This is a damned soap opera. If a patient “raids” his own doctor and steals his own medical records, is that a reportable breach under HIPAA and HITECH if the doctor is a HIPAA-covered entity? I think it is. Even if it is some kind of standard practice for the White House to obtain a…
Australia’s Largest Bank Lost The Personal Financial Histories Of 12 Million Customers
Paul Farrell reports: The Commonwealth Bank lost the personal financial histories of 12 million customers, and chose not to reveal the breach to consumers, in one of the largest financial services privacy breaches ever to occur in Australia. BuzzFeed News can reveal that the nation’s largest bank lost the banking statements for customers from 2004…
Video of the moment ‘Courvoisier’ was captured on train
Richard Spillett reports: This is the moment computer hacker dubbed ‘Courvoisier’ was arrested for carrying out cyber attacks on some of Britain’s top companies before selling customers’ data on the dark web. Police seized £500,000 in Bitcoin from Grant West after discovering he had obtained the personal data of millions of people and the credit…
Korean Overwatch Hackers Arrested, Hit With $10,000 Fine
Nathan Grayson reports: South Korea’s new law that takes aim at those who hack online games in order to cheat at them, which went into effect last June, has hackers in hot water. Earlier this year, 13 Overwatch offenders were arrested, and now two have received their sentences. According to a post from Blizzard Korea—which…
EPFO slams Aadhaar data theft reports on social media
Sunil Dhawan reports: There was news doing the rounds earlier on in the day that Aadhaar data of subscribers of the Employees’ Provident Fund Organisation (EPFO) has been stolen by hackers. On social media, there was secret letter alegedly written by VP Joy, the Central Provident Fund Commissioner, on March 23 confirming that such a…
APT28 Hackers Caught Hijacking Legitimate LoJack Software
Catalin Cimpanu reports: Security researchers have found tainted versions of the legitimate LoJack software that appeared to have been sneakily modified to allow hackers inside companies that use it. Researchers say domains found inside the tainted LoJack instances have been previously tied to other hacking operations carried out by APT28, a codename used to describe…