DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Commentaries and Analyses

More details emerge on security concerns with Hillary Clinton’s private server

Posted on October 13, 2015 by Dissent

I know Clinton’s use of a private server has become a political issue, but it’s still also an infosec issue for our government. Jack Gillum and Stephen Braun of AP provide the latest revelations: Clinton’s server, which handled her personal and State Department correspondence, appeared to allow users to connect openly over the Internet to control it remotely, according…

Read more

Study sounds the alarm on real estate website scraping and data theft

Posted on October 9, 2015 by Dissent

Andrea V. Brambila reports: Agent and broker website vendors and MLSs have had more than a decade to figure out how to protect one of the industry’s most valuable assets from theft online, but most haven’t risen to the challenge. Therefore, it’s time to mandate scraping protections, according to a white paper from real estate consulting…

Read more

What you sound like after a data breach

Posted on October 9, 2015 by Dissent

Mark Stockley writes: Hopefully you’ve never had anything stolen in a data breach, but if you have I hope you’ve been spared the salted wound of the non-apology. There are notable exceptions of course but as data leaks and network breaches get larger, more common and more damaging, a humble sorry seems to be the hardest word. Read more…

Read more

Privacy Policies Matter… Whether You Read Them Or Not

Posted on October 9, 2015 by Dissent

Mark McGreary writes: New innovations come hand in hand with new privacy issues. Privacy policies may seem like a last minute add-on to some app developers but they are actually an important aspect of an app. Data breaches are an imminent risk and a business’s first defense to potential problems is a privacy policy. Fordham…

Read more

Clinton e-mails were vulnerable to hackers, tech firm warned

Posted on October 9, 2015 by Dissent

Tom Hamburger and Rosalind S. Helderman report: A technology subcontractor that has worked on Hillary Rodham Clinton’s e-mail setup expressed concerns over the summer that the system was inadequately protected and vulnerable to hackers, a company official said Wednesday. But the concerns were rebuffed by the company managing the Clinton account, Platte River Networks, which…

Read more

New EMV-chipped credit cards still vulnerable to fraudsters – FBI

Posted on October 8, 2015 by Dissent

A public service announcement from the FBI: By October 2015, many U.S. banks will have replaced millions of traditional credit cards, which rely on data stored on magnetic strips, with new credit cards containing a microchip known as an EMV chip. While EMV cards offer enhanced security, the FBI is warning law enforcement, merchants, and…

Read more
  • Previous
  • 1
  • …
  • 641
  • 642
  • 643
  • 644
  • 645
  • 646
  • 647
  • …
  • 874
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ireland’s Data Protection Commission publishes 2024 Annual Report
  • The headlines suggested Freedman Healthcare suffered a ransomware attack that affected patient data. The reality was quite different.
  • Runsafe report: Medical device cyberattacks threaten patient care, strain budgets, top concern for healthcare sector
  • Ryuk ransomware’s initial access expert extradited to the U.S. from Ukraine
  • Alleged Geisinger hacker will defend himself pro se.
  • Tallahassee Memorial Healthcare reveals it was also impacted by Cerner/Legacy Oracle cyberattack
  • Hospital cyberattack investigation complete, no formal review needed (1)
  • Largest Ever Seizure of Funds Related to Crypto Confidence Scams
  • IMPACT: 170 patients harmed as a result of Qilin’s ransomware attack on NHS vendor Synnovis
  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • US Judge Invalidates Biden Rule Protecting Privacy for Abortions
  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities
  • 23andMe fined £2.31 million for failing to protect UK users’ genetic data
  • DOJ Seeks More Time on Tower Dumps
  • Your household smart products must respect your privacy – including your air fryer
  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.