This is one of those breaches where I really don’t blame the company, which in this case is Minnesota-based Ingenix. Ingenix provides web-based lookups so that patients can find providers in their area covered by their health plan. The provider data Ingenix uses is provided by the health plans or preferred provider plans themselves. Ingenix…
Category: U.S.
AT&T iPad hackers’ chats were turned in by secret source
Robert McMillan reports: Rhe government’s case against two men charged with hacking into AT&T’s website to steal e-mail addresses from about 120,000 iPad users got a boost last year when a confidential source handed over 150 pages of chat logs between the two and other members of their hacking group. Excerpts from the logs, published…
Running an ID theft ring from inside prison adds 14 years to sentence
A man who lead an identity-theft ring that ran up a quarter-million dollars worth of charges from inside a federal prison – and who continued the criminal activity even after pleading guilty to the charges – as sentenced to more than 14 years in prison, Steven M. Dettelbach, United States Attorney for the Northern District…
SC: Restaurant Customers’ Credit Card Info Stolen
A popular Rock Hill restaurant is the one common thread in a growing number of credit card fraud cases. … So far, more than 30 patrons have reported unexplained charges on their credit cards from states around the Southeast. The victims all ate at Michael’s Rock Hill Grille from Sept. 16 through Nov. 2, with…
Tulane University’s breach report to the NH AG’s Office
As an update to the Tulane University incident where a laptop with W-2 data was stolen from an employee’s car while he was traveling out of town: Tulane’s notification to the New Hampshire Attorney General’s Office provides some additional details on the incident. The employee had the data on a laptop because he was supposed…
Experian catches ’em, but how do you prevent ’em?
I just read yet another breach report Experian filed with the New Hampshire Attorney General’s Office. The sequence generally goes like this: Someone acquires the Experian login for one of Experian’s clients. The login is misused to access credit report and info on people. The breach is discovered. Login is changed. The individuals are notified…