CD Universe

Last updated
CD Universe
Cduniverse.png
CD Universe logo
FoundedApril 1996;26 years ago (1996-04)
Wallingford, Connecticut, United States
HeadquartersWallingford, Connecticut, U.S.
Area servedWorldwide
Founder(s) Charles Beilman
Industry Internet, online retailing
URL cduniverse.com
Commercialyes
Current statusOnline

CD Universe.com is an e-commerce site that sells music CDs, mp3 downloads, movies, and video games worldwide. CD Universe also offers a wide selection of miscellaneous items such as stuffed animals, jigsaw puzzles, board games, etc. [1]

Contents

History

CD Universe was created in 1996 by founder and CEO Charles Beilman in Wallingford, Connecticut, United States, where it is still maintained and operated. [2] [3] [4] CD Universe lists over 940,000 physical products and over 6 million downloadable songs.

In 1999, CD Universe was sold by Charles Beilman to eUniverse. [5] Charles Beilman bought CD Universe back from eUniverse in October, 2000 after eUniverse decided they wanted to focus on their entertainment business (they eventually owned MySpace). [5]

In 2009, CD Universe began selling digital music in the DRM-free mp3 format, through their relationship with Neurotic Media. [6]

Mr. Beilman retired in January 2020. [7]

Charity work

In September 2014, CD Universe began an effort to help raise money for the well known and fiscally responsible charity called Room to Read. [8] CD Universe helps to support Room to Read's goal of teaching every child to read and write, thus breaking the cycle of poverty.

CD Universe also supports The American Red Cross. Visitors that donate using the link on their website will have their donations matched by CD Universe. [9]

Website security

CD Universe protects its customers' sensitive information in the same way that all reputable online companies do: using SSL (Secure Sockets Layer). CD Universe experienced a security breach in December 1999. [10] [11] Although this security breach was a major setback for the company and its customers' trust, CD Universe was able to stay in business and proceeded with an investigation. The hacker, however, a Russian known only by the name of "Maxus", was never caught. [12]

Since this incident, CD Universe reorganized its administration and the security features of its website. CD Universe is now monitored by outside companies such as McAfee who test their website daily for security gaps. [13] The internet security provider Norton has also confirmed that CD Universe is a safe, secure place to shop online. [14]

Related Research Articles

McAfee American global computer security software company

McAfee Corp., formerly known as McAfee Associates, Inc. from 1987 to 1997 and 2004 to 2014, Network Associates Inc. from 1997 to 2004, and Intel Security Group from 2014 to 2017, is an American global computer security software company headquartered in San Jose, California.

Gartner American research company

Gartner, Inc is a technological research and consulting firm based in Stamford, Connecticut that conducts research on technology and shares this research both through private consulting as well as executive programs and conferences. Its clients include large corporations, government agencies, technology companies, and investment firms.

Antivirus software Computer software to defend against malicious computer viruses

Antivirus software, or antivirus software, also known as anti-malware, is a computer program used to prevent, detect, and remove malware.

Phishing Act of attempting to acquire sensitive information by posing as a trustworthy entity

Phishing is a type of social engineering where an attacker sends a fraudulent message designed to trick a person into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware. Phishing attacks have become increasingly sophisticated and often transparently mirror the site being targeted, allowing the attacker to observe everything while the victim is navigating the site, and transverse any additional security boundaries with the victim. As of 2020, phishing is by far the most common attack performed by cybercriminals, the FBI's Internet Crime Complaint Centre recording over twice as many incidents of phishing than any other type of computer crime.

ESET Slovak internet security company

ESET, spol. s.r.o. is a Slovak internet security company, headquartered in Bratislava, Slovakia, and was awarded the recognition of the most successful Slovak company in 2008, 2009 and 2010. ESET provides security software in over 200 countries and territories worldwide, and its software is localized into more than 30 languages.

Norton Internet Security, developed by Symantec Corporation, was a computer program that provided malware protection and removal during a subscription period. It used signatures and heuristics to identify viruses. Other features included a personal firewall, email spam filtering, and phishing protection. With the release of the 2015 line in summer 2014, Symantec officially retired Norton Internet Security after 14 years as the chief Norton product. It was superseded by Norton Security, a rechristened adaptation of the Norton 360 security suite.

Norton 360, developed by Symantec, is an “all-in-one” security suite for the consumer market.

Trust seal

A trust seal is a seal granted by an entity to websites or businesses for display. Often the purpose is to demonstrate to customers that this business is concerned with security and their business identity. The requirements for the displaying merchant vary, but typically involve a dedication to good security practices, or the use of secure methods for transactions, or most importantly verified existence of the company. Trust seals can come in a variety of forms, including data security seals, business verified seals and privacy seals and are available from a variety of companies, for a fee. A trust seal can be either active or passive. Most seals are validated when they are created and remain so for a specific duration of time, post expiry of which the business/process has to be re-validated.

