Feeds

IT contractor caught stealing Shell Oil employee info

Database for 'majority' of US workers breached

Website security in corporate America

Shell Oil has warned its employees to be on the lookout for identity theft after an on-site IT contractor was caught stealing worker information out of a company database.

In a security notice posted Friday, Shell said the contractor had already used social security numbers belonging to four employees to file fraudulent unemployment claims. Company officials have no evidence showing other employees' information was lifted.

The culprit is an unnamed employee of a vendor that was working on a project involving Shell's US database. After discovering the breach, the individual was removed from the premises, and Shell terminated its contract with the vendor.

"The matter is being fully investigated internally and Shell is continuing to work with the Texas Workforce Commission and [local] law enforcement to investigate this matter," Shell officials wrote in the notice.

The breached database contained information for a majority of current of former Shell employees based in the US, according to IDG News. ®

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Blood-crazed Microsoft axes Trustworthy Computing Group
Security be not a dirty word, me Satya. But crevice, bigod...
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.