ALL >> Computers >> View Article
Security Breach At Institute Of Electrical And Electronics Engineers Compromises Member Data

Recently, the Institute of Electrical and Electronics Engineers (IEEE), the world's largest and renowned technical professional association notified members of possible data breach. The association identified the unauthorized access to customer database in December. Computer forensic professionals were engaged to investigate the security breach incident. In February, the forensic investigators identified that a file containing customer data was deleted from the computers of IEEE in November last year.
The investigation led to the disclosure of several system vulnerabilities. Information security professionals of the association have mitigated the vulnerabilities. The compromised information was provided by the members, while registering for an IEEE conference. The file contained names, credit card numbers, credit card expiry dates and card identification numbers of around 828 members. The association reported that they are not aware, whether the attackers extracted customer data from the deleted file. The incident is alleged to be a sophisticated network intrusion attack. The association has notified the Federal Bureau ...
... of Investigation (FBI) on the incident and the concerned regulatory authorities.
Attackers scan the networks to identify and exploit security flaws in networks, computer systems and websites. Once they identify a vulnerable network and computer systems, they use sophisticated techniques to bypass security mechanisms and gain access to privileged databases. A successful intrusion attempt may provide access to sensitive customer information. The collected information could be misused for fraudulent activities such as identity theft, misrepresentation and conducting unauthorized transactions. The offenders may also sell the extracted information to their peers in the crime world and corporate rivals of the targeted organization. Organizations must conduct regular security evaluation of the websites. Hiring professionals qualified in computer science degree may help them in streamlining the security of the IT infrastructure.
IEEE has offered to provide one-year free subscription for Identity theft protection policy. Members must notify the credit reporting agencies and request for fraud alert on their accounts. The affected individuals must monitor their credit card statements and report any unauthorized activity to their respective banks and credit institutions.
Organizations must adhere to the regulatory provisions for collection and storage of data. Payment Card Industry Data Security Standard (PCI DSS) establishes security standards to be implemented by merchants, hardware and software developers, financial institutions and professionals. Training sessions, online degree and e-learning programs may help employees in understanding and implementing security standards and practices.
Employees must be aware of the various IT security threats, measures to be initiated in case of a security breach incident, protection of evidence, procedures for reporting security incident procedures and data recovery procedures. IT employees must be encouraged to undertake online university degree courses in computer forensics and incident management. Access to computers containing privileged information must be restricted to few authorized employees.
Add Comment
Computers Articles
1. React Vs Angular: Which Should You Use To Build Your Startup In 2022?Author: goodcoders
2. Php Vs Java: Differences & Similarities For Web Development
Author: goodcoders
3. Most Common Mistakes When Developing A Mobile App
Author: goodcoders
4. Hvac Market To Soar To $456.6 Billion By 2032: Growth, Trends & Innovations
Author: Rutuja kadam
5. Sports Analytics Market To Hit $22.2 Billion By 2032: A Game-changer For The Industry!
Author: Rutuja kadam
6. Bluetooth Printer: Efficiency & Portability Combined For Your Business
Author: srikanth
7. Mmoexp Cfb 25 Coins:master The Basics To Build Confidence
Author: kyw
8. Top 5 Marketing Resource Management Software Of 2025
Author: Ben Gross
9. Reliable Logistics Company In Saudi Arabia: Is Your Trusted Supply Chain Partner?
Author: IAP Logistics
10. The Rise Of Digital Marketing In Bangalore: Your Ultimate Guide To Choosing The Right Digital Marketing Agency
Author: Cubikeymedia
11. How To Select The Right Nema Power Cord For Your Needs
Author: Jennifer Truong
12. Top 5 Sales Intelligence Software Of 2025
Author: Ben Gross
13. Seo Company In India Increases The Fame Of This Country
Author: SEO Company Kolkata
14. Top 5 Marketing Intelligence Software Of 2025
Author: Ben Gross
15. Why Web Content Management Software Is Essential For Digital Growth In 2025
Author: dnd teams