The Identity Theft Resource Center is singing to this choir. Their most recent press release: As of June 30th, The Identity Theft Resource Center® recorded 341 individual breaches for the first six months of 2010. Unfortunately, hundreds of breaches have been veiled from the public, delayed in publication, or not listed on any public lists….
Category: Commentaries and Analyses
Hacker in AT&T iPad case breaks gagging order
Andy Carvell writes: An alleged hacker has broken the terms of a gagging order to speak out about his arrest and prosecution in an extraordinary rant on his group’s website. Last month, hackers exposed an embarrassing security flaw affecting iPad customers on AT&T, causing red faces all round at the telecoms provider. Shortly after the…
Information Security: Governmentwide Guidance Needed to Assist Agencies in Implementing Cloud Computing
From Information Security: Governmentwide Guidance Needed to Assist Agencies in Implementing Cloud Computing GAO-10-855T (pdf), July 1, 2010 Summary Cloud computing, an emerging form of computing where users have access to scalable, on-demand capabilities that are provided through Internet-based technologies, reportedly has the potential to provide information technology services more quickly and at a lower…
AU: Online ID fraud losses explode to $1.3bn a year
Asher Moses reports: One in 10 Australian internet users have lost money to online identify fraud over the past year with losses totalling $1.286 billion, according to the VeriSign Online Fraud Barometer figures released today. The findings represent a significant increase on the figures reported in June by the Australian Bureau of Statistics, which surveyed…
AU: Patients’ privacy put under threat
Anna Caldwell reports: The private details of Queensland Health patients are at risk of being lost or stolen and there are inadequate plans to deal with a major security breach. But the troubled department is racing to implement computerised medical records. The Auditor-General’s report into information systems governance and control has identified gaps in protocol…
Commentary: Is WellPoint blaming others for breach?
Steve Ragan has a statement from WellPoint that he posted on Tech Herald. While the company doesn’t deny that the actual cause of the exposure was a faulty security update, from there, it reads as if they are pointing fingers everywhere but at themselves. WellPoint mentions the role of the plaintiff’s attorney(s): The reason that…