-
Recycling Today Conferences: Market Intelligence
Posted on June 11th, 2009 No commentsLeaders from the paper, plastics and electronics recycling sectors discuss the challenges and opportunities facing recyclers.
See the article here:
Recycling Today Conferences: Market Intelligence -
Recycling Today Conferences: Reverse Logistics, Forward Thinking
Posted on June 11th, 2009 No commentsManufacturers and retailers are putting more thought into their return, repair and recycling supply chains.
Excerpt from:
Recycling Today Conferences: Reverse Logistics, Forward Thinking -
T-Mobile hack data is genuine
Posted on June 9th, 2009 No commentsT-Mobile has confirmed that files posted on a full disclosure mailing list are genuine – but the company fails to explain whether or not cybercriminals really got full access to its systems, IDG reports.
See original here:
T-Mobile hack data is genuine -
Class Alleges Massive Data Breach at AETNA
Posted on June 9th, 2009 No commentsA federal class action claims AETNA insurance allowed hackers to enter its Web site and gain access to personal information about 450,000 employees, former employees and potential employees.
Visit link:
Class Alleges Massive Data Breach at AETNA -
Credit Card Fraud: Most Common Form of ID Theft
Posted on June 9th, 2009 No commentsAccording to a new study from the Identity Theft Resource Center, the most common use of identity theft involves opening a new credit account in the victim’s name. This type of fraud affects almost two-thirds of identity theft victims.
-
‘Inside jobs’ a threat
Posted on June 8th, 2009 No commentsCyber-security experts say it is the ‘inside jobs’ – the disgruntled employees – and not hackers, that are a threat to firms in these tough times.
Link:
‘Inside jobs’ a threat -
Cybercops Without Borders
Posted on June 8th, 2009 No commentsCybercops Without Borders. Glancing at his file, there’s little in the case of 23-year-old Ovidiu-Ionut Nicola-Roman to distinguish him from the average cybercriminal. Beginning in 2005, he was a member of a massive “phishing” scheme that harvested millions of e-mail addresses from the Web and used a program called “E-mail Sender Express” to b…
Follow this link:
Cybercops Without Borders
Recent Comments