Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

10/5/2017
02:30 PM
50%
50%

Equifax Lands $7.25 Million Contract with IRS

The embattled credit monitoring agency will provide taxpayer identification verification and fraud prevention services to the federal tax agency.

Equifax has received a $7.25 million contract from the Internal Revenue Service (IRS) to verify the identities of taxpayers and provide fraud prevention services, according to a Politico report.

The credit monitoring agency, which has been under siege by consumers and legislators since it disclosed its massive breach of sensitive personally identifiable information on up to 145.5 million Americans, was awarded the deal under a no-bid contract on Sept. 30, which marks the end of the fiscal year for the federal government. Equifax disclosed its breach on July 29.

Legislators took the IRS to task for its decision to issue a contract to Equifax. "In the wake of one of the most massive data breaches in a decade, it's irresponsible for the IRS to turn over millions in taxpayer dollars to a company that has yet to offer a succinct answer on how at least 145 million Americans had personally identifiable information exposed," Orrin Hatch, (R-Utah) and Senate Finance chairman, was quoted in Politico.

Read more about the IRS contract here.

 

Join Dark Reading LIVE for two days of practical cyber defense discussions. Learn from the industry’s most knowledgeable IT security experts. Check out the INsecurity agenda here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
HowardE668
50%
50%
HowardE668,
User Rank: Apprentice
10/11/2017 | 6:06:44 AM
This story is from The Onion, right?
I'm sure that this story is copied from The Onion, right> 
REISEN1955
100%
0%
REISEN1955,
User Rank: Ninja
10/9/2017 | 3:47:34 PM
Re: Why?
"Government is not the solution to the problem.  Government IS the problem"  --- Ronald Reagan.  This is ample proof that government knows NOTHING.,
djvimaxasli
50%
50%
djvimaxasli,
User Rank: Apprentice
10/8/2017 | 10:05:59 AM
Re: Why?
Informative article, just what I wanted to find.
tcubed
50%
50%
tcubed,
User Rank: Apprentice
10/6/2017 | 10:37:15 AM
Thanks
Our government looking out for us, what could possibly go wrong...
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
10/6/2017 | 7:12:28 AM
Why?
Nothing more be said. 
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-29378
PUBLISHED: 2020-11-29
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. It is possible to elevate the privilege of a CLI user (to full administrative access) by using the password [email protected]#y$z%x6x7q8c9z) for the e...
CVE-2020-29379
PUBLISHED: 2020-11-29
An issue was discovered on V-SOL V1600D4L V1.01.49 and V1600D-MINI V1.01.48 OLT devices. During the process of updating the firmware, the update script starts a telnetd -l /bin/sh process that does not require authentication for TELNET access.
CVE-2020-29380
PUBLISHED: 2020-11-29
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. TELNET is offered by default but SSH is not always available. An attacker can intercept passwords sent in cleartext and conduct a man-in-...
CVE-2020-29381
PUBLISHED: 2020-11-29
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600D4L V1.01.49, V1600D-MINI V1.01.48, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. Command injection can occur in "upload tftp syslog" and "upload tftp configuration" in the CLI via a crafted filename...
CVE-2020-29382
PUBLISHED: 2020-11-29
An issue was discovered on V-SOL V1600D V2.03.69 and V2.03.57, V1600G1 V2.0.7 and V1.9.7, and V1600G2 V1.1.4 OLT devices. A hardcoded RSA private key (specific to V1600D, V1600G1, and V1600G2) is contained in the firmware images.