In the justice system: Ashley Johnson was arrested in Memphis for trying to open a store account under a false name. When police searched her vehicle, they discovered cards in dozens of other identity cards. Johnson allegedly used names and identification numbers she found on employee applications that she took from trash containers behind such…
Category: Non-U.S.
UK: Second data blunder fear
It’s amazing what you don’t find when you finally get around to looking for it. In this story out of the UK, a local council brought in consultants after one data breach, only to discover that their potential problem was bigger than they thought: …. Charnwood Borough Council admitted it could not find nine missing…
HK: Lost flash drive with patient data wasn’t password-protected
Adele Wong of The Standard reports that the Hospital Authority has been urged to improve security to avoid further losses of patients’ records following another incident involving a lost flash drive with unencrypted data. In this most recent incident, a physician from the obstetrics and gynecology department at United Christian Hospital misplaced a USB flash…
Penn State reports second breach in 2009
Penn State does not seem to be having a great year in terms of data security and malware. Indeed, when I saw the newest incident in my newsreader, I skipped it at first, thinking it was a previously reported breach, but it’s not. On March 23, the University confirmed that 10,868 Social Security numbers in…
UK: ‘Stolen’ Blackberry containing personal details of cabinet ministers, police and MPs found
From the Daily Mail Online: A student paid £150 for a Blackberry phone which contained the personal details of cabinet ministers, others MPs, civil servants and senior police officers. Journalism student Darryl Curtis, 44, said he bought the device from a homeless man in Sheffield and found it contained the details of several hundred people….
Prosecuting the Mitsubishi UFJ case: what’s the crime?
The Yomiuri Shimbun has an article on the Mitsubishi UFJ breach reported earlier this week that suggests difficulties the prosecutors may face. In this case, a (now-former) employee allegedly used a co-worker’s credentials to access a database to which he already had authorized access. Using the co-worker’s credentials, he accessed and copied data on 1,486,651…