Salesforce.com has recently issued an alert to their customers, letting them know that a Salesforce.com employee was the victim of a phishing scam. This allowed the phishers to copy Salesforce.com customer contact list which was subsequently used for sending e-mails that looked like Salesforce.com invoices, but designed to collect passwords. Perhaps this was an exploratory […] read more
Data Protection: Need, Right, And Time Should Be Extended To Mobile Devices Such As Laptops For Better Security.
In a Government Technology article, an argument is made that access to data should be granted on a need, right, and time basis. Now, this is not a new argument, and it was directed to securing databases and their contents. The argument is that not everyone needs to have access to information on a […] read more
Eight thousand students and applicants to Duquesne University narrowly avoided becoming victims to a data breach. Or, rather, they avoided becoming victims to personal information peddlers. A file containing mostly students’ financial information was sent by mistake to a Duquesne student, who promptly reported the incident to university officials. The information included Social Security numbers […] read more
The Infotech section of the India Times on-line recently carried an article where an insider leaked software code to a rival team. I’m not sure if actually happened, or if it’s just a what-if scenario, but it is readily believable. In fact, I’ll bet it’s not unusual, although I doubt it’s common. Essentially, the insider […] read more
While scanning the latest data security breach stories, I have noticed that a lot of them involve institutions of higher learning. Most of them involve theft of digital devices, mostly laptops. It’s only now that I’ve realized that a new school year has started just recently. Most of these cases are trivial, if you will. […] read more
Celebrities—be they rock stars or presidential candidates or that crazy guy in the corner screaming about the end of the earth—are ultimately people. They will get sick, and that means that they will have to go to a hospital at some point. Now, because there is a lot of sensitive and confidential patient data used […] read more
Over the past couple of months I have read short pieces here and there on researchers buying used hard drives from secondhand sources and testing to see whether previous data can be extracted using sophisticated software and other data recovery methods. The hard drives come from a variety of sources. Usually they are bought in […] read more
It looks like there isn’t a lot of media coverage, but there’s a small article in the Arkansas Democrat Gazette a hacker gained illegal access to servers for the Nature Conservancy. Personal information regarding 14,000 people may have been compromised, including employees and their families. Payroll information, including direct deposit bank account numbers, was part […] read more
I’ve recently been reading up on some opinion pieces regarding insurance for security data breaches. There seems to be some controversy regarding such insurance. A subsidiary of AIG insurance, for example, has been offering a policy called netAdvantage for some time now. Apparently, people have been signing up left and right in light of the […] read more
The Dark Continent Suffers from Cyberattacks, Just Like Any Other Country. Why They Need Data Encrytion.
Here’s a new twist on an old problem. Many of us associate phishing scams coming from some part of Africa. This is in no small part due to all the spam e-mails that, if we were to allow them to introduce themselves, we certainly would end up assisting them financially, for we might end up […] read more