John Matarese reports that a number of employees of Cincinnati Eye Institute have discovered that their identity information has been misused by criminals filing for tax refunds. While CEI claims that any breach does not involve their system, they are offering their employees credit monitoring protection services. At the present time, it’s not clear whether a business associate…
Month: March 2017
Three Mobile hack affected 76,000 more customers than thought
Cara McGoogan reports: Three Mobile has said that 76,373 more customers were affected in the data breach revealed by the Telegraph last year. The figure brings the total number of people whose information was compromised by cyber criminals to 210,200, up 57 per cent on the company’s initial estimates. Read more on The Telegraph.
City erases, re-installs server after ransomware attack
Scott Liles reports: A cyber attack on the server of the Mountain Home Water Department led to the city refusing to pay a ransom and wiping the machine, Water Department Director Alma Clark said. The server was re-installed from a backup created the night before and no information was lost or stolen, Baxter County Computer Services…
NZ: Patient data system disabled after problem discovered
Eileen Goodwin reports: A new patient information system used by general practitioners had to be disabled yesterday because of a risk of data breach. The Otago Daily Times learned about the situation in a leaked email to southern GP practices. The patient information system has been introduced over the past couple of months to many GP practices…
AU: Hackers steal thousands after Queensland School Photography targeted online
Kristian Silva reports: Hackers have targeted a school photography company, with fraudsters making transactions around the world using the credit card details of Queensland parents. Queensland School Photography began emailing students’ parents on Thursday to warn of the hack, but it was not clear how widespread the security breach is or how much was stolen….
US military leak exposes ‘holy grail’ of security clearance files
Zack Whittaker reports: A unsecured backup drive has exposed thousands of US Air Force documents, including highly sensitive personnel files on senior and high-ranking officers. Security researchers found that the gigabytes of files were accessible to anyone because the internet-connected backup drive was not password protected. The files, reviewed by ZDNet, contained a range of…