Monthly Archives: September 2014

'Shellshock' Computer Bug May Be As Serious As 'Heartbleed' Vulnerability

BOSTON, Sept 25 (Reuters) - Hackers have launched attacks exploiting the newly identified "Shellshock" computer bug, researchers warned on Thursday, as news surfaced that an initial patch for the issue was incomplete, suggesting even updated systems were vulnerable. The attacks came as security experts scrambled to determine how many systems and what types of computers…
Read more

Health care data of 1 million N.J. patients compromised since 2009 |

About a month ago, Jersey City Medical Center patients were surprised to receive a letter informing them that the hospital had lost a compact disc loaded with unencrypted sensitive patient data. The trove of information lost in the mail included Social Security numbers, payment information and admission dates for Medicaid patients. The data was out…
Read more

5 Million Gmail Usernames And Associated Passwords Leaked

It's time to change your Gmail password -- again. Around 5 million Gmail usernames and associated passwords were leaked on a Russian Internet forum on Tuesday. Thankfully, less than 2 percent of real, current username and password combinations, or about 100,000, were released, Google's Spam & Abuse Team wrote in a blog post. Many are…
Read more

Home Depot confirms payment system attack

Summary: The home improvement retailer with more than $78 billion in sales said there's no evidence that debit card PINs have been compromised. The attack rhymes with what Target experienced. Home Depot on Monday confirmed that its payment systems were breached in an attack that rhymes with what Target experienced. The company said in a…
Read more

Preventing Toll Fraud

The best defense against toll fraud remains an educated customer. MASS is totally committed to the control of toll fraud. While no telecommunications system can be made entirely free from the risk of toll fraud, diligent attention to system security can reduce that risk considerably. MASS devotes substantial resources to detect suspicious calling patterns, alert…
Read more

Telecommunications | Voice | Data | Networking | Support