Tag: compromise

Compromise emerges in Internet oversight talks 
By Matt Smith and Joseph Menn | Dec 13, 2012 | Comment Now 
Tentative assertion cuts into ICANN's responsibilities.
Police arrest truckie over 'Evil' network hack 
By Ry Crozier | Jul 27, 2011 | Comment Now 
Updated: Distribute.IT says it's the same 'Evil' that destroyed its servers.
US security expert reveals WORM compromise 
PayPal CISO refutes compromise claims 
By Dan Raywood | Aug 30, 2010 | Comment Now 
Says cybercriminals have not taken over accounts.
Google to compromise with European data officials 
By Rosalie Marshall, Liz Tay | Jun 2, 2010 | Comment Now 
But Australian investigation stalled.
Vulnerable ad servers exploited with OpenX flaw 
By Angela Moscaritolo | May 10, 2010 | Comment Now 
Exploits known vulnerability in old version.
JB Hi-Fi, Overclockers websites compromised 
By Ben Grubb | Nov 30, 2009 | Comment Now 
Users document their infections.
Gumblar botnet on the march again 
By Phil Muncaster | Nov 19, 2009 | Comment Now 
Prolific malware is changing its behaviour to avoid shutdown.
Temporary files frequently left on shared computers 
By Dan Raywood | Oct 7, 2009 | Comment Now 
Better user education needed.
Criminal gangs compromise more than 200,000 websites 
By Dan Raywood | Oct 7, 2008 | Comment Now 
Criminal gangs have acquired login details for more than 200,000 websites.
Flaws in numerous McAfee products 
By Frank Washkuch | May 10, 2007 | Comment Now 
Vulnerability monitoring organisations have reported a flaw in numerous McAfee products that can be exploited to compromise systems.
Flaw in Adobe Photoshop could compromise systems 
By Dan Kaplan | Apr 27, 2007 | Comment Now 
A popular Adobe image-editing program contains a major vulnerability for which public exploit code is available, researchers said today.
Hackers, laptop thieves compromise personal information of 17,500 in US state 
By Frank Washkuch | Apr 19, 2007 | Comment Now 
Two separate incidents — both resulting in data breaches — have left the personal information of 17,500 Ohio State University students, faculty members and staff compromised.
Go for zero point of compromise 
By Joe Uniejewski | Sep 15, 2004 | Comment Now 
Joe Uniejewski warns that concentrating sensitive data in one place is no longer a responsible solution
Sign up to receive iTnews email bulletins
Latest Comments
Should law enforcement be able to buy and use exploits?

   |   View results
Only in special circumstances
Yes, but with more transparency