The Infotech section of the India Times on-line recently carried an article where an insider leaked software code to a rival team. I’m not sure if actually happened, or if it’s just a what-if scenario, but it is readily believable. In fact, I’ll bet it’s not unusual, although I doubt it’s common. Essentially, the insider […] read more
While scanning the latest data security breach stories, I have noticed that a lot of them involve institutions of higher learning. Most of them involve theft of digital devices, mostly laptops. It’s only now that I’ve realized that a new school year has started just recently. Most of these cases are trivial, if you will. […] read more
Celebrities—be they rock stars or presidential candidates or that crazy guy in the corner screaming about the end of the earth—are ultimately people. They will get sick, and that means that they will have to go to a hospital at some point. Now, because there is a lot of sensitive and confidential patient data used […] read more
Over the past couple of months I have read short pieces here and there on researchers buying used hard drives from secondhand sources and testing to see whether previous data can be extracted using sophisticated software and other data recovery methods. The hard drives come from a variety of sources. Usually they are bought in […] read more
It looks like there isn’t a lot of media coverage, but there’s a small article in the Arkansas Democrat Gazette a hacker gained illegal access to servers for the Nature Conservancy. Personal information regarding 14,000 people may have been compromised, including employees and their families. Payroll information, including direct deposit bank account numbers, was part […] read more
I’ve recently been reading up on some opinion pieces regarding insurance for security data breaches. There seems to be some controversy regarding such insurance. A subsidiary of AIG insurance, for example, has been offering a policy called netAdvantage for some time now. Apparently, people have been signing up left and right in light of the […] read more
The Dark Continent Suffers from Cyberattacks, Just Like Any Other Country. Why They Need Data Encrytion.
Here’s a new twist on an old problem. Many of us associate phishing scams coming from some part of Africa. This is in no small part due to all the spam e-mails that, if we were to allow them to introduce themselves, we certainly would end up assisting them financially, for we might end up […] read more