So I’ve just read the proposed legislation for revising Washington State’s data breach notification law (see the WA AG’s press release on the proposal here). A few comments/observations on the bill: 1. The bill eliminates the word “computerized” before “data,” thereby seemingly expanding the data breach notification requirements to paper records or other formats. That…
Category: Commentaries and Analyses
NAFCU Deems Data Encryption Rule Unnecessary
Nicholas Ballasy reports: The NCUA should look internally for ways to better protect credit union members’ data, rather than impose a new rule, according to NAFCU Director of Regulatory Affairs Alicia Nealon. Nealon’s statement was made in response to NCUA Board Chairman Debbie Matz floating the possibility of a proposed data encryption rule after an agency…
Verifying leaks uncovers “fake leaks”
Posted by @Cyber_War_News to Pastebin today: Today has been interesting, to say the least. Skipping all the bullshit lets get right to the main stinky shit. Anonymous twitter user @AnonymousGlobo announced earlier today this: https://twitter.com/AnonymousGlobo/status/547426305151860736 https://twitter.com/AnonymousGlobo/status/548537460691857408 Now after working with data leaks for years now it became clearly obvious to me that this was fake….
World’s Biggest Data Breaches
Ooh, pretty. Look what the folks at Information is Beautiful did with data from DataBreaches.net and the Identity Theft Resource Center: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
Throwing Money at Data Breach May Make It Worse – Survey
From the University of Arkansas on Newswise: Information systems researchers at the University of Arkansas, who studied the effect of two compensation strategies used by Target in reaction to a large-scale data breach that affected more than 70 million customers, have found that overcompensation of affected customers may only raise suspicions rather than satisfy customers’…
Entry Point of JPMorgan Data Breach Is Identified
Oops. An overlooked server that was not configured for two-factor authentication became the weak link in JPMorgan’s defenses. Matthew Goldstein, Nicole Perlroth, and Michael Corkery report: The computer breach at JPMorgan Chase this summer — the largest intrusion of an American bank to date — might have been thwarted if the bank had installed a simple…