DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Commentaries and Analyses

Bitdefender releases automated decryption tool for files locked up by Linux.Encoder.1

Posted on November 9, 2015 by Dissent

Steve Ragan reports that Bitdefender has figured out how to decrypt files and backups encrypted by Linux.Encoder.1, the latest ransomware  causing havoc for sites.   …. Exploiting this fundamental weakness, Bitdefender released a tool that will automatically decrypt any files on a victim’s system that were targeted. The tool and instructions are available on Bitdefender’s post, the…

Read more

Standing in Data Breach Cases: A Review of Recent Trends

Posted on November 9, 2015 by Dissent

Robert D. Fram, Simon J. Frankel and Amanda C. Lynch of Covington & Burling write: For most substantial companies, it is said, experiencing a data breach is not a matter of “if,” but “when.” Particularly when a company is consumer-facing, any publicized data breach is likely to be followed by consumer class action lawsuits. For…

Read more

A Closer Look at CISA’s Cybersecurity Information-Sharing Provisions

Posted on November 9, 2015 by Dissent

David Fagan, Ashden Fein and David Bender write: As we reported on October 27, the U.S. Senate passed the Cybersecurity Information Sharing Act (“CISA,” S. 754).  If enacted into law, CISA would, among other things, establish a voluntary framework for the sharing of cybersecurity threat information between and among the federal government and private entities.  CISA must…

Read more

We’ve Never Seen a Stolen Credit Card Market as Slick as This

Posted on November 9, 2015 by Dissent

Joseph Cox reports: Buying stolen credit cards can be a fairly drab affair. Apart from the obnoxious flashing banner ads strewn across the top of many fraud and criminal websites, often there’s not much going for them when it comes to presentation. But one site changes all of that completely. Called “Central Shop,” the site…

Read more

If the ransomware doesn’t get you, the DDoS might (UPDATE4)

Posted on November 9, 2015 by Dissent

Extortionists are busier than ever. This past week saw more reports on ransomware that corrupts files even if you pay the ransom, and DDoS attacks so powerful that usual defenses may be inadequate. Brian Krebs reports: One of the more common and destructive computer crimes to emerge over the past few years involves ransomware — malicious code that…

Read more

Challenging FTC Regulation of Cyber-security After FTC v. Wyndham

Posted on November 6, 2015 by Dissent

Gerald J. Ferguson and of Alan L. Friel of Baker & Hostetler write: The Third Circuit interlocutory decision in Federal Trade Commission v. Wyndham Worldwide Corporation was widely reported as a big win for the Federal Trade Commission (“FTC”). But on closer examination, it was a split decision in which Wyndham Worldwide Corporation (“Wyndham”) can claim an…

Read more
  • Previous
  • 1
  • …
  • 655
  • 656
  • 657
  • 658
  • 659
  • 660
  • 661
  • …
  • 896
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.