On Fri, Apr 15, 2011 at 1:21 PM, Alex Eckelberry <[email protected]> wrote: > Does anyone actually know at this point how Epsilon was hacked? > > All we know is this: > > Late last week, Epsilon detected that customer information of a subset of > Epsilon's email clients had been exposed by an unauthorized entry into its > email system. The affected clients represent approximately 2% of Epsilon's > total client base. Since the discovery of the unauthorized entry, rigorous > internal and external reviews continue to confirm that only email addresses > and/or names were compromised. > http://tinyurl.com/3zr8o6c > http://www.google.com/search?q=epsilon+4+month+old+vulnerability
> > -----Original Message----- > From: [email protected] [mailto:[email protected]] On > Behalf Of Jeffrey Walton > Sent: Friday, April 15, 2011 7:48 AM > To: FunSec > Subject: [funsec] Best Way to Avoid Virus Infection? Update Your Software > > ".... Bradley Antis, vice president of technical strategy at > Orange,Calif.-based M86 Security, [siad] the 15 software vulnerabilities > thatwere most often exploited in the second half of 2010 could have been > stopped dead in their tracks - all already had been patched by > theirvendors.... The vulnerabilities continued to spread only because > countless PC users didn't bother to update their software, leaving enough > unpatched machines on the Internet to allow the exploits to thrive." > > http://www.securitynewsdaily.com/best-way-avoid-virus-infection-update-software-0685/ > > Apparently, Epsilon did not get the memo. > > _______________________________________________ > Fun and Misc security discussion for OT posts. > https://linuxbox.org/cgi-bin/mailman/listinfo/funsec > Note: funsec is a public and open mailing list. > _______________________________________________ Fun and Misc security discussion for OT posts. https://linuxbox.org/cgi-bin/mailman/listinfo/funsec Note: funsec is a public and open mailing list.
