BreachExchange mailing list archives

[Fwd: Viking River Cruises] (Epsilon)


From: security curmudgeon <jericho () attrition org>
Date: Wed, 6 Apr 2011 14:00:58 -0500 (CDT)



via Bob McMillan

From: Viking River Cruises
<Viking_River_Cruises () emails vikingrivercruises com>
To: REDACTED
Sent: Mon, April 4, 2011 3:30:29 PM
Subject: Important information from Viking River Cruises


Important information from Viking River Cruises



Dear Viking River Cruises email recipient,

We have been informed by our email service provider, Epsilon, that
files containing email addresses contacted by Viking River Cruises
were accessed without authorization.

We have been assured by Epsilon that the only information that may
have been obtained was your name and/or email address and that the
accessed files did not include any other information. A rigorous
assessment by Epsilon determined that no other information is at risk.

Please note, it is possible you may experience an increase in spam
or unsolicited email messages as a result of this incident. We urge
you to be cautious when opening links or attachments from unknown
senders. Be particularly careful of any emails that request
financial or other personal information including passwords. Viking
will never ask you to provide this type of information via email. If
you receive an email asking for personal information, delete it. It
did not come from Viking River Cruises.

Our service provider has reported this incident to the appropriate
authorities.

We regret this has taken place and for any inconvenience this may
have caused you. We take your privacy very seriously, and we will
continue to work diligently to protect your personal information. If
you have any questions or concerns, please contact Viking at
email_alert_i () vikingrivercruises com.

Sincerely,

Viking River Cruises



5700 Canoga Avenue, Suite 200, Woodland Hills, California 91367
©1997-2011 Viking River Cruises
_______________________________________________
Dataloss-discuss Mailing List (dataloss-discuss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://datalossdb.org/mailing_list

Learn encryption strategies that manage risk and shore up compliance.
Download Article 1 of CREDANT Technologies' The Essentials Series:
Endpoint Data Encryption That Actually Works
http://credant.com/campaigns/realtime2/gap-LP1/

Current thread: