Kevin Amerman reports: A former Allentown woman who sold personal information from Lehigh Valley residents that was used to purchase penis enlargements and breast implants for accomplices has admitted her role in the conspiracy. Carniola Santana, 25, was sentenced today to four years’ probation by Lehigh County Judge Robert L. Steinberg immediately after she pleaded…
Month: November 2009
JP: Data leaked on mixi game users
A system bug in a popular farming game on the mixi social networking site led to personal details of as many as 4,200 users being leaked online, it has been learned. Phone numbers and e-mail addresses of users who made credit card purchases of special items in the Sunshine Bokujo (Sunshine stock farm) game were…
PA: Pandemic vs. privacy
JoAnn Seltzer reports: A proposal to allow the health board to establish penalties and remedies in pandemics drew questions by the City Council Monday. During a workshop session, Councilman Dick Dornisch said he has problems with the proposed ordinance. It would give the health board powers to prevent and control the spread of the disease….
EU: Telcos’ data breach notification amendment is passed
From Out-Law.com: The European Council has approved a data breach notification rule for Europe’s telecoms firms. The amendment to an EU Directive will force telcos to tell customers if they lose their data. The European Parliament and Commission have already approved the amendments, which will become law after it has been published in the EU’s…
Heartland Payment Systems Reports Third Quarter Financial Results
Heartland Payment Systems, Inc. announced a GAAP net loss of $13.6 million or ($0.36) per share for the three months ended September 30, 2009. Results for the quarter are after $35.6 million (pre-tax), or $0.59 per share, of various expenses, accruals and reserves, all of which are attributable to the processing system intrusion, including charges…
New Trojan encrypts files but leaves no ransom note
Elinor Mills reports: Symantec is warning about a new Trojan horse that encrypts files on compromised computers but offers no ransom note like other software designed to hold data hostage for a fee. Instead, a Web search for terms related to the Trojan horse leads to a company offering a way to remove the malware….