Re: Capital One Data Breach-100 Million Customers affected

2019-08-07 Thread Clark Morris
ager >323-715-0595 Mobile >626-543-6132 Office ?=== NEW >robin...@sce.com > >-Original Message- >From: IBM Mainframe Discussion List On Behalf Of >Clark Morris >Sent: Wednesday, July 31, 2019 8:51 AM >To: IBM-MAIN@LISTSERV.UA.EDU >Subject: (External):Re: Capita

Re: Capital One Data Breach-100 Million Customers affected

2019-08-03 Thread Charles Mills
@LISTSERV.UA.EDU] On Behalf Of Matt Hogstrom Sent: Saturday, August 3, 2019 10:50 AM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: Capital One Data Breach-100 Million Customers affected I think the main take-away is that in almost all cases its either software bugs, poor security defaults that don’t

Re: Capital One Data Breach-100 Million Customers affected

2019-08-03 Thread Matt Hogstrom
nframes, of course. > > Charles > > > -Original Message- > From: IBM Mainframe Discussion List [mailto:IBM-MAIN@LISTSERV.UA.EDU] On > Behalf Of Bill Johnson > Sent: Wednesday, July 31, 2019 9:33 AM > To: IBM-MAIN@LISTSERV.UA.EDU > Subject: Re: Capital One Data Breach-

Re: Capital One Data Breach-100 Million Customers affected

2019-08-03 Thread Charles Mills
:33 AM To: IBM-MAIN@LISTSERV.UA.EDU Subject: Re: Capital One Data Breach-100 Million Customers affected She breached an incorrectly configured firewall. Sent from Yahoo Mail for iPhone On Tuesday, July 30, 2019, 7:48 PM, Edward Finnell <000248cce9f3-dmarc-requ...@listserv.ua.edu>

Re: Capital One Data Breach-100 Million Customers affected

2019-08-01 Thread Edward Finnell
Yeah, I'm missing a few key points. How is this PCI compliant? So the firewall was misconfigured, but how did they get access to my_biga$$_masterfile, my_biga$$_requests, and my_biga$$_revocations with no encryption? Inquiring minds want to know-hackers long gone probably more than one. In a

Re: Capital One Data Breach-100 Million Customers affected

2019-07-31 Thread Anne & Lynn Wheeler
jcew...@acm.org (Joel C. Ewing) writes: > And I noticed a reprinted Washington Post article in my local paper > today "Bank data stolen despite cloud push", which clearly indicates > bank management had the perception that  somehow removing data from > Capital One's direct physical control  to

Re: Capital One Data Breach-100 Million Customers affected

2019-07-31 Thread Jesse 1 Robinson
323-715-0595 Mobile 626-543-6132 Office ⇐=== NEW robin...@sce.com -Original Message- From: IBM Mainframe Discussion List On Behalf Of Clark Morris Sent: Wednesday, July 31, 2019 8:51 AM To: IBM-MAIN@LISTSERV.UA.EDU Subject: (External):Re: Capital One Data Breach-100 Million Customers

Re: Capital One Data Breach-100 Million Customers affected

2019-07-31 Thread Clark Morris
[Default] On 31 Jul 2019 06:58:19 -0700, in bit.listserv.ibm-main jcew...@acm.org (Joel C. Ewing) wrote: >And I noticed a reprinted Washington Post article in my local paper >today "Bank data stolen despite cloud push", which clearly indicates >bank management had the perception that  somehow

Re: Capital One Data Breach-100 Million Customers affected

2019-07-31 Thread Joel C. Ewing
And I noticed a reprinted Washington Post article in my local paper today "Bank data stolen despite cloud push", which clearly indicates bank management had the perception that  somehow removing data from Capital One's direct physical control  to Amazon Web Services on the cloud would "improve"

Re: Capital One Data Breach-100 Million Customers affected

2019-07-31 Thread Bill Johnson
She breached an incorrectly configured firewall. Sent from Yahoo Mail for iPhone On Tuesday, July 30, 2019, 7:48 PM, Edward Finnell <000248cce9f3-dmarc-requ...@listserv.ua.edu> wrote:

Capital One Data Breach-100 Million Customers affected

2019-07-30 Thread Edward Finnell
https://www.usatoday.com/story/money/2019/07/29/capital-one-data-breach-2019-millions-affected-new-breach/1863259001/ A CLOUDy day in data processing. -- For IBM-MAIN subscribe / signoff / archive access instructions, send email