And they're not disclosing what was accessed...

http://www.informationweek.com/news/security/attacks/232600151
http://www.itpro.co.uk/638701/who-to-trust-after-the-verisign-hack

* *

*ASB* *http://XeeMe.com/AndrewBaker* *Harnessing the Advantages of
Technology for the SMB market…

*



On Mon, Feb 6, 2012 at 12:22 PM, Micheal Espinola Jr <
[email protected]> wrote:

> W. T. F...  considering the TLDs they cover, I am astounded they have kept
> this under wraps this long.
> --
> Espi
>
>
>
>
>
> On Thu, Feb 2, 2012 at 3:53 PM, Michael B. Smith <[email protected]>wrote:
>
>>  Happened 2 years ago…****
>>
>> ** **
>>
>> Regards,****
>>
>> ** **
>>
>> Michael B. Smith****
>>
>> Consultant and Exchange MVP****
>>
>> http://TheEssentialExchange.com****
>>
>> ** **
>>
>> *From:* Crawford, Scott [mailto:[email protected]]
>> *Sent:* Thursday, February 02, 2012 6:17 PM
>> *To:* NT System Admin Issues
>> *Subject:* VeriSign hit by hackers****
>>
>> ** **
>>
>> This could get very interesting.****
>>
>> ** **
>>
>> http://finance.yahoo.com/news/Key-Internet-operator-rb-2857339070.html***
>> *
>>
>>
>>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to