If you’re going to publicly name and/or dox someone you suspect of sexual assault, you’d better be right, as the potential harm to them is enormous. And if you’re going to publicly name and/or dox someone you suspect of sexual assault, should it matter whether the victim has decided not to pursue the matter? Could…
Category: Commentaries and Analyses
Q3 2015 Data Breach QuickView Report – A Record Breaking Year in the Making
From Risk Based Security: Risk Based Security is pleased to announce the release of the Q3 Data Breach QuickView report. It has been a busy year in terms of activity, with over 3,000 data breaches reported in the first three quarters of 2015. The higher than usual breach activity began early with the first quarter…
E-health opt-out records a ‘huge invasion of privacy’
Corinne Reichert reports: The Australian Privacy Foundation has accused the Senate of being “dangerously naive” in thinking that opt-out e-health records could be secured against breaches of privacy. Bernard Robertson-Dunn, a member of the Privacy Foundation who has also constructed IT systems for several government departments, said it is “patently absurd” for the Senate inquiry…
Bitdefender releases automated decryption tool for files locked up by Linux.Encoder.1
Steve Ragan reports that Bitdefender has figured out how to decrypt files and backups encrypted by Linux.Encoder.1, the latest ransomware causing havoc for sites. …. Exploiting this fundamental weakness, Bitdefender released a tool that will automatically decrypt any files on a victim’s system that were targeted. The tool and instructions are available on Bitdefender’s post, the…
Standing in Data Breach Cases: A Review of Recent Trends
Robert D. Fram, Simon J. Frankel and Amanda C. Lynch of Covington & Burling write: For most substantial companies, it is said, experiencing a data breach is not a matter of “if,” but “when.” Particularly when a company is consumer-facing, any publicized data breach is likely to be followed by consumer class action lawsuits. For…
A Closer Look at CISA’s Cybersecurity Information-Sharing Provisions
David Fagan, Ashden Fein and David Bender write: As we reported on October 27, the U.S. Senate passed the Cybersecurity Information Sharing Act (“CISA,” S. 754). If enacted into law, CISA would, among other things, establish a voluntary framework for the sharing of cybersecurity threat information between and among the federal government and private entities. CISA must…