Welcome! Please
join the dialogue
.
Bohmian.org - Discussion - Companies who have admitted breaches resulting in mailing list compromises
Bohmian Home
||
Dialogues
||
Pictures
||
Help
||
About Us
Most Recent Objects
Bistro du Midi
TAK Room
Embassy Suites Baltimore Hotel at BWI Airport Mayrland
ST3000DM001
Poetterization
Unix Philosophy
Poetterize
Random Objects
MSIE objects implemented as separate windows
Spencers Camera and Photo
Vitelity respects the outgoing CID information
Infrared photography
Canon 20D
Obamacare
Shakira
Leaving on a trans-atlantic cruise
Toshiba SD4100 DVD Player
Companies who have admitted breaches resulting in mailing list compromises
Where the Wild Things Are
White Zinfandel
EMail portability
Vulgar moniker
Via Via IV (Providence, RI)
Kernel hacking
Why Google Employees Quit
Treat everything as an iPhone
Pidgin is the instant messaging client formerly known as Gaim
My BroadVoice service was silently suspended
Penny Arcade memes
MicroB web browser
WordPress
Extended warranties tend to cover the time of least-likely failure
C4P API
Associations
Connected Objects
Companies who have not explained why they provided my email address to spammers
Chromium
SniqueAway.com
Center around
Companies who have provided my eMail address to spammers
Related Objects
instance of
companies who have provided my email address to spammers
generalization of
sniqueaway.com
Similarly Named
Skiing in chinos
img:m:Market in the Volksgarten
People who still use Internet Explorer 6
Lance Roberts in Davos
We're sorry. This item can't be shipped to a Wish List or gift registry address.
Applications written in Erlang
Skiing in Chino
Zoom ring rotates in the opposite direction
Other User Entries
m
Companies who have admitted breaches resulting in mailing list compromises
Rate this review:
[-]
[0]
[+]
My Opinion of
Companies who have admitted breaches resulting in mailing list compromises
:
Dislike
Neutral
Like
m
posted November 05, 2011
Many companies have, either through vulnerabilities sin their own system or through contracted companies, allowed their mailing list information to be accessed via third-parties unintentionally. Fortunately, many of the
technically-literate
companies have realized that being forthcoming about these vulnerabilities is best for their public relations. Unfortunately, many of these
companies outsource their eMail operations to a handful of companies that do not seem to understand security
.