Tag Archive for: customers

Hutton Hotel Warns Customers Of Data Breach – Story – WTVF – NewsChannel5.com


NewsChannel5.com

Hutton Hotel Warns Customers Of Data Breach – Story – WTVF
NewsChannel5.com
A luxury hotel chain in Nashville has warned its customers of a data breach that may have occurred over a three-year period.
Hutton Hotel warning customers about possible data breach …WRCB-TV
Hutton Hotel Warns of Credit Card Data BreachPatch.com
Nashville Hotel Suffered POS Breach For Three YearsBankInfoSecurity.com

all 7 news articles »

“data breach” – Google News

Hutton Hotel Warns Customers Of Data Breach – NewsChannel5.com


NewsChannel5.com

Hutton Hotel Warns Customers Of Data Breach
NewsChannel5.com
A luxury hotel chain in Nashville has warned its customers of a data breach that may have occurred over a three-year period. The Hutton Hotel put a statement on its website letting customers know some guests' credit and debit card payment information
Hutton Hotel warning customers about possible data breachWRCB-TV

all 4 news articles »

“data breach” – Google News

Beggars Group (4AD, Matador, XL) Hacked, Customers Warned of Data Breach – Pitchfork Media


Pitchfork Media

Beggars Group (4AD, Matador, XL) Hacked, Customers Warned of Data Breach
Pitchfork Media
A letter sent by Beggars' U.S. distributor Matador Direct last week said that customers who placed orders through the websites for Matador Direct-distributed labels from April 28, 2015 to May 4, 2016 may have been the victims of a data breach. Credit

and more »

“data breach” – Google News

Crypto flaw made it easy for attackers to snoop on Juniper customers

(credit: John Palmer)

As if people didn’t already have cause to distrust the security of Juniper products, the networking gear maker just disclosed a vulnerability that allowed attackers to eavesdrop on sensitive communications traveling through customers’ virtual private networks.

In an advisory posted Wednesday, Juniper officials said they just fixed a bug in the company’s Junos operating system that allowed adversaries to masquerade as trusted parties. The impersonation could be carried out by presenting a forged cryptographic certificate that was signed by the attacker rather than by a trusted certificate authority that normally vets the identity of the credential holder.

“When a peer device presents a self-signed certificate as its end entity certificate with its issuer name matching one of the valid CA certificates enrolled in Junos, the peer certificate validation is skipped and the peer certificate is treated as valid,” Wednesday’s advisory stated. “This may allow an attacker to generate a specially crafted self-signed certificate and bypass certificate validation.”

Read 6 remaining paragraphs | Comments

Technology Lab – Ars Technica