Data breach Intentional or unintentional release of secure information

A data breach is a security violation, in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so. Other terms are unintentional information disclosure, data leak, information leakage, and data spill. Incidents range from concerted attacks by individuals who hack for personal gain or malice, organized crime, political activists or national governments, to poorly configured system security or careless disposal of used computer equipment or data storage media. Leaked information can range from matters compromising national security, to information on actions which a government or official considers embarrassing and wants to conceal. A deliberate data breach by a person privy to the information, typically for political purposes, is more often described as a "leak".

Robert Siciliano

Robert Siciliano is an American security analyst, author and media personality. He delivers presentations throughout the United States and Canada on identity theft protection and personal security, including self-defense.

WOT Services Website reputation service

WOT Services is the developer of MyWOT, an online reputation and Internet safety service which shows indicators of trust about existing websites. The confidence level is based both on user ratings and on third-party malware, phishing, scam and spam blacklists. The service also provides crowdsourced reviews, about to what extent websites are trustworthy, and respect user privacy, vendor reliability and child safety.

Trellix is a privately held cybersecurity company founded in 2004. It has been involved in the detection and prevention of major cyber attacks. It provides hardware, software, and services to investigate cybersecurity attacks, protect against malicious software, and analyze IT security risks.

<i>H*Commerce</i> Film by Seth Gordon

H*Commerce: The Business of Hacking You is a six-part online documentary film series directed by Seth Gordon. It centers on the struggle between criminal hackers and security experts. Each segment is between five and eight minutes in length. The first was released on the Internet on May 20, 2009.

Operation Aurora was a series of cyber attacks conducted by advanced persistent threats such as the Elderwood Group based in Beijing, China, with ties to the People's Liberation Army. First publicly disclosed by Google on January 12, 2010, in a blog post, the attacks began in mid-2009 and continued through December 2009.

NCH Software

NCH Software is an Australian software company founded in 1993 in Canberra, Australia. The Colorado office was started in April 2008 due to the large U.S. customer base. The firm primarily sells to individuals via its website.

On August 31, 2014, a collection of almost 500 private pictures of various celebrities, mostly women, with many containing nudity, were posted on the imageboard 5chan, and later disseminated by other users on websites and social networks such as Imgur and Reddit. The leak has been popularly dubbed The Fappening and also Celebgate. The images were initially believed to have been obtained via a breach of Apple's cloud services suite iCloud, or a security issue in the iCloud API which allowed them to make unlimited attempts at guessing victims' passwords. Apple claimed in a press release that access was gained via spear phishing attacks.

The following outline is provided as an overview of and topical guide to computer security:

Norton, formerly known as Norton by Symantec, is a division of NortonLifeLock, and is based out of Mountain View, California. Since being acquired by the Symantec Corporation in 1990, Norton offered a variety of products and services related to digital security. In 2014, it was announced that Norton's parent company Symantec would split its business into two units - one focused on security, and one focused on information management, with Norton being placed in the unit focused on security.

In July 2015, a group calling itself "The Impact Team" stole the user data of Ashley Madison, a commercial website billed as enabling extramarital affairs. The group copied personal information about the site's user base and threatened to release users' names and personally identifying information if Ashley Madison would not immediately shut down. On 18 and 20 August, the group leaked more than 60 gigabytes of company data, including user details.

References

  1. "CD Universe Novelties". CD Universe. Retrieved 2014-11-12.
  2. "Yellow Pages Listing". YP Intellectual Property LLC . Retrieved 2014-11-12.
  3. "Better Business Bureau". BBB Serving Connecticut . Retrieved 2014-11-12.
  4. "Highbeam Business". HighBeam Business. Archived from the original on 2014-11-12. Retrieved 2014-11-12.
  5. 1 2 Hansell, Saul (17 December 2001). "Technology & Media; For Some Dot-Coms, There Are Real Profits". The New York Times . Retrieved 12 November 2014.
  6. "Neurotic Media". Neurotic Media LLC. Archived from the original on 2017-04-27. Retrieved 2014-11-12.
  7. "Charles Beilman". LinkedIn.
  8. "Room to Read Charity". Room to Read. Archived from the original on 2016-03-03. Retrieved 2014-11-12.
  9. "American Red Cross". The American Red Cross. Archived from the original on September 4, 2016. Retrieved 2014-11-12.
  10. Wolverton, Troy (January 2, 2002). "AmEx, Discover forced to replace cards over security breach". CBS Interactive Inc. Archived from the original on April 2, 2015. Retrieved 2015-03-13.
  11. Markoff, John (10 January 2000). "Thief Reveals Credit Card Data When Web Extortion Plot Fails". The New York Times . Retrieved 13 March 2015.
  12. Newton, Michael (2004). The Encyclopedia of High-tech Crime and Crime-fighting . Infobase Publishing. Newton, Michael (2004). The Encyclopedia of High-tech Crime and Crime-fighting.
  13. "McAffee Certification Check". McAfee . Retrieved 2015-03-13.
  14. "Norton Website Rating". Symantec Corporation . Retrieved 2015-03-13.