Morgan Modjeski reports that Rogers Communications is notifying 226 customers that a former employee of a contractor had stolen their personal information. Rogers reportedly only learned of the breach when York Regional Police notified them that in the course of an investigation, they had found customers’ telephone numbers, full names, credit card information and even Social Insurance…
Category: Business Sector
Malvertising Attack Hits Realtor.com Visitors
Jerome Segura reports: As the debate about online ads is raging thanks to Apple’s introduction of ad blockers in its App Store, malvertising keeps on striking high profile sites. The latest victim is popular real estate website realtor.com, ranked third in its category with an estimated 28 million monthly visits according to SimilarWeb. People browsing the site in the last…
FireEye: Forbes.com served malicious ads to visitors
Steve Ragan reports: In a blog post, researchers from FireEye have outlined a malvertising campaign that was running on Forbes.com earlier this month, which led visitors to landing pages ran by the Neutrino and Angler exploit kits. The attacks were triggered on a handful of articles, but the logs released by FireEye show that none…
More details emerge on Systema Software data leak (update1)
On September 9, Chris Vickery (previously referred to as “TE” in earlier coverage) notified the KDHE that what appeared to be the entire Kansas State Self Insurance Fund SIMS database was exposed online, as were databases from other agencies and organizations. KDHE immediately notified Systema Software, who promptly secured the leaking files. Vickery also contacted DataBreaches.net, who reported on the leak and the…
AU: Townsville adult store blackmailed by hackers
Chris McMahon reports: Queensland’s oldest sex shop has been held to ransom by hackers who infected the store’s computers, locking down all its files with a highly sophisticated malware. Hackers hit Charters Towers Rd adult shop Sweethearts early on Friday morning through an email that infected the store’s servers, holding their data to ransom until…
Inside Target Corp., Days After 2013 Breach
Brian Krebs reports: In December 2013, just days after a data breach exposed 40 million customer debit and credit card accounts, Target Corp. hired security experts at Verizon to probe its networks for weaknesses. The results of that confidential investigation — until now never publicly revealed — confirm what pundits have long suspected: Once inside Target’s network, there was nothing stop…