DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Commentaries and Analyses

Theft of location info: Revision of law necessary to protect privacy

Posted on March 9, 2012 by Dissent

From an editorial in The Korea Times: Subcontractors of two mobile carriers sold location information of 200,000 customers. The theft shows a deep hole in the protection of location information, and is a grave infringement of the privacy of subscribers. Police arrested engineers working for SK Telecom and KT for stealing and selling location information,…

Read more

A horrific privacy breach averted, but why did Anonymous remain silent? (UPDATED)

Posted on March 9, 2012 by Dissent

I couldn’t fall asleep last night.  It’s not often that a data breach worries me, but what I read online had concerned me.  According to a hacker calling himself @PabloEscobarSec, he had hacked the British Pregnancy Advisory Service (BPAS), and intended to leak the names of all of the women who had used the service….

Read more

Leakage from website poses threat to Chinese netizens

Posted on March 2, 2012 by Dissent

Xiang Yang provides some interesting statistics. Translated by e Xin, People’s Daily Online reports: … By the end of 2011, a total of 26 website were suspected to have users’ information leaked, involving 278 million accounts and passwords, according to the statistics from the National Computer Network Emergency Response Technical Team/Coordination Center of China (CNCERT/CC)….

Read more

Data Breach Case Research Paper Sheds Light

Posted on March 1, 2012 by Dissent

Kristin J. Mathews writes: In a draft research paper titled “Empirical Analysis of Data Breach Litigation”, three prominent scholars have collected and analyzed a sample of over 230 federal data breach lawsuits in order to deduce just what makes them tick. Romanosky, Hoffman and Acquisti examined, for example, what factual and legal characteristics made a company more likely to be…

Read more

Outsider Hacks Dominated 2011 Security Breaches

Posted on March 1, 2012 by Dissent

Kelly Jackson Higgins reports from RSA: More than 85% of the data breach incident response cases investigated by Verizon Business last year originated from a hack, and more than 90% of them came from the outside rather than via a malicious insider or business partner. Tuesday, Verizon published a snapshot of data from its upcoming…

Read more

Another week, another round of Congressional questions and posturing?

Posted on February 29, 2012 by Dissent

How many data breach investigations can one Congress initiate without actually doing anything? What is the point of asking Grindr questions about its security?  Hasn’t Congress heard enough by now to know that most companies and apps do not implement adequate security despite what they say on their sites?  What, if anything, does Congress intend…

Read more
  • Previous
  • 1
  • …
  • 803
  • 804
  • 805
  • 806
  • 807
  • 808
  • 809
  • …
  • 896
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.