Sign up for our weekly newsletter!
REGISTER NOW |
||
|
||
Dell: Your Personal Info May, or May Not, Have Been Stolen![]() Dell is investigating whether attackers managed to steal customer data after an unknown person or group penetrated the company's network, including the consumer-facing Dell.com site. On November 28, Dell issued a statement that it security team was investigating a possible attack against the company's network. It appears names, email address and hashed passwords were compromised, but it's unclear if any of that information was removed. However, attackers did not gain access to payment information, such as credit card numbers and other sensitive data. The company's other sites, including EMC and other enterprise divisions, were also not affected. The security breach happened on November 9.
![]() (Source: Wikipedia)
Since then, Dell conducted a forensic security audit of the breach and its site, and while the vendor does not believe any data was compromised, it can't guarantee that. "Though it is possible some of this information was removed from Dell's network, our investigations found no conclusive evidence that any was extracted," according to a statement. As a precaution, however, Dell plans to have all Dell.com customers reset their passwords and will hash those passwords as well. The company also is working with law enforcement to investigate the potential breach. In addition Dell established a website for affected customers. What makes this particular breach of concern is that Dell is one of the world's largest suppliers of consumer and enterprise technology, and yet attackers could compromise the network -- whether or not any personal data was stolen. Of course (and sadly), Dell is not the only enterprise facing these types of questions. In the past two months, Facebook and Google have each been forced to respond to network breaches that exposed user information and data. In the case of Facebook, it does appear some data was taken. (See Facebook Revises Data Breach Number Down to 30M Users.) Additionally, companies like British Airways now offer more information about various data breaches and attacks in order to comply with new laws and regulations. In this case, the airline might be one of the first large-scale tests of the European Union's General Data Protection Regulation (GDPR). (See British Airways Already Facing Lawsuits Following Data Breach.) Related posts:
— Scott Ferguson is the managing editor of Light Reading and the editor of Security Now. Follow him on Twitter @sferguson_LR. |
5G technology holds a good deal of promise for businesses, from expanded IoT capabilities to new ways to reach customers. The downside is that these networks require a new security approach, which InfoSec teams need to start thinking about now.
As businesses move to the cloud, remote locations are relying more and more on SD-WAN. However, this change means a different approach to security. Here's why enterprises should look to the edge.
Over the last year, vulnerable, cloud-based databases have shown that dangers of trusting data to others. However, an exposed government server in Oklahoma proves that attackers can find on-premises data, too.
With the discovery of 'Collection #1,' security researcher Troy Hunt appears to have found the largest repository of stolen email addresses and passwords ever, totaling more than 87GB and 12,000 separate files.
In an era when enterprises are scrambling to keep up with security demands, a new industry survey from ISF finds that having more diverse skills on the InfoSec team is one way to ensure a more stable workforce.
Information Resources
upcoming Webinars
ARCHIVED
Leveraging a Risk-Based Approach to Vulnerability Management to Unify Security and Operations
Wednesday, February 20, 2019
11:00 am New York / 4:00 pm London Radio Shows
![]() like us on facebook
|
|
![]() |
||
![]() |
Security Now
About Us
Contact Us
Help
Register
Events
Supporting Partners
Twitter
Facebook
RSS
Copyright © 2019 Light Reading - an Informa business, trading within KNect365 US, Inc. All rights reserved. Privacy Policy | Cookie Policy | Terms of Use in partnership with
|