Search for: "Brian Krebs" Results 81 - 100 of 190
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
5 Feb 2014, 12:17 pm by Dan Goodin
Reporter Brian Krebs writes: Sources close to the investigation said the attackers first broke into the retailer’s network on Nov. 15, 2013 using network credentials stolen from Fazio Mechanical Services, a Sharpsburg, Penn. [read post]
27 Nov 2008, 8:14 am by MTTLR Blog Editor
Brian Krebs of the Washington Post, who is credited with the initial investigation and breaking the story, writes that “Multiple security researchers have recently published data naming McColo as the host for all of the top robot networks or "botnets," which are vast collections of hacked computers that are networked together to blast out spam or attack others online. [read post]
8 May 2019, 12:10 pm by Bob Ambrogi
Cybersecurity expert Brian Krebs, at his blog Krebs on Security, writes that he attempted to notify WK on Friday that WK file directories containing new versions of software for its CCH products “were open and writable by any anonymous user, and that there were suspicious files in those directories indicating some user(s) abused that access. [read post]
28 Sep 2016, 8:48 am by Stewart Baker
  Speaking of records, Brian Krebs, a podcast alum, experienced his own unenviable record:  victim of world’s biggest DDOS attack, fueled by the Internet of Things. [read post]
11 Nov 2017, 6:03 am by Garrett Hinck
Tamara Cofman Wittes and Brian Reeves analyzed considerations for the U.S. [read post]
13 Apr 2023, 9:48 pm by Jacob Hoffman-Andrews
  While the video from the LA County D.A. doesn’t mention it, the ultimate source for the term “juice jacking” is a Brian Krebs article from 2011 reporting on a vulnerability demonstrated at DEFCON that year. [read post]
13 Apr 2023, 9:48 pm by Jacob Hoffman-Andrews
  While the video from the LA County D.A. doesn’t mention it, the ultimate source for the term “juice jacking” is a Brian Krebs article from 2011 reporting on a vulnerability demonstrated at DEFCON that year. [read post]
21 Jan 2017, 7:00 am by Jordan Brunner
Paul flagged a case study of the operations of the Active Measures Working Group the U.S. started to counteract Soviet disinformation, and he also flagged Brian Krebs’ report on who created the Mirai botnet. [read post]
9 Mar 2021, 1:17 pm by Nicholas Weaver
The investigative journalist Brian Krebs has produced a handy timeline of events and a few things stand out from the chronology. [read post]
2 May 2018, 5:00 am by Matthew Kahn
Security researcher and investigative journalist Brian Krebs reports: Rasmussen ... [read post]
7 Sep 2018, 11:27 am by editor
Keynote speaker is Brian Krebs, an independent investigative reporter who writes about cybercrime at the award-winning website KrebsOnSecurity.com, and was formerly with The Washington Post. [read post]
6 Dec 2013, 9:32 am by Sean Gallagher
According to security reporter Brian Krebs, ZeroAccess began its life cycle in 2009 as a delivery network for other malware—dropping paying customers' viruses and Trojans, including "scareware" fake antivirus packages—onto PCs it had successfully infected. [read post]
20 Aug 2015, 2:49 pm by randywallace
 This story began back on July 15 when online security expert Brian Krebs reported that a group of hackers named the Impact Team had compromised the databases and proprietary electronic information of AM, its parent company Avid Life media and related sites Cougar Life and Established Men. [read post]
18 Jun 2007, 11:54 am
" Security Fix's Brian Krebs has more on Mpack, the exploit toolkit, being used in this attack, which targets multiple vulnerabilities in software including Internet Exploere, Quicktime, Firefox and Opera. [read post]
22 Jun 2020, 6:29 pm by Dan Goodin
Reporter Brian Krebs, citing the organization National Fusion Center Association (NFCA), confirmed the validity of the leaked data. [read post]
11 Nov 2013, 10:07 am by Dan Goodin
Members of Facebook's security team have already combed through the cache to identify users who used the same login credentials on both the Adobe and Facebook sites, and in some cases they have mandated password resets based on that analysis, KrebsonSecurity's Brian Krebs reported. [read post]
3 Nov 2009, 10:23 am
” Just last week the FBI had put the losses at $40 million, according to a story by WashingtonPost.com reporter Brian Krebs, who's been closely following the attacks. [read post]
29 Oct 2009, 12:05 pm
The scheme has exploded in the last year, with the FBI estimating losses at $40 million so far, according to a recent story from WashingtonPost.com reporter Brian Krebs, who’s been closely following the attacks. [read post]
6 Feb 2007, 9:08 pm
UPDATE: The Washington Post's computer security correspondent/blogger Brian Kreb's take is here. [read post]
17 Sep 2014, 4:35 pm by Sean Gallagher
Security reporter Brian Krebs first broke the news on the Goodwill breach in July, and traced the breach back to C&K Systems, a reseller of retail software systems from NCR, Retail Pro, and other retail software and systems providers. [read post]