DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Commentaries and Analyses

Shared passwords and the Computer Fraud and Abuse Act

Posted on October 16, 2015 by Dissent

Orin Kerr writes: Next week, a panel of the Ninth Circuit Court of Appeals (Thomas, Reinhardt, and McKeown) will hear oral argument in the second round of United States v. Nosal. This time around, the main question in the case is whether and when accessing an account using a shared password is an unauthorized access under the Computer…

Read more

CERT.pl report on “The Postal Group”

Posted on October 15, 2015 by Dissent

From CERT.pl: During the SECURE conference, we presented a talk outlining actions performed by a group of criminals, which we have called “The Postal Group”. Their name is derived from the fact that they masquerade their phishing attacks as messages from the post office. This phishing then leads to either cryptolocker or a banking trojan….

Read more

US taxman slammed: Half of the IRS’s servers still run doomed Windows Server 2003

Posted on October 14, 2015 by Dissent

Kieren McCarthy reports: Half of America’s Internal Revenue Service’s (IRS) servers are running Windows Server 2003, despite extended support for it ending in July. That’s according to a report by the Treasury Inspector General that took a look at the IRS’ $139m upgrade program. The report is distinctly unimpressed and notes that the IRS “did not follow established policies…

Read more

Aadhaar encryption protects privacy, will take eons to crack

Posted on October 14, 2015 by Dissent

Mahendra Singh & Rajeev Deshpande report: The Aadhaar system’s data collection and storage is strongly protected by sophisticated encryption processes to ensure biometric data does not leak either through private contractors running enrollment centres or at the central data servers that store the details. […] The encryption uses highest available public key cryptography encryption (PKI-2048…

Read more

Lauri Love fights extradition to US for allegedly hacking U.S. govt agencies

Posted on October 13, 2015 by Dissent

Bethany Horne reports that as expected, Lauri Love will be fighting attempts to extradite him to the U.S. to face hacking charges. The US alleges Love is a “sophisticated computer hacker” loosely affiliated with the Anonymous hacker collective, and that he “secretly infiltrated” computer systems used by a long list of government agencies including the Federal Reserve,…

Read more

HK: Response to Media Enquiries: Personal Data Leakage Involving the Contactless Credit Cards

Posted on October 13, 2015 by Dissent

The following statement was issued by the The Office of the Privacy Commissioner for Personal Data for Hong Kong: (13 October 2015) The Office of the Privacy Commissioner for Personal Data (“PCPD”) expresses concern over the possible personal data leakage involving the contactless credit cards issued by banks and commences a compliance check on this issue….

Read more
  • Previous
  • 1
  • …
  • 662
  • 663
  • 664
  • 665
  • 666
  • 667
  • 668
  • …
  • 896
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.