Featured Articles

Apple iPad Air 2 costs $275 to build

Apple iPad Air 2 costs $275 to build

IHS has told Recode that the Apple iPad Air 2 16GB Wifi costs only $275 to build -- not bad…

More...
LG sells 16.8 million smartphones in Q3 14

LG sells 16.8 million smartphones in Q3 14

As Samsung is losing market share, another Korean company, which many had written off, is gaining.

More...
LG G Watch R EU price set at €299

LG G Watch R EU price set at €299

LG G Watch R is probably the best looking Android Wear device on the market and many have been waiting for…

More...
Nvidia GTX 970 SLI tested

Nvidia GTX 970 SLI tested

Nvidia recently released two new graphics cards based on its latest Maxwell GPU architecture, with exceptional performance-per-watt. The Geforce GTX 970…

More...
Gainward GTX 970 Phantom previewed

Gainward GTX 970 Phantom previewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Wednesday, 18 July 2007 07:37

27,000 users affected in Kingston breach

Written by David Stellmack
Image

Pants down in long-running security breach


Kingston Technology
Company Inc. has begun notifying affected customers of a security breach dating back to September 2005 that remained undetected until just recently. 

Kingston indicated that the breach may have provided unauthorized access to nearly 27,000 online Kingston customers’ names, addresses and credit card information. Kingston's IT team began an investigation after it detected irregularities in the company computer systems, and then engaged a team of computer forensic experts to perform a more extensive probe.

The company did not offer details as to why it took so long for the breach to be discovered, or how long it waited to begin a formal investigation.

Kingston did indicate that it does not believe any data that was illegally accessed has been misused.  If it took Kingston nearly 2 years to discover the security breach one can only wonder how they can be so easily and quickly assured that there has been no misuse of the accessed data. 
Last modified on Wednesday, 18 July 2007 09:57

David Stellmack

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments