Data Breach at LabCorp & Quest Diagnostics Tip of the Iceberg.

This week, two companies in the healthcare sector announced that their clients were affected by an information security breach. Both LabCorp and Quest Diagnostics were affected, and their data breaches can be traced back to AMCA (American Medical Collection Agency which also does business as Retrieval-Masters Creditors Bureau), a billing collections vendor. Many are pointing […] read more

Moody’s Downgrades Equifax “Because Of Data Breach”.

Equifax had a data breach, a preventable one (or so they say *), in 2017. It was the biggest in US (and world) history, a dubious honor that could potentially be retained for a good long while. The consequences of said breach? Until last week, the answer would have been “pretty much nil.” (* As […] read more

Seattle University Alerts Over 2000 Faculty & Staff Of Lost Laptop.

Seattle University announced a couple of weeks ago that an unencrypted laptop was lost while an employee was “commuting on the bus.” An IT investigation drew the conclusion that “an offline email cache file” contained Social Security numbers and other personal information for 2,102 current and former faculty, staff, and dependents. The story feels like […] read more

UK’s National Cyber Security Centre Publishes List of Commonly Used Passwords.

A blast from the past, from the 1990s to the early noughts to be more specific, made the news this week, courtesy of the National Cyber Security Centre in the United Kingdom. According to an analysis by the government organization, blink182 is among the most commonly used passwords in the world. This means that it’s […] read more

Verizon Tries To Settle Yahoo Data Breach For the Second Time.

Verizon, which acquired Yahoo in 2016 and renamed the business twice since (Oath, followed by Verizon Media), is attempting to settle the massive data breach the purple company admitted to shortly before being bought out. In January of this year, a settlement of $50 million was rejected by Judge Koh of the US District Court […] read more

“Lack of Harm” Doesn’t Prevent Zappos Lawsuit From Going Forward.

The US Supreme Court has rejected an appeal from Zappos regarding a lawsuit brought forth by customers. In 2012, the famed online shoe store (and Amazon subsidiary) announced it had suffered a data breach where approximately 24 million people were affected. Unsurprisingly, lawsuits were filed. Zappos has been arguing ever since that the lawsuits have […] read more

Canada NWT Laptop Not Encrypted Because It’s “Very Difficult To Encrypt”.

Approximately two weeks ago, Canada’s cbc.com reported on the theft of a government laptop with promises of more articles on the same in the weeks to come. Earlier this week, the last article was posted. The story is a doozy. To summarize, an employee with the Department of Health and Social Services (Northwest Territories, Canada) […] read more

California Looking To Label Biometric Data As “Personal Information”.

California was the first state in the US to pass a data breach notification law, all the way back in 2003. In the intervening fifteen years, all states have passed similar laws. The federal government has repeatedly attempted to pass one as well, so far without success. The need for federal legislation, one that would […] read more

Indiana Supreme Court To Judge If Government Can Force People To Decrypt Their Smartphones.

The issue of forced smartphone decryptions, as it pertains to Constitutionally protected rights, is gathering steam. According to various sites, Indiana’s Supreme Court will soon be listening to arguments on whether Fifth Amendment rights are being violated when the government forces suspects to unlock their encrypted smartphones (the Indiana Court of Appeals judged that it […] read more

Judge Says Biometric Locks Protected By 5th Amendment.

The battle over privacy in the digital age ratcheted up last week. According to a California judge, the Fifth Amendment – the right not to incriminate oneself – protects people from being forced to bypass a smartphone’s encryption via the use of irises, fingerprints, facial recognition, and other similar methods. Obviously, this means a warrant […] read more