{"id":2477,"date":"2011-04-04T15:14:12","date_gmt":"2011-04-04T14:14:12","guid":{"rendered":"http:\/\/blog.intego.com\/?p=2477"},"modified":"2011-04-04T15:14:12","modified_gmt":"2011-04-04T14:14:12","slug":"the-epsilon-data-breach-what-you-need-to-know","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/the-epsilon-data-breach-what-you-need-to-know\/","title":{"rendered":"The Epsilon Data Breach: What You Need to Know"},"content":{"rendered":"<p>Last week, <a href=\"http:\/\/www.epsilon.com\/\">Epsilon<\/a>, a major e-mail marketing firm, <a href=\"http:\/\/www.epsilon.com\/News%20%26%20Events\/Press_Releases_2011\/Epsilon_Notifies_Clients_of_Unauthorized_Entry_into_Email_System\/p1057-l3\">suffered a serious data breach<\/a>, whereby hackers obtained e-mail addresses and user names for potentially millions of users who had signed up to receive e-mail updates from dozens of companies. The companies infected include banks (Capitol One, Barclay&#8217;s, Citigroup, JPMorgan Chase), stores (Walgreen, Kroger, Best Buy), and other web sites (TiVo, AbeBooks, Disney). <\/p>\n<p>According to information made public about this breach, only e-mail addresses and user names were harvested. However, it is possible that for some of the affected sites, you may have entered a password, and if your password techniques are not very secure, you may have used a password that you use on many sites.<\/p>\n<p>If the password in question is only for logging into web sites, and not for sites where you give credit card information, you have little to worry about. But for sites affected where you have provided credit card information, it is a good idea to change your password as soon as possible. Many web sites are notifying users of the breach, but not all will do so; because of this, it&#8217;s up to you to decide whether you should change passwords on multiple web sites or not. <\/p>\n<p>For now, the extent of the breach is unclear. If, indeed, only e-mail addresses and user names were obtained, the worst one can fear is a large increase in spam and phishing e-mails. Intego software can help you fight against these threats. <a href=\"https:\/\/www.intego.com\/virusbarrier\/\">Intego VirusBarrier X6<\/a> includes a powerful anti-phishing tool, and Personal Antispam, <a href=\"https:\/\/www.intego.com\/internet-security-barrier\/\">Intego Internet Security Barrier<\/a>, is an intelligent spam filter that learns from the e-mail you receive.  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last week, Epsilon, a major e-mail marketing firm, suffered a serious data breach, whereby hackers obtained e-mail addresses and user names for potentially millions of users who had signed up to receive e-mail updates from dozens of companies. The companies infected include banks (Capitol One, Barclay&#8217;s, Citigroup, JPMorgan Chase), stores (Walgreen, Kroger, Best Buy), and [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[43,102,124],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Last week, Epsilon, a major e-mail marketing firm, suffered a serious data breach, whereby hackers obtained e-mail addresses and user names for\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/the-epsilon-data-breach-what-you-need-to-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Epsilon Data Breach: What You Need to Know - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Last week, Epsilon, a major e-mail marketing firm, suffered a serious data breach, whereby hackers obtained e-mail addresses and user names for\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/the-epsilon-data-breach-what-you-need-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2011-04-04T14:14:12+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-epsilon-data-breach-what-you-need-to-know\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/the-epsilon-data-breach-what-you-need-to-know\/\",\"name\":\"The Epsilon Data Breach: What You Need to Know - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"datePublished\":\"2011-04-04T14:14:12+00:00\",\"dateModified\":\"2011-04-04T14:14:12+00:00\",\"description\":\"Last week, Epsilon, a major e-mail marketing firm, suffered a serious data breach, whereby hackers obtained e-mail addresses and user names for\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-epsilon-data-breach-what-you-need-to-know\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-epsilon-data-breach-what-you-need-to-know\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-epsilon-data-breach-what-you-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Epsilon Data Breach: What You Need to Know\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-epsilon-data-breach-what-you-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-epsilon-data-breach-what-you-need-to-know\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"The Epsilon Data Breach: What You Need to Know\",\"datePublished\":\"2011-04-04T14:14:12+00:00\",\"dateModified\":\"2011-04-04T14:14:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-epsilon-data-breach-what-you-need-to-know\/#webpage\"},\"wordCount\":280,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"keywords\":[\"Data Breach\",\"Phishing\",\"Spam\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-epsilon-data-breach-what-you-need-to-know\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Last week, Epsilon, a major e-mail marketing firm, suffered a serious data breach, whereby hackers obtained e-mail addresses and user names for","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/the-epsilon-data-breach-what-you-need-to-know\/","og_locale":"en_US","og_type":"article","og_title":"The Epsilon Data Breach: What You Need to Know - The Mac Security Blog","og_description":"Last week, Epsilon, a major e-mail marketing firm, suffered a serious data breach, whereby hackers obtained e-mail addresses and user names for","og_url":"https:\/\/www.intego.com\/mac-security-blog\/the-epsilon-data-breach-what-you-need-to-know\/","og_site_name":"The Mac Security Blog","article_published_time":"2011-04-04T14:14:12+00:00","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-epsilon-data-breach-what-you-need-to-know\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/the-epsilon-data-breach-what-you-need-to-know\/","name":"The Epsilon Data Breach: What You Need to Know - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"datePublished":"2011-04-04T14:14:12+00:00","dateModified":"2011-04-04T14:14:12+00:00","description":"Last week, Epsilon, a major e-mail marketing firm, suffered a serious data breach, whereby hackers obtained e-mail addresses and user names for","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-epsilon-data-breach-what-you-need-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/the-epsilon-data-breach-what-you-need-to-know\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-epsilon-data-breach-what-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"The Epsilon Data Breach: What You Need to Know"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-epsilon-data-breach-what-you-need-to-know\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-epsilon-data-breach-what-you-need-to-know\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"The Epsilon Data Breach: What You Need to Know","datePublished":"2011-04-04T14:14:12+00:00","dateModified":"2011-04-04T14:14:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-epsilon-data-breach-what-you-need-to-know\/#webpage"},"wordCount":280,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"keywords":["Data Breach","Phishing","Spam"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/the-epsilon-data-breach-what-you-need-to-know\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-DX","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/2477"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=2477"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/2477\/revisions"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=2477"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=2477"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=2477"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}