Remove 2012 Remove Data breaches Remove Identity Theft Remove Passwords
article thumbnail

Alleged FruitFly malware creator ruled incompetent to stand trial

Malwarebytes

In 2012, as a senior soon to graduate with a physics degree, he worked on a project with faculty member Robert W. While at CWRU, he was accused of “cracking passwords” on a CWRU network. In college at CWRU, he participated in a philosophy club, where he was “interested in the philosophy behind mathematics.”

Malware 83
article thumbnail

GovPayNow.com Leaks 14M+ Records

Krebs on Security

14, KrebsOnSecurity alerted GovPayNet that its site was exposing at least 14 million customer receipts dating back to 2012. In July, identity theft protection service LifeLock fixed an information disclosure flaw that needlessly exposed the email address of millions of subscribers. On Friday, Sept.

Mobile 243
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Prevent Data Leaks

Spinone

There have been some very high profile data breaches in the last couple of years, all of which have cost thousands of dollars of damage and a severe blow to the reputation of the company involved: In late 2014, hackers stole the account information of over 500 million Yahoo email accounts.

article thumbnail

Project Svalbard: The Future of Have I Been Pwned

Troy Hunt

Back in 2013, I was beginning to get the sense that data breaches were becoming a big thing. Increasingly, I was writing about what I thought was a pretty fascinating segment of the infosec industry; password reuse across Gawker and Twitter resulting in a breach of the former sending Acai berry spam via the latter.

article thumbnail

Cyber CEO: The History Of Cybercrime, From 1834 To Present

Herjavec Group

1962 — Allan Scherr — MIT sets up the first computer passwords, for student privacy and time limits. Student Allan Scherr makes a punch card to trick the computer into printing off all passwords and uses them to log in as other people after his time runs out. A DSW data breach also exposes transaction information from 1.4