DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Commentaries and Analyses

GAO Report: Information Security: Concerted Response Needed to Resolve Persistent Weaknesses

Posted on March 25, 2010 by Dissent

The summary of GAO-10-536T report, Information Security: Concerted Response Needed to Resolve Persistent Weaknesses, March 24, 2010: Without proper safeguards, federal computer systems are vulnerable to intrusions by individuals who have malicious intentions and can obtain sensitive information. The need for a vigilant approach to information security has been demonstrated by the pervasive and sustained…

Read more

Your health, tax, and search data siphoned

Posted on March 25, 2010 by Dissent

Dan Goodin reports: Google, Yahoo, Microsoft’s Bing, and other leading websites are leaking medical histories, family income, search queries, and massive amounts of other sensitive data that can be intercepted even when encrypted, computer scientists revealed in a new research paper. Researchers from Indiana University and Microsoft itself were able to infer the sensitive data…

Read more

Recommended: Gonzalez Lawyers, Judges Debate Data Breach Costs

Posted on March 25, 2010 by Dissent

Evan Schuman writes: When two Boston-based federal judges sentence Albert Gonzalez Thursday (March 25) and Friday (March 26) for a rash of retail cyber-break-ins that he confessed to orchestrating, the exact sentence may be academic. The key legal argument is shaping up to be this question: “When a retailer is breached, what’s the most reasonable…

Read more

Western Australia’s Auditor General Finds Serious Weaknesses in Government Agencies’ Handling of Information

Posted on March 25, 2010 by Dissent

In his annual report on Information System Management in state government agencies, the Auditor General for Western Australia has identified serious weaknesses in the way many agencies manage their IT systems. The two-part Information Systems Audit Report, tabled in Parliament, found that government agencies were often failing to implement comprehensive controls over their IT systems…

Read more

An ACTA of insecurity

Posted on March 24, 2010 by Dissent

By now, the leaked copy of the January 18, 2010 draft of ACTA is all over the web. What I don’t understand is the notice on the cover: This document must be protected from unauthorized disclosure, but may be mailed or transmitted over unclassified e-mail or fax, discussed over unsecured phone lines, and stored on…

Read more

Compensation should be paid for personal data loss, says report

Posted on March 23, 2010 by Dissent

Urmee Khan reports: Putting a price on privacy will deter organisations from losing or abusing people’s personal details, the influential think tank Demos found. The recommendation comes amid increasing concern that there has been a dramatic expansion of a “surveillance society”, which threatens to erode civil liberties. The report Private Lives, published today, recommended that…

Read more
  • Previous
  • 1
  • …
  • 844
  • 845
  • 846
  • 847
  • 848
  • 849
  • 850
  • …
  • 875
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • National Health Care Fraud Takedown Results in 324 Defendants Charged in Connection with Over $14.6 Billion in Alleged Fraud
  • Swiss Health Foundation Radix Hit by Cyberattack Affecting Federal Data
  • Russian hackers get 7 and 5 years in prison for large-scale cyber attacks with ransomware, over 60 million euros in bitcoins seized
  • Bolton Walk-In Clinic patient data leak locked down (finally!)
  • 50 Customers of French Bank Hit by Insider SIM Swap Scam
  • Ontario health agency atHome ordered to inform 200,000 patients of March data breach
  • Fact-Checking Claims By Cybernews: The 16 Billion Record Data Breach That Wasn’t
  • Horizon Healthcare RCM discloses ransomware attack in December
  • Disgruntled IT Worker Jailed for Cyber Attack, Huddersfield
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Trump administration is building a national citizenship data system
  • Supreme Court Decision on Age Verification Tramples Free Speech and Undermines Privacy
  • New Jersey Issues Draft Privacy Regulations: The New
  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.