Remove Authentication Remove Computer and Electronics Remove Healthcare Remove Passwords
article thumbnail

2019 end-of-year review part 1: January to June

IT Governance

The site’s security team suspected that users were being targeted in a credential-stuffing attack; this is where cyber criminals use a list of stolen usernames and passwords en masse to break into an account. Worse, they changed the email address associated with the account, preventing them from resetting their password.

article thumbnail

Ten Years Later, New Clues in the Target Breach

Krebs on Security

retail giant Target was battling a wide-ranging computer intrusion that compromised more than 40 million customer payment cards over the previous month. That story about the Flashback author was possible because a source had obtained a Web browser authentication cookie for a founding member of a Russian cybercrime forum called BlackSEO.