Nicole Perlroth

Type: Person
Name: Nicole Perlroth
First reported Sep 09 2014 - Updated Sep 09 2014 - 1 reports

Data breach at Home Depot could eclipse Target's hacking

Justin Sullivan/Customers enter a Home Depot store on May 21, 2013 in El Cerrito, Calif.Home Depot confirmed this week it had been the subject of a massive data breach. It's possible 60 million credit card numbers could have been stolen.Related: Home ... [Published SCPR - Sep 09 2014]
First reported Sep 09 2014 - Updated Sep 09 2014 - 1 reports

Here's What Home Depot Is Promising To Do If You Find Fishy Charges On Your Credit Card

Home Depot on Monday confirmed the hack has been going on for about six months in the U.S. and Canada, although not in Mexico or its online store. It says it has found and removed the hacker's malware now.The respected blog Krebs on Security reported ... [Published Business Insider - Sep 09 2014]
First reported Sep 09 2014 - Updated Sep 09 2014 - 1 reports

Here's What Home Depot Is Promising To Do If You Find Fishy Charges On Your Credit Card (HD)

Although Home Depot has yet to outline the full scope of a security breach that affected its stores in the U.S. The respected blog Krebs on Security reported that this is a variant of the same malware used to snatch 40 million payment cards from Target. ... [Published Atlanta Journal And Constitution - Sep 09 2014]
First reported Sep 04 2014 - Updated Sep 04 2014 - 1 reports

Mounting evidence points towards Home Depot breach

Still officially unconfirmed, a Home Depot hack looks increasingly likely to have happened.As Nicole Perlroth noted, the source of stolen card information can be discovered in two ways: Law enforc... ... [Published Help Net Security - News - Sep 04 2014]
First reported Aug 22 2014 - Updated Aug 22 2014 - 1 reports

Target hacker attacked more than 1K other US firms NYT

Unless companies search for Backoff on their systems, it can be difficult to identify. The Homeland Security report to be released later Friday recommends companies contact their service providers, antivirus vendors and cash register system vendor to ... [Published CNBC - Aug 22 2014]
First reported Aug 11 2014 - Updated Aug 11 2014 - 1 reports

The “Patch and Pray” Approach to Cybersecurity

On the front page of The New York Times of August 6, 2014, Nicole Perlroth and David Gelles published an article “Russian Hackers Steal Passwords of Billion Users: Data Still Vulnerable – 420,000 Sites, Big and Small, Were Targets, Firm Says.” Usually ... [Published Security Bloggers Network - Aug 11 2014]
First reported Aug 06 2014 - Updated Aug 06 2014 - 1 reports

Latest information about the Russian Hackers Said to Loot 1.2 Billion Internet Records.

Here you will find the latest blogs from Trend Micro’s experts along with a comprehensive look at how the media has covered this data breach. We encourage you to scroll through the various blogs, provide comments and enjoy the in-depth knowledge that ... [Published Trend Cloud Security Blog - Trend Micro - Aug 06 2014]
First reported Aug 06 2014 - Updated Aug 06 2014 - 1 reports

Russian Gang Amasses Over a Billion Internet Passwords

Posted by InfoSec News on Aug 06 http://www.nytimes.com/2014/08/06/technology/russian-gang-said-to-amass-more-than-a-billion-stolen-internet-credentials.html By NICOLE PERLROTH and DAVID GELLESThe New York TimesAUG. 5, 2014A Russian crime ring has amassed ... [Published Seclists.org - Info Security News - Aug 06 2014]
First reported Aug 05 2014 - Updated Aug 05 2014 - 1 reports

It Was Nice Knowing You, Internet: Russian Gang Collects More Than One Billion Pieces of Stolen Online Information

Nicole Perlroth and David Gelles at the New York Times write : A Russian crime ring has amassed the largest known collection of stolen Internet credentials, including 1.2 billion username and password combinations and more than 500 million email ... [Published The Stranger, Seattle's Only Newspaper - Aug 05 2014]
First reported Jul 10 2014 - Updated Jul 10 2014 - 1 reports

Chinese Hackers Pursue Key Data on U.S. Workers

Posted by InfoSec News on Jul 10 http://www.nytimes.com/2014/07/10/world/asia/chinese-hackers-pursue-key-data-on-us-workers.html By Michael S. Schmidt, David E. Sanger and Nicole PerlrothThe New York TimesJuly 9, 2014WASHINGTON -- Chinese hackers in ... [Published Seclists.org - Info Security News - Jul 10 2014]
First reported Jul 02 2014 - Updated Jul 02 2014 - 1 reports

Hackers Target Oil & Gas Companies

Hundreds of companies targeted by Russian hackers. Russian Hackers Targeting Oil and Gas Companies By NICOLE PERLROTH SAN FRANCISCO — Russian hackers have been systematically targeting Continue Reading » ... [Published Maritime Security Review - Jul 02 2014]
First reported Jun 07 2014 - Updated Jun 07 2014 - 2 reports

[tt] NYT: Internet Giants Erect Barriers to Spy Agencies

Which side has the inherent advantage, and why?Internet Giants Erect Barriers to Spy Agencies http://www.nytimes.com/2014/06/07/technology/internet-giants-erect-barriers-to-spy-agencies.html By DAVID E. SANGER and NICOLE PERLROTHMOUNTAIN VIEW, Calif.--Just ... [Published TranshumanTech - Jun 07 2014]

