DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Commentaries and Analyses

Local govt computers at risk in Japan

Posted on March 7, 2010 by Dissent

Computer servers operated by a number of local governments are vulnerable to cyber-attacks, with some local entities failing to take countermeasures, according to an internal document of a government-affiliated organization. The Local Authorities Systems Development Center document showed that servers managed by at least 193 local entities, which include prefectural and municipal governments and possibly…

Read more

Cybersecurity: Progress Made but Challenges Remain in Defining and Coordinating the Comprehensive National Initiative

Posted on March 7, 2010 by Dissent

Cybersecurity: Progress Made but Challenges Remain in Defining and Coordinating the Comprehensive National Initiative GAO-10-338 March 5, 2010 Highlights Page (PDF)   Full Report (PDF, 64 pages)     Recommendations (HTML) Summary: In response to the ongoing threats to federal systems and operations posed by cyber attacks, President Bush established the Comprehensive National Cybersecurity Initiative (CNCI) in…

Read more

Report confirms private banking websites are flouting client privacy

Posted on March 7, 2010 by Dissent

Tara Loader Wilkinson reports: According to a report published by Swiss research group MyPrivateBanking last week, 61% of banks do not offer secure web messaging. And nearly 60% do not give privacy warnings to users of their website about sending unprotected e-mails to recipients at the bank. […] More than half of banks offered a…

Read more

ICO outlines business case for privacy

Posted on March 4, 2010 by Dissent

In The Privacy Dividend, a report published on 4 March 2010, it said public and private sector organisations can use business cases to justify spending on privacy protection. It says the benefits of protecting privacy derive from four areas in which information has value. Firstly, protecting personal information as an asset can help to make…

Read more

Medical identity theft strikes 5.8% of American adults

Posted on March 3, 2010 by Dissent

Ellen Messmer reports: Identity thieves are not only interested in tapping financial resources, but are also after your medical identification data and services. Medical identity theft typically involves stolen insurance card information, or costs related to medical care and equipment given to others using the victim’s name. Roughly 5.8% of American adults have been victimized,…

Read more

Verizon releases framework for reporting security incidents

Posted on March 2, 2010 by Dissent

William Jackson reports: Verizon Business on Monday released for public use a framework for collecting and reporting information about security incidents in the hope of creating a standardized way for government and industry to share information about breaches. “If we don’t have a common language to collect and communicate data, we are going to be…

Read more
  • Previous
  • 1
  • …
  • 847
  • 848
  • 849
  • 850
  • 851
  • 852
  • 853
  • …
  • 876
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • DOJ investigates ex-ransomware negotiator over extortion kickbacks
  • Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns
  • One in Five Law Firms Hit by Cyberattacks Over Past 12 Months
  • U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware
  • Senator Chides FBI for Weak Advice on Mobile Security
  • Cl0p cybercrime gang’s data exfiltration tool found vulnerable to RCE attacks
  • Kelly Benefits updates its 2024 data breach report: impacts 550,000 customers
  • Qantas customers involved in mammoth data breach
  • CMS Sending Letters to 103,000 Medicare beneficiaries whose info was involved in a Medicare.gov breach.
  • Esse Health provides update about April cyberattack and notifies 263,601 people (1)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Oregon Amends Its Comprehensive Privacy Statute
  • Wisconsin Supreme Court’s Liberal Majority Strikes Down 176-Year-Old Abortion Ban
  • 20 States Sue HHS to Stop Medicaid Data Sharing with ICE
  • Kids are making deepfakes of each other, and laws aren’t keeping up
  • The Trump administration is building a national citizenship data system
  • Supreme Court Decision on Age Verification Tramples Free Speech and Undermines Privacy
  • New Jersey Issues Draft Privacy Regulations: The New

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.