Researchers Harvest E-Mails from Fortune 500 Firms

January 2012
Information Management Journal;Jan/Feb2012, Vol. 46 Issue 1, p15
The article focuses on access to confidential e-mails including names, trade secrets and passwords from Fortune 500 companies by two security researchers. The members of information security company Godai Group Peter Kim and Garrett Gee intercepted sensitive data by setting up misspelled web domain names that look the same as those of legitimate organization.


Related Articles

  • Would You Even Know A Trade Secret If It Jumped Up and Bit You Somewhere? McDaniel, Steve // Coatings World;Feb2012, Vol. 17 Issue 2, p30 

    A quiz concerning trade secrets is presented.

  • Subjects of trade secret (know-how) right. Protasov, D. V. // Current Issues of Russian Law;2010, Vol. 2010 Issue 2, p150 

    No abstract available.

  • When Employees Leave, Trade Secrets Follow. Schoonmaker, Daniel // Grand Rapids Business Journal;5/2/2005, Vol. 23 Issue 18, p14 

    Reports on the need for protecting trade secret information by companies in Grand Rapids, Michigan. Effect of technology on the security of business information; Requirement of the Michigan Uniform Trade Secret Act for employers; Suggestions for protecting trade secret information.

  • Student Nondisclosure Agreement.  // Student Nondisclosure Agreement;7/1/2010, p1 

    If you work for a college or university and use students to help perform research, you could be leaving their work vulnerable to theft by the private sector -- or even the students themselves. In order to discourage students from sharing valuable information, it's crucial that they sign a...

  • TECH TIPS.  // Managing People at Work;Sep2010, Issue 342, p2 

    The article offers important tips on how to prevent resigning employees from stealing the company's confidential information as well as tips on how to protect personal and business data on one's smart phone.

  • Protect confidential info.  // Communication Briefings;Nov2013, Vol. 32 Issue 13, p2 

    The article discusses how to protect the confidential information of the business by explaining to employees the specific meaning of confidential and detailing what information should be kept secret, adapted from the online article "How to Enforce a Non-Disclosure Agreement" Jaimy Ford.

  • trade secret. Stim, Richard // Contracts: The Essential Business Desk Reference;2010, p454 

    A definition of the term "trade secret" is presented, which refers to any information that has commercial value, has been maintained in confidence by a business, and is not known by competitors.

  • De-mystifying intellectual property. Felber, Bob // Public Relations Tactics;Jan2012, Vol. 19 Issue 1, p7 

    The article offers information on intellectual property. It mentions that intellectual property accounts for near 80% of the total value of companies listed in Fortune 500 but its being intangible makes such property difficult to understand. It also discusses several types of intellectual...

  • Big Phish. ECKER, KEITH // InsideCounsel;Dec2008, Vol. 18 Issue 205, p38 

    The article offers information on spear phishing. iDefense Labs, a provider of security intelligence, says there have been approximately 66 reported spear phishing attacks within the past year and a half with the majority of attacks striking Fortune 500 companies, government agencies, financial...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics