Featured Articles

LG G Watch R ships in two weeks

LG G Watch R ships in two weeks

The LG G Watch R, the first Android Wear watch with a truly round face, is coming soon and judging by…

More...
LG unveils NUCLUN big.LITTLE SoC

LG unveils NUCLUN big.LITTLE SoC

LG has officially announced its first smartphone SoC, the NUCLUN, formerly known as the Odin.

More...
Microsoft moves 2.4 million Xbox Ones

Microsoft moves 2.4 million Xbox Ones

Microsoft has announced that it move 2.4 million consoles in fiscal year 2015 Q1. The announcement came with the latest financial…

More...
Gainward GTX 970 Phantom previewed

Gainward GTX 970 Phantom previewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
EVGA GTX 970 SC ACX 2.0 reviewed

EVGA GTX 970 SC ACX 2.0 reviewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Wednesday, 18 July 2007 07:37

27,000 users affected in Kingston breach

Written by David Stellmack
Image

Pants down in long-running security breach


Kingston Technology
Company Inc. has begun notifying affected customers of a security breach dating back to September 2005 that remained undetected until just recently. 

Kingston indicated that the breach may have provided unauthorized access to nearly 27,000 online Kingston customers’ names, addresses and credit card information. Kingston's IT team began an investigation after it detected irregularities in the company computer systems, and then engaged a team of computer forensic experts to perform a more extensive probe.

The company did not offer details as to why it took so long for the breach to be discovered, or how long it waited to begin a formal investigation.

Kingston did indicate that it does not believe any data that was illegally accessed has been misused.  If it took Kingston nearly 2 years to discover the security breach one can only wonder how they can be so easily and quickly assured that there has been no misuse of the accessed data. 
Last modified on Wednesday, 18 July 2007 09:57

David Stellmack

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments