Remove 2010 Remove Computer and Electronics Remove Data breaches Remove Security
article thumbnail

Ex CIA employee Joshua Adam Schulte sentenced to 40 years in prison

Security Affairs

Olsen, the Assistant Attorney General for National Security; and James Smith, the Assistant Director in Charge of the New York Field Office of the Federal Bureau of Investigation (“FBI”), announced today that JOSHUA ADAM SCHULTE was sentenced to 40 years in prison by U.S. District Judge Jesse M.

article thumbnail

Meet Ika & Sal: The Bulletproof Hosting Duo from Hell

Krebs on Security

Spamit), an invite-only community for Russian-speaking people in the businesses of sending spam and building botnets of infected computers to relay said spam. From January 2005 to April 2013, there were two primary administrators of the cybercrime forum Spamdot (a.k.a The Spamdot admins went by the nicknames Icamis (a.k.a.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Breach Exposes Users of Microleaves Proxy Service

Krebs on Security

Microleaves , a ten-year-old proxy service that lets customers route their web traffic through millions of Microsoft Windows computers, recently fixed a vulnerability in their website that exposed their entire user database. io (OIO) was going to upend the online advertising and security industries with its initial coin offering (ICO).

article thumbnail

Weekly podcast: Yahoo hacker sentenced, acoustic DoS attack and GDPR compliance fails

IT Governance

This week, we discuss the sentencing of one of the perpetrators of the 2013 Yahoo breach, a new type of denial-of-service attack that can crash computers just using sound and how not to email your customers. He also hacked into a further 11,000 accounts between 2010 and his arrest in 2017. Here are this week’s stories.

GDPR 67
article thumbnail

Regulating Privacy Across Borders in the Digital Age

Hunton Privacy

On November 10, 2010, the American Bar Association’s Section of Antitrust Law’s International Committee and Corporate Counseling Committee hosted a webinar on “Regulating Privacy Across Borders in the Digital Age: An Emerging Global Consensus or Vive la Difference?”.

Privacy 40
article thumbnail

The Burden of Privacy In Discovery

Data Matters

4 The Federal Rules of Civil Procedure have begun — since their inception — with a guiding command for courts to seek “to secure the just, speedy, and inexpensive determination of every action and proceeding.”5 social security and credit card numbers, employee and patient health data, and customer financial records).”43

Privacy 97
article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computer model to deliver transformative change. Commissioned by organizers to predict worst-case scenarios for the Munich games, [Georg] Sieber came up with a range of possibilities, from explosions to plane crashes, for which security teams should be prepared.