Dara Kam reports: More than two years after lawmakers created it, a statewide prescription drug database will go live Thursday, sort of. Pharmacists and dispensing practitioners must begin entering data for more than 100 prescription drugs with potential for abuse into the Prescription Drug Monitoring Program, or PDMP. But doctors won’t be able to access…
Month: August 2011
Veriphyr Survey Finds More Than 70 Percent of Healthcare Providers Suffered Privacy Breach in Past 12 Months
Saw this press release today and thought it worth mentioning here for its statistics: Veriphyr, a leading provider of Identity and Access Intelligence, today announced the results of new survey on Protected Health Information (PHI) privacy breaches. According to the findings, more than 70 percent of the organizations in the study have suffered one or…
Oakland man sentenced for aggravated identity theft and credit card fraud
Douglas A. Reeves was sentenced today to eight years and five months in prison and ordered to pay restitution forcredit card fraud and identity theft, United States Attorney Melinda Haag announced. Reeves pleaded guilty on May 11, 2011, to possession of unauthorized credit card information and aggravated identity theft. According to the plea agreement, in October 2009, Reeves possessed several…
PA: 2 charged in $290,000 identity theft scheme (updated)
Michael Hinkelman reports: Two Philadelphia men, including an employee of a health insurance company, were charged today with stealing the identities of 86 people in a scheme that netted them nearly $290,000, federal authorities said. An indictment alleges that Kenneth C. Osbourne, Jr., 35, used his position as a customer service representative at AmeriHealth Administrators,…
23,000 passwords stolen in Star Wars Galaxies fan site hack
Jay writes: A small force has managed to infiltrate a Star War Galaxies fan site – smuggling and publishing 21,000 email addresses and 23,000 gamer passwords. Rebellious hacking group ObSec claim the attack on the fan-run website, which is unofficially linked to LucasArts and Sony’s popular Massively Multiplayer Online Role Playing Game, which ends its Saga…
Hiding in Plain Sight: Post-Breach
Gunter Ollmann writes: The majority of network breaches begin and end with the installation of malware upon a vulnerable device. For the rest, once that initial malware beachhead has been achieved, the story is only just beginning. The breach disclosures that make the news are often confusing as they’re frequently compiled from third-hand reports, opinions…