The Macau Daily Times reports: Hong Kong’s ambitions to be an international data-center hub are a potential casualty of the city’s mass protests. […] Last month, dozens of protesters were arrested after being treated in the emergency ward of a public hospital following battles with riot police. The city’s Hospital Authority subsequently denied leaking patient…
Category: Commentaries and Analyses
Attackers Break Into Home of Investigative Journalist, Kill Her Dogs and Steal Her Reporting Records
Chantal Da Silva reports: The Committee to Protect Journalists is calling on Mexican authorities to “immediately and credibly” investigate an attack on a nationally-renowned investigative journalist’s home that saw her two dogs killed and her reporting records stolen. According to the CPJ, a number of unidentified individuals broke into investigative reporter Lydia Cacho Ribeiro’s home…
UK: MoD reports number of computers and documents lost has trebled in last year
Keir Mudie reports: The number of computers and documents lost from secure government sites has almost trebled in the last year. Data breaches leapt from 117 to 463 and missing electronic devices or paper documents rose to 62 from 22 the year before, an official Ministry of Defence report revealed. It pointed out new rules mean more…
New York Becomes Fifth State to Define a Breach to Include “Access” to Information
Daniel De Zayas, a legal intern at ZwillGen, writes: New York has updated its breach notification and data security law, expanding the definition of a data breach and imposing detailed reasonable security requirements, among other changes. The amendment also adds a number of new data elements to the definition of “private information.” On July 25,…
Attacking the Heart of the German Industry
Hakan Tanriverdi, Svea Eckert, Jan Strozyk, Maximilian Zierer, and Rebecca Ciesielski report: This investigation starts with a code: daa0 c7cb f4f0 fbcf d6d1. If you know what to look for, you’ll find Winnti. Hackers who have been spying on businesses all over the world for years. A group, presumably China-based, has honed in on Germany…
Health IT companies impacted by browser extension data leak: report
Heather Landi reports: Browser extensions, also known as add-ons or plug-ins, are commonly used by desktop Web surfers to do things ranging from blocking ads to remembering passwords to checking grammar. According to an independent security researcher, some extensions have been leaking and exposing browsing activity data, including patient names and health information from healthcare…