Over the years, there have been numerous occasions when I’ve called a doctor’s office or service to alert them to a data leak or HIPAA breach. In some cases, I’ve reached office staff. In other cases, it may be an answering service. All too often, however, most of the people who have taken my calls…
Category: Commentaries and Analyses
Two more leaks expose Indian citizens’ personal and medical information
This week, DataBreaches.net learned that a civil court in Bengaluru had issued a preliminary junction prohibiting this site from publishing anything about a data security incident involving 1to1Help.net. This site received notice of the injunction five days after the article appeared. At the same time, I learned that 1to1Help.net had filed a criminal complaint against…
Education software glitch gives predators easy access to school kids
Christopher Harris reports: Australia’s top cyber safety boss has warned that strangers can directly contact students via a privacy glitch in education software, which is available to every public school student in NSW. The loophole allows predators to verify a student’s email using Google Hangouts and then contact them directly or by sharing a Google…
1to1Help.net gets injunction against DataBreaches.net; Seeks criminal charges against blogger
From the you-really-should-have-read-my-About-page dept: In today’s episode of “Shoot the Messenger,” a company in India that apparently didn’t want me reporting on their data leak got a court there to issue an injunction barring me from publishing. They also filed a criminal complaint against me and this blog based on what appears to be a…
AU: Top cyber security agency to brief universities
Shannon Jenkins reports: Australia’s vice-chancellors will receive a high-level cyber security briefing from the Australian Signals Directorate (ASD). The briefing will update universities on the latest security risks and ways to bolster their cyber security. Universities must have stronger defences in place, according to the Minister for Education, Dan Tehan. Read more on The Mandarin….
With warshipping, hackers ship their exploits directly to their target’s mail room
Zack Whittaker reports: Why break into a company’s network when you can just walk right in — literally? Gone could be the days of having to find a zero-day vulnerability in a target’s website, or having to scramble for breached usernames and passwords to break through a company’s login pages. And certainly there will be…