Dan Kaminsky

Type: Person
Name: Dan Kaminsky
First reported Oct 04 2014 - Updated Oct 04 2014 - 1 reports

JPMorgan cyberattack hit 76 million households

A cyberattack this summer on JPMorgan Chase compromised the accounts of 76 million households and seven million small businesses, a tally that dwarfs previous estimates by the bank and puts the intrusion among the largest ever.Unlike retailers, JPMorgan, ... [Published Times of India - Oct 04 2014]
First reported Oct 03 2014 - Updated Oct 04 2014 - 1 reports

Massive JPMorgan Chase hack impacted more than 80 million accounts

On Thursday evening, JPMorgan Chase revealed that a massive security breach has led to the exposure of sensitive data belonging to 76 million households and 7 million businesses. This huge security failure arrives in the wake of the hacking of 40 million ... [Published BGR - Oct 03 2014]
First reported Oct 03 2014 - Updated Oct 03 2014 - 1 reports

JPMorgan Attack Shows Hackers Gaining Upper Hand In Cyberwars

Target. Home Depot. eBay. Now JPMorgan Chase. If it feels like every big commercial institution is vulnerable to hackers, that’s because they are. Of all the high-profile breaches over the past few years, the biggest hit now appears to have been perpetrated ... [Published International Business Times - Oct 03 2014]
First reported Oct 03 2014 - Updated Oct 03 2014 - 1 reports

JPMorgan victimized in huge data breach

A cyberattack this summer on JPMorgan Chase compromised the accounts of 76 million households and 7 million small businesses, a tally that dwarfs previous estimates by the bank and puts the intrusion among the largest ever.The details of the breach — ... [Published Indiana Gazette - Oct 03 2014]
First reported Sep 30 2014 - Updated Oct 01 2014 - 1 reports

Shellshock bug as big a threat as Heartbleed?

BOSTON - Hackers have launched attacks exploiting the newly identified Shellshock computer bug, researchers warned on Thursday, as news surfaced that an initial patch for the issue was incomplete, suggesting even updated systems were vulnerable.The attacks ... [Published Elliot Lake Standard - Sep 30 2014]
First reported Sep 29 2014 - Updated Sep 30 2014 - 1 reports

Shellshocked? Then Build the Web We Need

Tech seduces us because we’re in love with the new, new thing -- the idea that the software and hardware that remade phones, shopping, communication, thermostats and grocery delivery will someday transform cars, space travel, and, for the more far out ... [Published Bloomberg View - Sep 29 2014]
First reported Sep 28 2014 - Updated Sep 28 2014 - 1 reports

Shellshock: Bug that remained undetected for a quarter century

After Heartbleed , Shellshock is the second major blow to open source in the same year. The vulnerability that has existed for over 25 years affects Mac OS X, Linux and Unix systems allowing attackers to gain command line access of the server or system ... [Published DNA India - Sep 28 2014]
First reported Sep 26 2014 - Updated Sep 26 2014 - 1 reports

Hackers exploiting ‘Shellshock’ bug to launch attacks

Hackers have begun exploiting the newly identified “Shellshock” computer bug, using fast-moving worm viruses to scan for vulnerable systems and then infect them, researchers warned on Thursday.“Shellshock” is the first major Internet threat to emerge ... [Published Taipei Times Online - Sep 26 2014]
First reported Sep 26 2014 - Updated Sep 26 2014 - 1 reports

Unhappy workers are retaliating digitally

Not every cyber-attack is an outside job. The FBI and Department of Homeland Security warned this week of an increase in attacks against businesses by current and former employees — disruptions that can cost companies millions of dollars to address.So ... [Published Marketplace - Sep 26 2014]
First reported Sep 25 2014 - Updated Sep 25 2014 - 1 reports

Hackers launch attacks exploiting 'Shellshock' bug in Bash software

The attacks came as security experts scrambled to determine how many systems and what types of computers are vulnerable to "Shellshock," which some say may be as serious as the "Heartbleed" vulnerability that surfaced in April."Shellshock" is a bug in ... [Published NewsRT.co.uk - Sep 25 2014]
First reported Sep 24 2014 - Updated Sep 25 2014 - 1 reports

Apple should LOOK BELOW to beat TouchID fingerprint hack, say securo-bods

Top 5 reasons to deploy VMware with TegileNews that Apple’s iPhone 6 can be spoofed with the same fake fingerprints that tricked its earlier version, the iPhone 5S, has sparked off a lively debate among security researchers.Lookout researcher Marc Rogers ... [Published The Register - Sep 24 2014]
First reported Sep 04 2014 - Updated Sep 04 2014 - 2 reports

How to turn the tables on brute-force hackers

( thagoodiez ) The celebrity photo hack underscores one of the Internet's most worrying dangers: Using weak passwords makes you really, really vulnerable. Weak passwords can be guessed by hackers who try every word in the dictionary until they strike ... [Published Post Tech - Sep 04 2014]

Quotes

"we've migrated so much of our economy to computer networks because they are faster and more efficient, but there are side effects" said Dan Kaminsky, a researcher who works as chief scientist at White Ops, a security company...
"we don't actually know how widespread this is. this is probably one of the most difficult-to-measure bugs that has come along in years" said Dan Kaminsky, a well-known expert on Internet threats
...chief scientist at White Ops, noted on Twitter that Shellshock is difficult to measure and it is a challenge to assess the risk of the bug. "if nothing else, this bash bug is *way* more annoying to scan for than heartbleed ever was" said Kaminsky

More Content

All (50) | News (34) | Reports (0) | Blogs (16) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
JPMorgan cyberattack hit 76 million households [Published Times of India - Oct 04 2014]
Massive JPMorgan Chase hack impacted more than ... [Published BGR - Oct 03 2014]
JPMorgan Attack Shows Hackers Gaining Upper Han... [Published International Business Times - Oct 03 2014]
JPMorgan victimized in huge data breach [Published Indiana Gazette - Oct 03 2014]
JPMorgan Chase victimized in huge cyberattack [Published KansasCity.com - Oct 03 2014]
Shellshock bug as big a threat as Heartbleed? [Published Elliot Lake Standard - Sep 30 2014]
Shellshocked? Then Build the Web We Need [Published Bloomberg View - Sep 29 2014]
Shellshock: Bug that remained undetected for a ... [Published DNA India - Sep 28 2014]
Hackers exploiting ‘Shellshock’ bug to launch a... [Published Taipei Times Online - Sep 26 2014]
What We Know About Shellshock So Far, and Why t... [Published Security Week - Sep 26 2014]
Unhappy workers are retaliating digitally [Published Marketplace - Sep 26 2014]
Shellshock bug leaves up to 500 million compute... [Published ABC Online - Sep 26 2014]
Linux Malware Uses Shellshock Flaw to Infiltrat... [Published eWeek - Sep 25 2014]
Hackers launch attacks exploiting 'Shellshock' ... [Published NewsRT.co.uk - Sep 25 2014]
Hackers launch attacks exploiting 'Shellshock' ... [Published CNBC - Sep 25 2014]
Apple should LOOK BELOW to beat TouchID fingerp... [Published The Register - Sep 24 2014]
Ethical hackers: ‘Without us, no one will prote... [Published Global News Canada - Sep 18 2014]
Summary: Seven Year Scratch [Published Security Bloggers Network - Sep 05 2014]
Summary: Seven Year Scratch [Published Securosis Highlights - Sep 05 2014]
Dan Kaminsky ruminates on the celeb #hack, long... [Published Team Cymru Internet Security News - Sep 04 2014]
How to turn the tables on brute-force hackers [Published Post Tech - Sep 04 2014]
How to turn the tables on brute-force hackers [Published Faster Forward - Sep 04 2014]
Four short links: 4 September 2014 [Published O'Reilly Radar - Insight, analysis, and researc ... - Sep 04 2014]
White Ops' Dan Kaminsky to Keynote AT&T Cyber S... [Published Marketwire - Breaking News Releases - Sep 03 2014]
Paladin and Grotech back White Ops [Published PE Hub Blog - Jun 24 2014]
EBay in hot seat for late detection of cyberatt... [Published Financial Post | Business » FP Tech Desk - May 22 2014]
Signal Sciences Raises $2 Million in Seed Fundi... [Published PRWeb - May 20 2014]
U-2 Spy-Plane-Inspired Radar Crash Was Sparked ... [Published Zero Hedge - May 12 2014]
Glitch In Air Traffic Control System Caused By ... [Published The Huffington Post | Full News Feed - May 12 2014]
This Day in Blogging History: Kaminsky on Bitco... [Published Boing Boing - May 05 2014]
1 2
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Summary: Seven Year Scratch [Published Security Bloggers Network - Sep 05 2014]
Sometimes life sneaks up on you. Often when I am introduced to new clients and professional contacts, it is as “Analyst and CEO of Securosis; he used to be at Gartner”. I am fully cognizant of the fact that not only is Gartner where I started my analyst ...
Summary: Seven Year Scratch [Published Securosis Highlights - Sep 05 2014]
Sometimes life sneaks up on you. Often when I am introduced to new clients and professional contacts, it is as “Analyst and CEO of Securosis; he used to be at Gartner”. I am fully cognizant of the fact that not only is Gartner where I started my analyst ...
Dan Kaminsky ruminates on the celeb #hack, long... [Published Team Cymru Internet Security News - Sep 04 2014]
2 retweets 1 favorites ...
How to turn the tables on brute-force hackers [Published Post Tech - Sep 04 2014]
( thagoodiez ) The celebrity photo hack underscores one of the Internet's most worrying dangers: Using weak passwords makes you really, really vulnerable. Weak passwords can be guessed by hackers who try every word in the dictionary until they strike ...
How to turn the tables on brute-force hackers [Published Faster Forward - Sep 04 2014]
( thagoodiez ) The celebrity photo hack underscores one of the Internet's most worrying dangers: Using weak passwords makes you really, really vulnerable. Weak passwords can be guessed by hackers who try every word in the dictionary until they strike ...
1 2 3 4
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.