Personal information of almost 900 people was given to a public-housing resident [in Virginia] who requested a list of those who had been banned from Hampton Redevelopment and Housing Authority property. Hampton police and the housing authority maintain a list of people who have been banned by police from Section 8 and public-housing property in…
Category: Government Sector
Former NYC employee charged with bank fraud
Zena Johnson, a former Quality Control Coordinator at the New York City Department of Buildings, has been charged with bank fraud and conspiracy to commit bank fraud for her role in a scheme to steal bank account information provided to the Department of Buildings by individuals submitting permit renewals and alteration repair applications. Some of…
Details of 10,000 MS workers among stolen data
Last week, this site reported on a story from Times Online about the new Lucid Intelligence database of identity details that had been found up for sale by cybercriminals. The database consists of 120 million records on 40 million people worldwide, compiled by identity theft expert Colin Holder and others. Users can conduct a free…
Anger over Internet job blunder
A couple have spoken of their anger after confidential job application details were published on Basingstoke and Deane Borough Council’s website by mistake. […] The list has been taken down and measures put in place to stop the mistake from happening again. Mr Curtis added: “We have worked with, and taken advice from, the Information…
Bits ‘n Pieces
In the justice system: Swedish police are increasingly certain that two Romanian nationals arrested in Hungary are the masterminds behind the widespread credit card scam which recently hit residents in Malmö in southern Sweden. Hundreds of residents in Malmö have complained of credit card fraud; half of them after using an unnamed Shell gas station….
GAO report: persisting info sec weaknesses
From the Summary of GAO-09-546 July 17, 2009, Information Security: Agencies Continue to Report Progress, but Need to Mitigate Persistent Weaknesses : […] Persistent weaknesses in information security policies and practices continue to threaten the confidentiality, integrity, and availability of critical information and information systems used to support the operations, assets, and personnel of most…