Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Privacy Communications Security

Verizon Exposes the Wrong 1,200 Email Addresses 94

netbuzz writes "If you're going to market your expertise by inviting 1,200 IT professionals to a seminar about securing data and protecting personal information, it's probably a good idea to protect the personal information of those you invite. On Tuesday, Verizon forgot that advice and blasted each of the 1,200 email addresses to everyone on the list ... and they did it 17 times."
This discussion has been archived. No new comments can be posted.

Verizon Exposes the Wrong 1,200 Email Addresses

Comments Filter:
  • Blunder (Score:5, Insightful)

    by mfh ( 56 ) on Friday October 10, 2008 @03:22PM (#25331285) Homepage Journal

    Whenever email scripts have too many recipients, they do tend to refresh and try again, which can cause dupes. These addresses were likely supposed to be in the BCC field, or nonexistent (duh). So it was a mistake.

    That's an embarassing blunder, to hold a seminar on keeping private info secure and then spamming who is attending the seminar. I wonder how much time they will spend on that blunder, explaining how it can happen to anyone, even the mighty Verizon, but this foolishness will not strengthen Verizon's sales pitch.

    Spammers attend these conferences. Now spammers have known email addresses of everyone there.

    This would only make a difference if spammers made money based on sending targeted email. They don't. They make money based on volume of addresses when a shady merchant pays them. So maybe they could make $25 on this list?

    Apart from making one person in Verizon look stupid, this also enforces the theory that it only takes one idiot to... the whole internet.

  • by rehtonAesoohC ( 954490 ) on Friday October 10, 2008 @03:26PM (#25331335) Journal
    It's not that Verizon exposed "the wrong" 1200 emails, it's that Verizon exposed any email addresses at all.

    /bad title?
  • by Anonymous Coward on Friday October 10, 2008 @03:29PM (#25331373)

    Sometimes you can get away with doing something stupid because nobody notices.

    This was not one of those times.

  • by reymyster ( 521177 ) <acuity@[ ]il.com ['gma' in gap]> on Friday October 10, 2008 @03:30PM (#25331391) Homepage
    I believe the "wrong" referred to in the title meant to imply that it was particularly bad to expose these specific emails, like when people say "you just messed with the wrong guy"
  • by Gewalt ( 1200451 ) on Friday October 10, 2008 @03:31PM (#25331405)

    It's not that Verizon exposed "the wrong" 1200 emails, it's that Verizon exposed any email addresses at all.

    If ever there was a worst-case-scenario set of 1200 email addresses, this list was it.

  • by PhrostyMcByte ( 589271 ) <phrosty@gmail.com> on Friday October 10, 2008 @03:32PM (#25331425) Homepage
    I read it as in "You've fucked with the wrong guy". All leaks are bad, but emails of people interested in "securing data and protecting personal information" are the last ones you'd want to leak.
  • by Bryansix ( 761547 ) on Friday October 10, 2008 @03:55PM (#25331685) Homepage
    I am not surprised in the least that this happened coming from Verizon. They hire incompetent assholes all the time there. Their business model is how to screw the customer out of the most money and provide the least amount of service. I can't stand Verizon.

    Note that their cell phone business is completely separate from the rest of the morons. Neither business unit talks to each other and neither knows what the other is doing. If the wireless side of the business had any brains they would split off and change names. Verizon is associated with incompetence and greed.
  • by Naughty Bob ( 1004174 ) * on Friday October 10, 2008 @04:03PM (#25331779)

    If ever there was a worst-case-scenario set of 1200 email addresses, this list was it.

    Yes and no. In terms of potential harm done, these people are much more equipped than your average person to be able to mitigate this fuck up.

    On the other hand, if there was ever a subsection of people who you donn't want to piss off in this regard....

  • by IdeaMan ( 216340 ) on Friday October 10, 2008 @04:17PM (#25331921) Homepage Journal

    Maybe now we can have secure, authenticated email.
    It's only laziness and the lack of any security mandates that prevents us from having decent email.

  • by david_thornley ( 598059 ) on Friday October 10, 2008 @04:20PM (#25331969)

    Except that there is absolutely nothing to distinguish some clerical errors and actual security issues. If information is leaked by clerical error, it's leaked just as effectively as if it were hacked out of an on-line database through cross-site scripting. Maybe more effectively.

  • by marcosdumay ( 620877 ) <marcosdumay&gmail,com> on Friday October 10, 2008 @04:38PM (#25332227) Homepage Journal

    "It's only laziness and the lack of any security mandates that prevents us from having decent email."

    I'm sure the lack of any authenticating authority doesn't make it any easier.

  • Re:Blunder (Score:3, Insightful)

    by AndrewNeo ( 979708 ) on Friday October 10, 2008 @05:08PM (#25332577) Homepage
    Probably because they assume it will be a valid address.
  • by Anonymous Coward on Friday October 10, 2008 @05:29PM (#25332793)

    That doesn't seem like the wrong van. Seems a reasonably high value score for robbing a van. They weren't caught (at least when that article was written) after all.

  • by Anonymous Coward on Saturday October 11, 2008 @01:10AM (#25336771)

    Some bandwidth.com representative sent an email to 1,300 of their customers this morning. The reply list was so big it crashed Evolution when opened.

    One interesting thing about the event was that a great discussion raised from it. Customer's were bouncing ideas off each other, asking what their different configurations were, etc. Some were whining about the service or complaining that we should stop spamming them.

    Then, shortly afterward, in the middle of some pretty decent discussion - the CEO of Bandwidth.com sends out an email saying that people are fired, they care about security blah blah..

    What this guy failed to do was seize the moment and take the opportunity to start a blog or forum to keep the discussion going..Instead, he fired some poor schmuck(s) over an error that could of happened to anyone.

    What about actually addressing some of the concerns and ideas that were brought up?

    Just bad leadership from that guy - I would love his job.

8 Catfish = 1 Octo-puss

Working...