DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Commentaries and Analyses

Computer security for Minnesota jobless benefits data is called weak

Posted on December 12, 2009 by Dissent

Julie Forster reports: The state agency that administers unemployment benefits is addressing concerns that it lacked adequate security controls for its computer system, leaving private information about applicants vulnerable to data breaches, according to a legislative audit report. The Dec. 3 report details the lack of controls with the massive Department of Employment and Economic…

Read more

Ca: Alberta health board cleared in records breach

Posted on December 10, 2009 by Dissent

Because we don’t have a privacy commissioner who actually — gasp — investigates breaches and issues findings, and all we have is HHS which doesn’t publish its findings and leaves us generally in the dark, this report out of Canada is especially interesting. The Alberta privacy commissioner’s office has found that the province’s health board…

Read more

Jon Stewart on TSA’s security gaffe

Posted on December 10, 2009 by Dissent

If you’ve been following the Transportation Security Administration’s gaffe in posting a manual online that was not securely redacted, you might enjoy Jon Stewart’s take on it all. I posted this to Chronicles of Dissent, but realized that heck, since it is a commentary on inadequate security…. enjoy! The Daily Show With Jon Stewart Mon…

Read more

Heartland Lawsuit Dismissed, “Insufficient Evidence” Of Weak Security

Posted on December 10, 2009 by Dissent

Evan Schuman discusses a judge’s dismissal of a shareholder lawsuit against Heartland Payment Systems over on StorefrontBacktalk, here, that is well worth reading.

Read more

WV: Policy to wipe old state computers is working, lawmakers told

Posted on December 9, 2009 by Dissent

Phil Kabler reports: A random audit of state computers up for sale through the Surplus Property division found that an initiative to assure that all hard drives are wiped clean is working, a report released Tuesday shows. Chief Technology Officer Kyle Schafer told a legislative interim committee that the policy was adopted in 2006, after…

Read more

Verizon Business Issues 2009 Supplemental Data Breach Report Profiling 15 Most Common Attacks

Posted on December 9, 2009 by Dissent

Verizon’s press release: The latest in the Data Breach Investigations Report series by Verizon Business security experts provides enterprises with an unprecedented look at the 15 most common security attacks and how they typically unfold. In the “2009 Supplemental Data Breach Investigations Report: An Anatomy of a Data Breach,” Verizon Business security experts tap the…

Read more
  • Previous
  • 1
  • …
  • 876
  • 877
  • 878
  • 879
  • 880
  • 881
  • 882
  • …
  • 896
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.