Joe Goldeen reports: The owner of a real estate development company that was burned out of its longtime north Stockton offices said he believes the fire was intentionally set to cover up another crime. “We found it was an identity theft break-in. The fire was a diversion,” said Ken Brown, the businessman who moved his…
Category: Business Sector
Update on Albertsons breach
Lindsay Nadric reports: Earlier this month Albertsons announced a data breach affecting customers who shopped in their stores any time between June 22, 2014 and July 17, 2014. Before Friday, it was unclear which stores were impacted, but fraud investigators with AB Acquisition LLC, the company Albertsons is using to provide complimentary consumer identity protection…
Update: More details emerge on Geekface breach
Earlier this week, I blogged about a breach involving Geekface. More details are now available, as they were provided to the New Hampshire Attorney General’s Office. In its notification to the state, George Ryan, CEO, writes: Our server was breached on the 5th by someone with a Chinese IP, the main focus of the attacker…
MangaGamer reports database security breach
From UK Anime Network News: Security breaches of web sites big and small is a sad but unavoidable part of the online landscape at this point in time, and we’ve just received word from visual novel distributor MangaGamer that they have suffered from just such a breach in the past few hours. The e-mail notification…
Double whammy? Central Valley Target stores hit with credit card security breach
News10 reports that some Target customers in California have had their card numbers breached, but it’s not clear yet if there’s any connection to Target’s massive hack disclosed last year. Central Valley Target stores have been hit with a credit card security breach, according to information contained in a search warrant affidavit filed by U.S….
Oops! Mozilla left thousands of email addresses and passwords lying around (again)
Graham Cluley reports: At the beginning of August members of the Mozilla developer community were warned that approximately 76,000 email addresses and 4,000 encrypted passwords had been left on a publicly accessible server for 30 days. For most organisations, that would be embarrassing enough. But security screw-ups can be like buses, you can wait for ages noticing…