And they're not disclosing what was accessed... http://www.informationweek.com/news/security/attacks/232600151 http://www.itpro.co.uk/638701/who-to-trust-after-the-verisign-hack
* * *ASB* *http://XeeMe.com/AndrewBaker* *Harnessing the Advantages of Technology for the SMB market… * On Mon, Feb 6, 2012 at 12:22 PM, Micheal Espinola Jr < [email protected]> wrote: > W. T. F... considering the TLDs they cover, I am astounded they have kept > this under wraps this long. > -- > Espi > > > > > > On Thu, Feb 2, 2012 at 3:53 PM, Michael B. Smith <[email protected]>wrote: > >> Happened 2 years ago…**** >> >> ** ** >> >> Regards,**** >> >> ** ** >> >> Michael B. Smith**** >> >> Consultant and Exchange MVP**** >> >> http://TheEssentialExchange.com**** >> >> ** ** >> >> *From:* Crawford, Scott [mailto:[email protected]] >> *Sent:* Thursday, February 02, 2012 6:17 PM >> *To:* NT System Admin Issues >> *Subject:* VeriSign hit by hackers**** >> >> ** ** >> >> This could get very interesting.**** >> >> ** ** >> >> http://finance.yahoo.com/news/Key-Internet-operator-rb-2857339070.html*** >> * >> >> >> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
