In the justice system: John Shiefer, the Los Angeles computer security consultant who turned thousands of computers into zombies, was sentenced to four years in prison. More. Four Arizona men accused of spending more than $1 million using stolen credit cards are being held in a Maricopa County jail; they allegedly obtained the card numbers…
Category: Business Sector
Ca: Tenants’ private data available on Internet
John Goddard of The Toronto Star reports that private information about 1,393 tenants — including names, addresses, phone numbers, social insurance numbers, mental health issues, children’s names, ages, where the children go to school, and landlord disputes — could be accessed online in a database maintained by Landlord’s Source Centre. A tenant discovered the problem…
FL: Personal info on computers stolen from repair shop
Dozens of families in Volusia County had their personal information stolen when computers were stolen from a repair shop, Instant IT. And the repair shop discovered it may not have insurance to cover the theft…. Read more on WFTV
Concerns over increase in Facebook hacking
Computer experts called today for Facebook to review its security processes after the social networking website was hit by hackers five times in a week. Four separate “rogue applications” and a virus targeted users of the site, according to security firm Trend Micro. Although there is no evidence that people’s personal details were stolen by…
Spotify breach creates password hack risk
John Leyden reports: Popular online music service Spotify has warned of a security breach that may have exposed user passwords and other sensitive data. A notice – posted on Wednesday – explains that a bug in Spotify’s protocols that was recognised and resolved in December was more serious than first suspected. Last week Spotify learned…
T-Mobile case update: indicted men were not employees
As an update to the story here: A spokesperson for the U.S. Attorney’s Office informs me that the 5 men who were indicted today were not employees of T-Mobile. They allegedly accessed and acquired the customer data via an authorization code that they obtained from the owner of a T-Mobile store. The owner of that…