Featured Articles

Analysts expect ARM to do well next year

Analysts expect ARM to do well next year

British chip designer ARM could cash in on the mobile industry's rush to transition to 64-bit operating systems and hardware.

More...
Huawei and Xiaomi outpace Lenovo, LG in smartphone market

Huawei and Xiaomi outpace Lenovo, LG in smartphone market

Samsung has lost smartphone market share, ending the quarter on a low note and Xiaomi appears to be the big winner.

More...
Intel Broadwell 15W coming to CES

Intel Broadwell 15W coming to CES

It looks like Intel will be showing off its 14nm processors, codenames Broadwell, in a couple of weeks at CES 2015.

More...
Gainward GTX 980 Phantom reviewed

Gainward GTX 980 Phantom reviewed

Today we’ll be taking a closer look at the recently introduced Gainward GTX 980 4GB with the company’s trademark Phantom cooler.

More...
Zotac ZBOX Sphere OI520 barebones vs Sphere Plus review

Zotac ZBOX Sphere OI520 barebones vs Sphere Plus review

Zotac has been in the nettop and mini-PC space for more than four years now and it has managed to carve…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Wednesday, 18 July 2007 07:37

27,000 users affected in Kingston breach

Written by David Stellmack
Image

Pants down in long-running security breach


Kingston Technology
Company Inc. has begun notifying affected customers of a security breach dating back to September 2005 that remained undetected until just recently. 

Kingston indicated that the breach may have provided unauthorized access to nearly 27,000 online Kingston customers’ names, addresses and credit card information. Kingston's IT team began an investigation after it detected irregularities in the company computer systems, and then engaged a team of computer forensic experts to perform a more extensive probe.

The company did not offer details as to why it took so long for the breach to be discovered, or how long it waited to begin a formal investigation.

Kingston did indicate that it does not believe any data that was illegally accessed has been misused.  If it took Kingston nearly 2 years to discover the security breach one can only wonder how they can be so easily and quickly assured that there has been no misuse of the accessed data. 
Last modified on Wednesday, 18 July 2007 09:57

David Stellmack

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments