Nicole Perlroth

Type: Person
Name: Nicole Perlroth
First reported Sep 29 2014 - Updated Sep 29 2014 - 1 reports

Security Experts Expect ‘Shellshock’ Sof tware Bug in Bash to Be Significant

Posted by InfoSec News on Sep 29 http://www.nytimes.com/2014/09/26/technology/security-experts-expect-shellshock-software-bug-to-be-significant.html By NICOLE PERLROTHThe New York TimesSEPT. 25, 2014Long before the commercial success of the Internet, ... [Published Seclists.org - Info Security News - Sep 29 2014]
First reported Sep 27 2014 - Updated Sep 27 2014 - 1 reports

Recommended Reading: André 3000 chats 'Jimi: All Is by My Side'

Recommended Reading highlights the best long-form writing on technology and more in print and on the web. Some weeks, you'll also find short reviews of books that we think are worth your time. We hope you enjoy the read.Billboard Cover: Andre 3000 Talks ... [Published Engadget - Sep 27 2014]
First reported Sep 09 2014 - Updated Sep 09 2014 - 1 reports

Data breach at Home Depot could eclipse Target's hacking

Justin Sullivan/Customers enter a Home Depot store on May 21, 2013 in El Cerrito, Calif.Home Depot confirmed this week it had been the subject of a massive data breach. It's possible 60 million credit card numbers could have been stolen.Related: Home ... [Published SCPR - Sep 09 2014]
First reported Sep 09 2014 - Updated Sep 09 2014 - 1 reports

Here's What Home Depot Is Promising To Do If You Find Fishy Charges On Your Credit Card

Home Depot on Monday confirmed the hack has been going on for about six months in the U.S. and Canada, although not in Mexico or its online store. It says it has found and removed the hacker's malware now.The respected blog Krebs on Security reported ... [Published Business Insider - Sep 09 2014]
First reported Sep 09 2014 - Updated Sep 09 2014 - 1 reports

Here's What Home Depot Is Promising To Do If You Find Fishy Charges On Your Credit Card (HD)

Although Home Depot has yet to outline the full scope of a security breach that affected its stores in the U.S. The respected blog Krebs on Security reported that this is a variant of the same malware used to snatch 40 million payment cards from Target. ... [Published Atlanta Journal And Constitution - Sep 09 2014]
First reported Sep 04 2014 - Updated Sep 04 2014 - 1 reports

Mounting evidence points towards Home Depot breach

Still officially unconfirmed, a Home Depot hack looks increasingly likely to have happened.As Nicole Perlroth noted, the source of stolen card information can be discovered in two ways: Law enforc... ... [Published Help Net Security - News - Sep 04 2014]
First reported Aug 22 2014 - Updated Aug 22 2014 - 1 reports

Target hacker attacked more than 1K other US firms NYT

Unless companies search for Backoff on their systems, it can be difficult to identify. The Homeland Security report to be released later Friday recommends companies contact their service providers, antivirus vendors and cash register system vendor to ... [Published CNBC - Aug 22 2014]
First reported Aug 11 2014 - Updated Aug 11 2014 - 1 reports

The “Patch and Pray” Approach to Cybersecurity

On the front page of The New York Times of August 6, 2014, Nicole Perlroth and David Gelles published an article “Russian Hackers Steal Passwords of Billion Users: Data Still Vulnerable – 420,000 Sites, Big and Small, Were Targets, Firm Says.” Usually ... [Published Security Bloggers Network - Aug 11 2014]
First reported Aug 06 2014 - Updated Aug 06 2014 - 1 reports

Latest information about the Russian Hackers Said to Loot 1.2 Billion Internet Records.

Here you will find the latest blogs from Trend Micro’s experts along with a comprehensive look at how the media has covered this data breach. We encourage you to scroll through the various blogs, provide comments and enjoy the in-depth knowledge that ... [Published Trend Cloud Security Blog - Trend Micro - Aug 06 2014]
First reported Aug 06 2014 - Updated Aug 06 2014 - 1 reports

Russian Gang Amasses Over a Billion Internet Passwords

Posted by InfoSec News on Aug 06 http://www.nytimes.com/2014/08/06/technology/russian-gang-said-to-amass-more-than-a-billion-stolen-internet-credentials.html By NICOLE PERLROTH and DAVID GELLESThe New York TimesAUG. 5, 2014A Russian crime ring has amassed ... [Published Seclists.org - Info Security News - Aug 06 2014]
First reported Aug 05 2014 - Updated Aug 05 2014 - 1 reports

It Was Nice Knowing You, Internet: Russian Gang Collects More Than One Billion Pieces of Stolen Online Information

Nicole Perlroth and David Gelles at the New York Times write : A Russian crime ring has amassed the largest known collection of stolen Internet credentials, including 1.2 billion username and password combinations and more than 500 million email ... [Published The Stranger, Seattle's Only Newspaper - Aug 05 2014]
First reported Jun 07 2014 - Updated Jun 07 2014 - 2 reports

[tt] NYT: Internet Giants Erect Barriers to Spy Agencies

Which side has the inherent advantage, and why?Internet Giants Erect Barriers to Spy Agencies http://www.nytimes.com/2014/06/07/technology/internet-giants-erect-barriers-to-spy-agencies.html By DAVID E. SANGER and NICOLE PERLROTHMOUNTAIN VIEW, Calif.--Just ... [Published TranshumanTech - Jun 07 2014]

More Content

All (45) | News (14) | Reports (0) | Blogs (31) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
Security Experts Expect ‘Shellshock’ Sof tware ... [Published Seclists.org - Info Security News - Sep 29 2014]
Recommended Reading: André 3000 chats 'Jimi: Al... [Published Engadget - Sep 27 2014]
Data breach at Home Depot could eclipse Target'... [Published SCPR - Sep 09 2014]
Here's What Home Depot Is Promising To Do If Yo... [Published Atlanta Journal And Constitution - Sep 09 2014]
Here's What Home Depot Is Promising To Do If Yo... [Published Business Insider - Sep 09 2014]
Mounting evidence points towards Home Depot breach [Published Help Net Security - News - Sep 04 2014]
Wonkbook: Will Obama delay immigration reform? [Published Ezra Klein - Sep 04 2014]
Wonkbook: The quiet revolution in the world of ... [Published Ezra Klein - Aug 25 2014]
Target hacker attacked more than 1K other US fi... [Published CNBC - Aug 22 2014]
The “Patch and Pray” Approach to Cybersecurity [Published Security Bloggers Network - Aug 11 2014]
Uber and Lyft Start Carpooling Services and Oth... [Published TIME.com - Aug 06 2014]
Latest information about the Russian Hackers Sa... [Published Trend Cloud Security Blog - Trend Micro - Aug 06 2014]
10 Things You Need To Know Before The Opening B... [Published Clusterstock - Aug 06 2014]
Russian Gang Amasses Over a Billion Internet Pa... [Published Seclists.org - Info Security News - Aug 06 2014]
It Was Nice Knowing You, Internet: Russian Gang... [Published The Stranger, Seattle's Only Newspaper - Aug 05 2014]
What We Are Reading…July 21, 2014 [Published CSC Center for Strategic Communication - Jul 21 2014]
What We Are Reading…July 10, 2014 [Published CSC Center for Strategic Communication - Jul 10 2014]
Chinese Hackers Pursue Key Data on U.S. Workers [Published Seclists.org - Info Security News - Jul 10 2014]
Hackers Target Oil & Gas Companies [Published Maritime Security Review - Jul 02 2014]
Funds Roundup: ‘Smart Beta’ Foodfight; the Hedg... [Published BARRONS.com Focus on Funds - Jun 20 2014]
Cybercriminals Zero In on a Lucrative New Targe... [Published Seclists.org - Info Security News - Jun 20 2014]
[tt] Bits 09/12: Security Needs Evolve as Compu... [Published TranshumanTech - Jun 13 2014]
What We Are Reading…June 10, 2014 [Published CSC Center for Strategic Communication - Jun 10 2014]
2nd China Army Unit Implicated in Online Spying [Published Seclists.org - Info Security News - Jun 10 2014]
[tt] NYT: Internet Giants Erect Barriers to Spy... [Published TranshumanTech - Jun 07 2014]
[tt] NYT: Internet Giants Erect Barriers to Spy... [Published TranshumanTech - Jun 07 2014]
Heartbleed Lessons – FST and Lab Certification [Published Security Bloggers Network - Jun 02 2014]
Hackers in Iran set up fake news websites in cy... [Published Boing Boing - May 30 2014]
[tt] NYT: Revelations of N.S.A. Spying Cost U.S... [Published TranshumanTech - May 17 2014]
Websites with OpenSSL encryption vulnerable to ... [Published Lexology - Apr 25 2014]
1 2
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Security Experts Expect ‘Shellshock’ Sof tware ... [Published Seclists.org - Info Security News - Sep 29 2014]
Posted by InfoSec News on Sep 29 http://www.nytimes.com/2014/09/26/technology/security-experts-expect-shellshock-software-bug-to-be-significant.html By NICOLE PERLROTHThe New York TimesSEPT. 25, 2014Long before the commercial success of the Internet, ...
Mounting evidence points towards Home Depot breach [Published Help Net Security - News - Sep 04 2014]
Still officially unconfirmed, a Home Depot hack looks increasingly likely to have happened.As Nicole Perlroth noted, the source of stolen card information can be discovered in two ways: Law enforc... ...
Wonkbook: Will Obama delay immigration reform? [Published Ezra Klein - Sep 04 2014]
Welcome to Wonkbook, Wonkblog’s morning policy news primer by Puneet Kollipara ( @pkollipara ). To subscribe by e-mail, click  here . Send comments, criticism or ideas to Wonkbook at Washpost dot com. To read more by the Wonkblog team, click  here . Follow ...
Wonkbook: The quiet revolution in the world of ... [Published Ezra Klein - Aug 25 2014]
Welcome to Wonkbook, Wonkblog’s morning policy news primer by Puneet Kollipara ( @pkollipara ). To subscribe by e-mail, click  here . Send comments, criticism or ideas to Wonkbook at Washpost dot com. To read more by the Wonkblog team, click  here . Follow ...
The “Patch and Pray” Approach to Cybersecurity [Published Security Bloggers Network - Aug 11 2014]
On the front page of The New York Times of August 6, 2014, Nicole Perlroth and David Gelles published an article “Russian Hackers Steal Passwords of Billion Users: Data Still Vulnerable – 420,000 Sites, Big and Small, Were Targets, Firm Says.” Usually ...
1 2 3 4 5 6 7
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.