41 AM
  #197  
Go Giants
 
Whiskers's Avatar
 
Join Date: Aug 2004
Location: PA
Age: 52
Posts: 69,901
Received 1,231 Likes on 821 Posts
Best Buy.
Old 04-06-2011, 08:45 AM
  #198  
Drifting
iTrader: (1)
 
rza49311's Avatar
 
Join Date: Feb 2006
Location: Southern VA
Age: 45
Posts: 3,072
Received 8 Likes on 6 Posts
I got one of those Epsilon emails from Target.
Old 04-06-2011, 09:36 AM
  #199  
Team Owner
 
doopstr's Avatar
 
Join Date: Jan 2001
Location: Jersey
Age: 52
Posts: 25,330
Received 2,049 Likes on 1,135 Posts
One more for me, Robert Half Technology.

I also read that Verizon is now included.
Old 04-10-2011, 10:31 PM
  #200  
Needs more Lemon Pledge
 
stogie1020's Avatar
 
Join Date: Mar 2005
Location: Phoenix, AZ
Age: 51
Posts: 52,768
Received 2,000 Likes on 1,173 Posts
Grrrrr.

Monstermarketplace.com redirects through Google...

Ran Spybot, removed a trojan
Ran MBytes found nothing

Running F-Secure online scan and then will run combo-fix.

Flushed the DNS cache.

Anyone have any other suggestions?


Quick Reply: The Official Internet/Computer Security News Discussion Thread



All times are GMT -5. The time now is 07:19 AM.