Gus Hurwitz has a slightly different take on the Third Circuit’s opinion in FTC v. Wyndham. On the issue of notice, he writes, in part: The court goes on to find that Wyndham had sufficient notice of the requirements of Section 5 under the standard that applies to judicial interpretations of statutes. And it expressly notes…
Category: Commentaries and Analyses
Audit: California agencies vulnerable to IT security breach
Juliet Williams of AP reports: Many California state agencies are not complying with the state’s information technology standards, leaving them vulnerable to a major security breach of sensitive data such as Social Security numbers, health information or tax returns, the state auditor reported Tuesday. “Our review found that many state entities have weaknesses in their…
John McAfee: Ashley Madison database stolen by lone female who worked for Avid Life Media
John McAfee opines: Yes, it is true. Ashley Madison was not hacked – the data was stolen by a woman operating on her own who worked for Avid Life Media. The reason that I am so late to the second act of the Ashley Madison affair is that, without a supercomputer, it has taken over…
Ashley Madison search sites like Trustify are harvesting email addresses and spamming searched victims
Troy Hunt writes: To date, I’ve avoided commenting on the other Ashley Madison search services and have invested my efforts purely in keeping Have I been pwned? (HIBP) ticking along. I’ve seen them come and indeed I’ve seen some of them go too. I’ve seen many that enable you to get confirmation about the presence of an…
Notification of security breach via Twitter?
If your business has a Twitter account, do those responsible for it know how to respond to tweets informing them of a data security breach? I haven’t compiled any hard data, but it seems to me that less than 5% of attempts to notify companies of breaches via their Twitter team results in any acknowledgement….
The OPM breach details you haven’t seen
Sean Lyngaas reports: An official timeline of the Office of Personnel Management breach obtained by FCW pinpoints the hackers’ calibrated extraction of data and the government’s step-by-step response. It illuminates a sequence of events that lawmakers have struggled to pin down in public hearings with Obama administration officials. The timeline makes clear that the heist…