On Fri, Apr 15, 2011 at 1:21 PM, Alex Eckelberry
<[email protected]> wrote:
> Does anyone actually know at this point how Epsilon was hacked?
>
> All we know is this:
>
> Late last week, Epsilon detected that customer information of a subset of 
> Epsilon's email clients had been exposed by an unauthorized entry into its 
> email system. The affected clients represent approximately 2% of Epsilon's 
> total client base. Since the discovery of the unauthorized entry, rigorous 
> internal and external reviews continue to confirm that only email addresses 
> and/or names were compromised.
> http://tinyurl.com/3zr8o6c
>
http://www.google.com/search?q=epsilon+4+month+old+vulnerability

>
> -----Original Message-----
> From: [email protected] [mailto:[email protected]] On 
> Behalf Of Jeffrey Walton
> Sent: Friday, April 15, 2011 7:48 AM
> To: FunSec
> Subject: [funsec] Best Way to Avoid Virus Infection? Update Your Software
>
> ".... Bradley Antis, vice president of technical strategy at 
> Orange,Calif.-based M86 Security, [siad] the 15 software vulnerabilities 
> thatwere most often exploited in the second half of 2010 could have been 
> stopped dead in their tracks - all already had been patched by 
> theirvendors.... The vulnerabilities continued to spread only because 
> countless PC users didn't bother to update their software, leaving enough 
> unpatched machines on the Internet to allow the exploits to thrive."
>
> http://www.securitynewsdaily.com/best-way-avoid-virus-infection-update-software-0685/
>
> Apparently, Epsilon did not get the memo.
>
> _______________________________________________
> Fun and Misc security discussion for OT posts.
> https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
> Note: funsec is a public and open mailing list.
>

_______________________________________________
Fun and Misc security discussion for OT posts.
https://linuxbox.org/cgi-bin/mailman/listinfo/funsec
Note: funsec is a public and open mailing list.

Reply via email to