-
Sheena L. Thomas commented on the post, Progress Report for Week Ending, September 22, on the site 6 years, 7 months ago
Here is a list of compromised data breaches 2017. This article discuss how debt card fraud is on the rise. Very interesting article.
https://www.cnbc.com/2018/03/06/protect-your-bank-accounts-from-rising-debit-card-fraud.html
-
Sheena L. Thomas commented on the post, ICE 5.1 Telling a Story through Visualization, on the site 6 years, 7 months ago
One of the top stories in the news Spectre and Meldown vulnerability. This vulnerability affects almost every operating system. Please see link for additional details about the vulnerability.
-
Sheena L. Thomas commented on the post, ICE 5.1 Telling a Story through Visualization, on the site 6 years, 7 months ago
I often wonder how many companies could have avoided major security breaches if their companies did annual pen testing against their environment? I just found out that one of my favorite department stores had a security breach and they will not be held responsible if fraud activities were to appear on any of their customers accounts.…[Read more]
-
Sheena L. Thomas posted a new activity comment 7 years, 1 month ago
Really interesting article and the exec’s sold their shares a day after the breached happened?
You would think that a company that store PII for over 100 million people, would have all the security measures in place. Does Equifax have to comply with any standards and/or regulation? I would think these types of companies should be audited by the…[Read more] -
Sheena L. Thomas posted a new activity comment 7 years, 2 months ago
I placed my comment in the wrong section.
By definition, this was a successful phishing attack. But for the writer to say “this is not technically hacking.” is not an accurate statement.. I think the whole objective of hacking and/or phishing is to gain access to something (money and/or PII, etc.) that does not belong to them. Even though the…[Read more]
-
Sheena L. Thomas posted a new activity comment 7 years, 2 months ago
posted comment in the wrong section.
-
Sheena L. Thomas posted a new activity comment 7 years, 2 months ago
I think I initially posted my comment in the wrong section…
By definition, this was a successful phishing attack. But for the writer to say “this is not technically hacking.” is not an accurate statement.. I think the whole objective of hacking and/or phishing is to gain access to something (money and/or PII, etc.) that does not belong to the…[Read more]
-
Sheena L. Thomas posted a new activity comment 7 years, 2 months ago
By definition, this was a successful phishing attack. But for the writer to say “this is not technically hacking.” is not an accurate statement.. I think the whole objective of hacking and/or phishing is to gain access to something (money and/or PII, etc.) that does not belong to them. Even though the methodologies of hacking and phishing are dif…[Read more]
-
Sheena L. Thomas posted a new activity comment 7 years, 2 months ago
By definition, this was a successful phishing attack. But for the writer to say “this is not technically hacking.” is not an accurate statement.. I think the whole objective of hacking and/or phishing is to gain access to something (money and/or PII, etc.) that does not belong to them. Even though the methodologies of hacking and phishing are…[Read more]
-
Sheena L. Thomas's profile was updated 7 years, 11 months ago