Cyrus Farivar reports: On June 13, 2017, Mark Jaffe is set to appear before the 9th US Circuit Court of Appeals in San Francisco to argue on behalf of his client, journalist Matthew Keys. And at the most recent Ars Live event, Jaffe spoke to David Kravets and me about this case and broader issues…
Category: Commentaries and Analyses
Federal Trade Commission Plans to Clarify its Data Security Standard
Weiss Nusraty writes: The Federal Trade Commission (FTC) has announced that it is launching a new initiative to improve data security guidance and transparency as part of a broader plan to implement process reform initiatives. In an interview with Politico Pro (subscription required) last week, the new acting director of the FTC’s Bureau of Consumer…
A Heart-to-Heart from the Hackers: Cyber-Vulnerabilities in Cardiac Devices
Robert Radick writes: Just over a year ago, this blog took note of a governmental letter that powerfully underscored the dangers of cyberattacks in the healthcare industry. The letter, which then-Senator Barbara Boxer had sent to FBI Director James Comey, discussed the serious risks that hospitals and other institutional health care providers face from cyberattacks,…
#AadhaarLeaks: A list of Aadhaar data leaks
I started covering Aadhaar years ago on PogoWasRight.org as a data protection mega-disaster waiting to happen. Those early posts are no longer available online, but I’ve continued to watch for news on its implementation and concerns. And while India’s government keeps reiterating that everything is secure and fine, I keep seeing breach/leak reports. So I…
Healthcare records for sale on Dark Web
Ryan Francis reports on the cost of a medical record on the dark web, and it’s nice to see Flashpoint agreeing with what some of us have been saying for a while now – that the cost is generally about $1 per record – not the $200 figure you may have read in earlier reports…
Young cyber criminals motivated by peer respect and accomplishment
The National Crime Agency has today published research into how and why some young people become involved in cyber crime. The report, which is based on debriefs with offenders and those on the fringes of criminality, explores why young people assessed as unlikely to commit more traditional crimes get involved in cyber crime. The report…