UWCISA: Official Blog

Technology, security, analytics and innovation in the world of audit and business.

Wednesday, September 17, 2008

Forever 21 says nearly 99,000 cards compromised in data thefts

Another huge data breach has been announced, this time the work of hackers. Forever 21 says nearly 99,000 cards compromised in data thefts
Posted by Gerald Trites at 4:25 AM
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

About

  • Home
  • About

Blog Archive

  • ►  2025 (10)
    • ►  April (2)
    • ►  February (3)
    • ►  January (5)
  • ►  2024 (26)
    • ►  November (2)
    • ►  October (2)
    • ►  August (4)
    • ►  June (3)
    • ►  May (2)
    • ►  April (3)
    • ►  March (3)
    • ►  February (3)
    • ►  January (4)
  • ►  2023 (30)
    • ►  December (1)
    • ►  November (3)
    • ►  October (3)
    • ►  September (4)
    • ►  August (4)
    • ►  July (5)
    • ►  June (4)
    • ►  May (1)
    • ►  March (1)
    • ►  February (1)
    • ►  January (3)
  • ►  2022 (9)
    • ►  December (3)
    • ►  November (2)
    • ►  October (1)
    • ►  August (1)
    • ►  July (1)
    • ►  May (1)
  • ►  2021 (4)
    • ►  March (1)
    • ►  January (3)
  • ►  2020 (8)
    • ►  August (1)
    • ►  July (1)
    • ►  June (1)
    • ►  April (3)
    • ►  February (1)
    • ►  January (1)
  • ►  2019 (10)
    • ►  December (2)
    • ►  November (1)
    • ►  October (1)
    • ►  September (2)
    • ►  August (1)
    • ►  June (1)
    • ►  April (1)
    • ►  January (1)
  • ►  2018 (7)
    • ►  December (1)
    • ►  November (1)
    • ►  October (1)
    • ►  September (2)
    • ►  July (1)
    • ►  March (1)
  • ►  2017 (18)
    • ►  November (1)
    • ►  October (3)
    • ►  September (6)
    • ►  August (1)
    • ►  June (1)
    • ►  May (1)
    • ►  April (2)
    • ►  January (3)
  • ►  2016 (22)
    • ►  December (7)
    • ►  September (1)
    • ►  August (1)
    • ►  July (6)
    • ►  June (4)
    • ►  May (1)
    • ►  April (2)
  • ►  2015 (31)
    • ►  November (3)
    • ►  October (2)
    • ►  September (6)
    • ►  August (1)
    • ►  July (3)
    • ►  June (1)
    • ►  May (2)
    • ►  April (3)
    • ►  March (2)
    • ►  February (5)
    • ►  January (3)
  • ►  2014 (13)
    • ►  December (6)
    • ►  October (1)
    • ►  August (2)
    • ►  July (2)
    • ►  June (2)
  • ►  2013 (19)
    • ►  December (1)
    • ►  October (2)
    • ►  September (3)
    • ►  July (2)
    • ►  May (1)
    • ►  April (3)
    • ►  March (1)
    • ►  February (3)
    • ►  January (3)
  • ►  2012 (37)
    • ►  December (1)
    • ►  November (2)
    • ►  October (3)
    • ►  September (1)
    • ►  July (2)
    • ►  June (1)
    • ►  May (2)
    • ►  April (4)
    • ►  March (9)
    • ►  February (5)
    • ►  January (7)
  • ►  2011 (86)
    • ►  December (5)
    • ►  November (8)
    • ►  October (4)
    • ►  September (5)
    • ►  August (10)
    • ►  July (5)
    • ►  June (10)
    • ►  May (7)
    • ►  April (6)
    • ►  March (9)
    • ►  February (7)
    • ►  January (10)
  • ►  2010 (120)
    • ►  December (10)
    • ►  November (12)
    • ►  October (9)
    • ►  September (9)
    • ►  August (12)
    • ►  July (10)
    • ►  June (14)
    • ►  May (10)
    • ►  April (11)
    • ►  March (8)
    • ►  February (8)
    • ►  January (7)
  • ►  2009 (95)
    • ►  December (8)
    • ►  November (9)
    • ►  October (6)
    • ►  September (8)
    • ►  August (8)
    • ►  July (9)
    • ►  June (6)
    • ►  May (6)
    • ►  April (7)
    • ►  March (9)
    • ►  February (8)
    • ►  January (11)
  • ▼  2008 (142)
    • ►  December (11)
    • ►  November (14)
    • ►  October (10)
    • ▼  September (11)
      • PCI Compliance: Does It Equal Security?
      • Apple's iPhone A Tight Fit For The Enterprise -- i...
      • CGEIT Certification
      • Thought Center - A Balanced Approach to Risk and P...
      • Forever 21 says nearly 99,000 cards compromised in...
      • Open phones are more vulnerable, security execs say
      • Radical Desktops Deliver Power To The People. But ...
      • The ISSA Journal
      • The key to data security: Separation of duties
      • Security ROI: Fact or fiction?
      • Aberdeen Group: The 2008 Email Security Report
    • ►  August (11)
    • ►  July (17)
    • ►  June (12)
    • ►  May (8)
    • ►  April (14)
    • ►  March (12)
    • ►  February (10)
    • ►  January (12)
  • ►  2007 (36)
    • ►  December (9)
    • ►  November (13)
    • ►  October (12)
    • ►  September (2)

Contributors

  • Efrim
  • Malik
Awesome Inc. theme. Powered by Blogger.