The Korea Times is reporting that two executives at STX Heavy Industries, based out of South Korea, were arrested this past Friday on charges of stealing key technology from their former employer, Doosan Heavy Industries & Construction. The technology in question was related to desalination and power generation. Doosan is one of the lesser known […] read more
Data Center In Chicago Is Broken Into (Twice!): Why Hard Disk Encryption Should Be Considered Even When You’ve Got Cages and Security Guards.
An article in theregister.co.uk mentions how a Chicago-based data hosting center, C I Host, was broken into twice. The more recent case was about a month ago, on October 2nd, when armed robbers (!) broke into the facility by “cutting into the reinforced walls with a power saw.” The night manager present was tasered and […] read more
Salesforce.com has recently issued an alert to their customers, letting them know that a Salesforce.com employee was the victim of a phishing scam. This allowed the phishers to copy Salesforce.com customer contact list which was subsequently used for sending e-mails that looked like Salesforce.com invoices, but designed to collect passwords. Perhaps this was an exploratory […] read more
Data Protection: Need, Right, And Time Should Be Extended To Mobile Devices Such As Laptops For Better Security.
In a Government Technology article, an argument is made that access to data should be granted on a need, right, and time basis. Now, this is not a new argument, and it was directed to securing databases and their contents. The argument is that not everyone needs to have access to information on a […] read more
Eight thousand students and applicants to Duquesne University narrowly avoided becoming victims to a data breach. Or, rather, they avoided becoming victims to personal information peddlers. A file containing mostly students’ financial information was sent by mistake to a Duquesne student, who promptly reported the incident to university officials. The information included Social Security numbers […] read more
The Infotech section of the India Times on-line recently carried an article where an insider leaked software code to a rival team. I’m not sure if actually happened, or if it’s just a what-if scenario, but it is readily believable. In fact, I’ll bet it’s not unusual, although I doubt it’s common. Essentially, the insider […] read more
While scanning the latest data security breach stories, I have noticed that a lot of them involve institutions of higher learning. Most of them involve theft of digital devices, mostly laptops. It’s only now that I’ve realized that a new school year has started just recently. Most of these cases are trivial, if you will. […] read more
Celebrities—be they rock stars or presidential candidates or that crazy guy in the corner screaming about the end of the earth—are ultimately people. They will get sick, and that means that they will have to go to a hospital at some point. Now, because there is a lot of sensitive and confidential patient data used […] read more
Over the past couple of months I have read short pieces here and there on researchers buying used hard drives from secondhand sources and testing to see whether previous data can be extracted using sophisticated software and other data recovery methods. The hard drives come from a variety of sources. Usually they are bought in […] read more
It looks like there isn’t a lot of media coverage, but there’s a small article in the Arkansas Democrat Gazette a hacker gained illegal access to servers for the Nature Conservancy. Personal information regarding 14,000 people may have been compromised, including employees and their families. Payroll information, including direct deposit bank account numbers, was part […] read more