Catalin Cimpanu reports: The Japanese government approveda law amendment on Friday that will allow government workers to hack into people’s Internet of Things devices as part of an unprecedented survey of insecure IoT devices. The survey will be carried out by employees of the National Institute of Information and Communications Technology (NICT) under the supervision…
Category: Commentaries and Analyses
Data leak: Breach too far
NST reports: IT has happened again. This time at Universiti Teknologi Mara (UiTM) where records of just over a million students have been leaked. Is it an inside job? Hard to tell, but UiTM is probing. UiTM sources contacted by the New Straits Times say it may just be put together from multiple sources by…
Why doesn’t Twitter have a way to notify them of leaks or concerns outside of a bug bounty program?
L33tdawg writes: Twitter has owned up to a privacy goof that exposed some Android users’ private tweets. That would be bad enough if the problem existed for an hour, or a day, or a month. But unfortunately for Twitter (and affected users) the problem was present from November 3 2014 until January 14 2019. That’s…
North Carolina AG re-introduces legislation to protect against identity theft
Back in January, 2018, North Carolina Attorney General Josh Stein and state Rep. Jason Saine (R) introduced legislation called “Act to Strengthen Identity Theft Protections.” In January, 2019, they’ve reintroduced it. A press release from the Attorney General explains: Attorney General Josh Stein and Rep. Jason Saine today unveiled legislation to strengthen North Carolina’s laws to prevent…
Providers Rise to Meet the Challenge of K–12 Data Security
Katelyn Sweeney reports: As data becomes integral to K–12 education, administrators face new challenges to ensure they keep students’ information safe. Analysis of student data allows educators to identify at-risk students and implement further research into what does and does not work in the classroom. This data can also be used to create student profiles,…
DoD Health Agency Security Flaws Put Patient Data at Risk, OIG Finds
Jessica Davis reports: The Department of Defense Health Agency (DHA) failed to consistently implement security measures to protect the systems that stored, processed, and transmitted electronic health record and patient information, according to a DoD Office of Inspector General report released this week. The report found DHA and Army officials didn’t enforce the use of Common…