Welcome! Please
join the dialogue
.
Bohmian.org - Discussion - Companies who have admitted breaches resulting in mailing list compromises
Bohmian Home
||
Dialogues
||
Pictures
||
Help
||
About Us
Most Recent Objects
Bistro du Midi
TAK Room
Embassy Suites Baltimore Hotel at BWI Airport Mayrland
ST3000DM001
Poetterization
Unix Philosophy
Poetterize
Random Objects
Options in tree menus that look to be collapsible but are not
Propaganda (digital art collection)
Internet Explorer
ST3000DM001
FetchOK
EBay
Rodolfo's Pizza (Montgomery, NJ)
SSX Tricky Developers
Removal of the Jumanji-like scene in Max's room in favour of the child running out the door at night
Slack ball
Philips DVP5990 DVD player
Neuros Link Gamma Program
Out-Of-Fuel Mechanism (Linux)
Event (software)
Apple users
Pakeman Catto and Carter trousers
Rica Hell Hotel, Hell, NO
I wouldn't suggest ever ordering from Nokia directly
You should always support a fqdn
Glossy displays on laptops
Twitter.com
WordPress
Remembered information in addition to an initial password is not a form of two-factor authentication
Associations
Connected Objects
SniqueAway.com
Companies who have not explained why they provided my email address to spammers
Companies who have provided my eMail address to spammers
Center around
Chromium
Related Objects
instance of
companies who have provided my email address to spammers
generalization of
sniqueaway.com
Similarly Named
img:m:Market in the Volksgarten
Skiing in Chino
T-Mobile vs Comcast Internet Prices in 2010
DRM in Apple products
XHTML support in MSIE
Cheeseburger in Paradise
The World in C
Symbolism in the Where the Wild Things Are film
Other User Entries
m
Companies who have admitted breaches resulting in mailing list compromises
Rate this review:
[-]
[0]
[+]
My Opinion of
Companies who have admitted breaches resulting in mailing list compromises
:
Dislike
Neutral
Like
m
posted November 05, 2011
Many companies have, either through vulnerabilities sin their own system or through contracted companies, allowed their mailing list information to be accessed via third-parties unintentionally. Fortunately, many of the
technically-literate
companies have realized that being forthcoming about these vulnerabilities is best for their public relations. Unfortunately, many of these
companies outsource their eMail operations to a handful of companies that do not seem to understand security
.