Jim Stingl reports: If you fax private medical information to a health management company in Ohio, you don’t expect it to arrive instead at a small publishing firm in Milwaukee. Well, surprise! That’s exactly what has been happening since the summer of 2015. Craig Berg, owner of Moose Moss Press, has tried to make it stop, but the wayward…
Category: Exposure
Used government computers bought at auction filled with personal information
The 1980s called…. Scott Noll reports that a KHOU investigation “once again found the City of Houston selling private, personal information through online auctions of used government equipment.” What did they find, you wonder? “On one of the computers, we found a database containing over 100,000 medical records,” explained computer expert Gary Huestis. They do…
Denuvo Website Leaks Secret Information, Crackers Swarm
While the folks at Denuvo are leaders in the field of video game protection, the same cannot be said about their website. In an embarrassing blunder, the company has left some directories and files open to the public and right now members of the cracking community are downloading and scrutinizing the contents. Read more on…
UK: Hundreds of confidential email addresses were shared with landlords operating in Cardiff
Seriously? Still? Cardiff council says it will investigate after hundreds of confidential email addresses were published. Landlords who are on the mailing list for Rent Smart Wales received an email on Thursday from a Cardiff council email address. In that email, the email addresses of all recipients were visible. Read more on WalesOnline.
PIP Printing and Marketing Services exposed 400GB of data, including personal information
MacKeeper Security Research Center reports that PIP Printing and Marketing Services, a franchise of Franchise Services in California, was leaking data: The majority of 400+ GB server is dedicated to design files and images relating to the printing business. The most sensitive information is contained within the “Outlook archives” and “Scans” folders. These contain around…
Info of 200,000 Indycar race fans exposed in misconfigured backup
Chris Vickery writes: The online security of over 200,000 Indycar racing fans was put in jeopardy recently. Earlier this month I discovered a large collection of publicly exposed MySQL database backup files at an IP resolving to ims-mysql.indycar.com. The majority of these backups appear to be merely operational, but what stands out are the Indycar…