Does anyone actually know at this point how Epsilon was hacked? 

All we know is this:

Late last week, Epsilon detected that customer information of a subset of 
Epsilon's email clients had been exposed by an unauthorized entry into its 
email system. The affected clients represent approximately 2% of Epsilon's 
total client base. Since the discovery of the unauthorized entry, rigorous 
internal and external reviews continue to confirm that only email addresses 
and/or names were compromised.
http://tinyurl.com/3zr8o6c



Alex


-----Original Message-----
From: [email protected] [mailto:[email protected]] On 
Behalf Of Jeffrey Walton
Sent: Friday, April 15, 2011 7:48 AM
To: FunSec
Subject: [funsec] Best Way to Avoid Virus Infection? Update Your Software

".... Bradley Antis, vice president of technical strategy at 
Orange,Calif.-based M86 Security, [siad] the 15 software vulnerabilities 
thatwere most often exploited in the second half of 2010 could have been 
stopped dead in their tracks - all already had been patched by theirvendors.... 
The vulnerabilities continued to spread only because countless PC users didn't 
bother to update their software, leaving enough unpatched machines on the 
Internet to allow the exploits to thrive."

http://www.securitynewsdaily.com/best-way-avoid-virus-infection-update-software-0685/

Apparently, Epsilon did not get the memo.

_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to