Tracy Kitten writes: Michigan-based Experi-Metal Inc. and Comerica Bank headed to court this month. Their case is the first major corporate account takeover incident to actually go to trial. The two parties now appear before the U.S. District Court of Michigan to debate how much responsibility EMI should assume for the takeover of its bank…
Author: Dissent
“Ballsy” ID thief gets nine years for ripping off 750 victims
Laura Italiano reports the follow-up to a case previously reported on this blog: When 28-year-old Iguosade Osahon was busted last summer for stealing the IDs of 750 victims across the country, the eloquent crook conceded to cops, “What can I say? You’ve got me by the balls.” His words proved prophetic: Today, Osahon — who…
Ophthalmologist Charged in Health Care Fraud Scheme Involving More Than $3 Million in Fraudulent Claims
A press release from the FBI, below, raises questions not only about fraud, but false notations in patients’ charts about treatment and the security of their charts. I am pleased to see that HHS was involved in this investigation and just wonder whether any corrective plan has been issued for the Temple University School of…
North Carolina's Department of Health and Human Services Alerts Clients of Missing Records
George Crocker reports: North Carolina’s Department of Health and Human Services (DHHS) says a set of computer disks belonging to the Division of Services for the Deaf and the Hard of Hearing (DSDHH) may have been accidentally discarded and taken to a landfill during a recent office renovation. The agency is alerting it’s (sic) clients…
Pointer: A critique of Ponemon Institute methodology for “churn”
I’m delighted that Adam Shostack has posted a critique of a study that is often cited as support for the claim that data breaches cause brand harm: Ponemon’s US Cost of Data Breach Study. As background, some of us have been discussing on Twitter, blogging, and otherwise debating whether data breaches do, in fact, cause…
Trustwave 2011 Global Security Report Reveals Shift in Cybercrime
Missed apress release from Trustwave last week, but worth noting: Today Trustwave unveiled its 2011 Global Security Report, which reveals the target of attacks has shifted from traditional infrastructure to mobile users and endpoint devices. This trend combined with the popularity of mobile devices and social media is providing the perfect recipe for cybercriminals looking…