Kim Zetter reports: Before companies like Microsoft and Apple release new software, the code is reviewed and tested to ensure it works as planned and to find any bugs. Hackers and cybercrooks do the same. The last thing you want if you’re a cyberthug is for your banking Trojan to crash a victim’s system and…
Category: Commentaries and Analyses
Cracking Coverage Issues in Data Breach Cases
Joshua Mooney of White and Williams discusses court rulings involving insurance coverage for data breaches: …. General liability policies are the most popular candidate. The policies define “personal and advertising injury” in part as injury arising out of “oral or written publication, in any manner, of material that violates a person’s right of privacy,” as…
Editorial: NMSU should have reported theft sooner
Even though they acknowledge that the law allows 60 days to notify residents of a breach, the Las Cruces Sun-News took New Mexico State University to task for not notifying students sooner of a breach involving their personal information. Read their editorial here.
70% of finance apps vulnerable to input validation attacks
Help Net Security reports: A growing number of data breaches and security incidents can be directly linked to poor code quality, according to CAST. The data reveals finance and retail industry applications are the most vulnerable to data breaches, with 70 percent of retail and 69 percent of financial services applications shown to have data input…
MD: Ride On officials investigate potential passenger privacy breach
Kevin Wilson reports on some great advocacy efforts by a parent: Is Montgomery County safely storing your child’s confidential information? A local mother says, “No.” Bethesda resident Kathy Gambrell became troubled while signing up her 12-year-old son, Dakota, for a discounted bus card. The pass, called the Youth Cruiser SmarTripcard, provides unlimited Ride On bus service to…
AU data breach notification guide: A guide to handling personal information security breaches
The Office of the Australian Information Commissioner has released Data breach notification guide: A guide to handling personal information security breaches. Some excerpts: Preventing data breaches — obligations under the Privacy Act Security is a basic element of information privacy.4 In Australia, this principle is reflected in the Privacy Act in the APPs Agencies and…