More Content

All (45) | News (14) | Reports (0) | Blogs (31) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
Data breach at Home Depot could eclipse Target'... [Published SCPR - Sep 09 2014]
Here's What Home Depot Is Promising To Do If Yo... [Published Atlanta Journal And Constitution - Sep 09 2014]
Here's What Home Depot Is Promising To Do If Yo... [Published Business Insider - Sep 09 2014]
Mounting evidence points towards Home Depot breach [Published Help Net Security - News - Sep 04 2014]
Wonkbook: Will Obama delay immigration reform? [Published Ezra Klein - Sep 04 2014]
Wonkbook: The quiet revolution in the world of ... [Published Ezra Klein - Aug 25 2014]
Target hacker attacked more than 1K other US fi... [Published CNBC - Aug 22 2014]
The “Patch and Pray” Approach to Cybersecurity [Published Security Bloggers Network - Aug 11 2014]
Cornering the Zero-Day Market [Published Dissident Voice - Aug 08 2014]
Uber and Lyft Start Carpooling Services and Oth... [Published TIME.com - Aug 06 2014]
Latest information about the Russian Hackers Sa... [Published Trend Cloud Security Blog - Trend Micro - Aug 06 2014]
10 Things You Need To Know Before The Opening B... [Published Clusterstock - Aug 06 2014]
Russian Gang Amasses Over a Billion Internet Pa... [Published Seclists.org - Info Security News - Aug 06 2014]
It Was Nice Knowing You, Internet: Russian Gang... [Published The Stranger, Seattle's Only Newspaper - Aug 05 2014]
What We Are Reading…July 21, 2014 [Published CSC Center for Strategic Communication - Jul 21 2014]
What We Are Reading…July 10, 2014 [Published CSC Center for Strategic Communication - Jul 10 2014]
Chinese Hackers Pursue Key Data on U.S. Workers [Published Seclists.org - Info Security News - Jul 10 2014]
Hackers Target Oil & Gas Companies [Published Maritime Security Review - Jul 02 2014]
Funds Roundup: ‘Smart Beta’ Foodfight; the Hedg... [Published BARRONS.com Focus on Funds - Jun 20 2014]
Cybercriminals Zero In on a Lucrative New Targe... [Published Seclists.org - Info Security News - Jun 20 2014]
[tt] Bits 09/12: Security Needs Evolve as Compu... [Published TranshumanTech - Jun 13 2014]
What We Are Reading…June 10, 2014 [Published CSC Center for Strategic Communication - Jun 10 2014]
2nd China Army Unit Implicated in Online Spying [Published Seclists.org - Info Security News - Jun 10 2014]
[tt] NYT: Internet Giants Erect Barriers to Spy... [Published TranshumanTech - Jun 07 2014]
[tt] NYT: Internet Giants Erect Barriers to Spy... [Published TranshumanTech - Jun 07 2014]
Heartbleed Lessons – FST and Lab Certification [Published Security Bloggers Network - Jun 02 2014]
Hackers in Iran set up fake news websites in cy... [Published Boing Boing - May 30 2014]
[tt] NYT: Revelations of N.S.A. Spying Cost U.S... [Published TranshumanTech - May 17 2014]
Websites with OpenSSL encryption vulnerable to ... [Published Lexology - Apr 25 2014]
Internet giants unite to fight against a second... [Published Russia Today - Apr 24 2014]
1 2
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Mounting evidence points towards Home Depot breach [Published Help Net Security - News - Sep 04 2014]
Still officially unconfirmed, a Home Depot hack looks increasingly likely to have happened.As Nicole Perlroth noted, the source of stolen card information can be discovered in two ways: Law enforc... ...
Wonkbook: Will Obama delay immigration reform? [Published Ezra Klein - Sep 04 2014]
Welcome to Wonkbook, Wonkblog’s morning policy news primer by Puneet Kollipara ( @pkollipara ). To subscribe by e-mail, click  here . Send comments, criticism or ideas to Wonkbook at Washpost dot com. To read more by the Wonkblog team, click  here . Follow ...
Wonkbook: The quiet revolution in the world of ... [Published Ezra Klein - Aug 25 2014]
Welcome to Wonkbook, Wonkblog’s morning policy news primer by Puneet Kollipara ( @pkollipara ). To subscribe by e-mail, click  here . Send comments, criticism or ideas to Wonkbook at Washpost dot com. To read more by the Wonkblog team, click  here . Follow ...
The “Patch and Pray” Approach to Cybersecurity [Published Security Bloggers Network - Aug 11 2014]
On the front page of The New York Times of August 6, 2014, Nicole Perlroth and David Gelles published an article “Russian Hackers Steal Passwords of Billion Users: Data Still Vulnerable – 420,000 Sites, Big and Small, Were Targets, Firm Says.” Usually ...
Uber and Lyft Start Carpooling Services and Oth... [Published TIME.com - Aug 06 2014]
1. You Complete Me My mom always warned me not to get into a car with a stranger. I can’t imagine her reaction if I made a habit of getting into cars with groups of strangers. But that could be the next big thing as both Uber and Lyft have announced ...
1 2 3 4 5 6 7
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.