IRS Hacked, 101K PINs For Electronic Tax Filing Stolen (aka, What’s New?).

According to csoonline.com, the IRS had to block unknown persons or person who was downloading a massive trove of PINs used for electronic tax filing: The attack occurred in January and targeted an IRS Web application that taxpayers use to obtain their so-called Electronic Filing (E-file) PINs. The app requires taxpayer information such as name, […] read more

College Professor’s Laptop Stolen From Car, Causes Data Breach.

They say that car break-ins are a crime of opportunity: not even the thieves know when or where it will happen, or which car or what types of articles will be filched. Well, I’ve just run across the ultimate opportunistic crime: Westmont College, in California, has announced that a professor’s laptop computer was stolen while […] read more

Maybe FTC Should Take To Task Breached Companies Claiming To Take "Security Seriously".

Apparently, 2015 is the year when everything old is new again: the encryption wars are back and gaining acceleration; TV shows and movies that were laid to rest are rising from their graves; and classic data breaches are raring their heads as well. For example, the site databreaches.net notes that Human Resource Advantage sent an […] read more

Data Breach Law: Wyoming Updates Laws On Data Privacy.

Wyoming has approved two Senate bills that update the state’s data privacy laws.  Senate Files 35 and 36 expand on the definition of what constitutes a breach of personal information, and what steps organizations must take when a data breach takes place.  Missing from the update: a safe harbor clause that would protect organizations if […] read more

HIPAA Encryption: Anthem Didn’t Encrypt Data Stolen In Massive Hack.

The wsj.com points out in an article that Anthem Inc, the health insurer that recently announced a massive data breach potentially affecting 80 million people, did not use health data encryption to secure the data that was stolen.  It also points out that applying encryption can be a “balancing act between protecting the information and […] read more