Mary Pat Gallagher reports: Using a password-accessed workplace computer in violation of company rules or policies may get you disciplined, but it’s not enough to be prosecuted in New Jersey, says a Mercer County judge in a published case of first impression. Superior Court Judge Mitchel Ostrer threw out an indictment against Princeton Borough police…
Category: Commentaries and Analyses
Credit card data security: Who’s responsible?
By Phil Lieberman, president & CEO, Lieberman Software, and Henry Helgeson, co-CEO, Merchant Warehouse, Network World About a year ago security at Heartland Payment Systems Inc. was breached and information affecting more than 100 million credit cards stolen. Was it Heartland’s fault, or should the credit card companies shoulder more of the responsibility? The experts:…
Javelin Study Finds Identity Fraud Reached New High in 2009, but Consumers are Fighting Back
The 2010 Identity Fraud Survey Report – released today by Javelin Strategy & Research (http://www.javelinstrategy.com/) – found that the number of identity fraud victims in the United States increased 12 percent to 11.1 million adults in 2009, while the total annual fraud amount increased by 12.5 percent to $54 billion(1). The report found that protection…
Za: Hijacked IDs are fuelling spending sprees
Identity theft has increased phenomenally in South Africa, reaching such a level that a major retailer is thinking about installing photo-recognition or fingerprint scanners in its stores. Johan Kok, chief operating officer of JD Group, said identity theft had become much more sophisticated in the past five years. Their group is part of the South…
IA: Security breaches of state computer systems in recent years
A number of news sources in Iowa are considering the state’s plans to consolidate its computer systems in light of the recent hack involving the state racing and gaming commission. A listing of 10 breaches involving state computers can be found here. Eight of the 10 breaches are from the education sector.
AU: Extorted companies silent on stolen data
Darren Pauli reports: Desperate companies are buying off data thieves and extortionists to recover stolen data, according to experts. They claim it is “common” for some businesses operating in Australia to pay ransoms to hackers and disgruntled employees to re-secure sensitive information or prevent illicit corporate activities from becoming public. Law firm MMLC Group managing…