With Owensboro’s Executive Inn Rivermont about to be demolished, it has been open for the past month for people to walk through as the city tries to sell the contents. But the Messenger-Inquirer reports a group of women looking at items for sale stumbled on a box that contained employee records, including Social Security numbers…
Category: U.S.
Details of 10,000 MS workers among stolen data
Last week, this site reported on a story from Times Online about the new Lucid Intelligence database of identity details that had been found up for sale by cybercriminals. The database consists of 120 million records on 40 million people worldwide, compiled by identity theft expert Colin Holder and others. Users can conduct a free…
Sac City Bank employee pleads guilty
Following up on a case mentioned on this site in June: United States Attorney Matt M. Dummermuth announced today that a woman who defrauded victims out of at least $4 million pled guilty today in federal court in Sioux City. CHARLENE MARIE PICKHINKE, 48, from Sac City, Iowa, was convicted of one count each of…
Report: ID thief had 500 Wells Fargo customers’ details
This week, a federal grand jury in Sacramento returned a 13-count indictment charging Jonah Hanneke Nelson, 30, of Dixon, with bank fraud, aggravated identity theft, access device fraud, counterfeiting securities, and possession of more than 15 access devices. According to Assistant United States Attorney Russell L. Carlberg, the indictment alleges that Nelson obtained bank account…
No charges against Polo HS student
No charges will be filed against an 18-year-old Polo High School student accused of tampering with the school’s computer records, Ogle County State’s Attorney Ben Roe said in a news release Friday. After conferring with Polo Police Chief Dennis Christen and reviewing extensive reports and evidence, it was determined that [Ross D.] Wolf’s conduct did…
GAO report: persisting info sec weaknesses
From the Summary of GAO-09-546 July 17, 2009, Information Security: Agencies Continue to Report Progress, but Need to Mitigate Persistent Weaknesses : […] Persistent weaknesses in information security policies and practices continue to threaten the confidentiality, integrity, and availability of critical information and information systems used to support the operations, assets, and personnel of most…