Reeves International is notifying consumers who made purchases on BreyerHorses.com that their personal information may have been compromised in a breach that went undetected for 18 months. In a letter to those affected, Arthur Minnocci, CFO, writes: On September 9, 2014, we learned that unauthorized individuals installed malicious software on the computer server hosting the Breyer Horses…
Recent updates to HHS's public breach tool
There’s an update to the breach involving an office burglary at Dr. Vonica Chau ‘s office in Arlington, Texas: when the breach was added to HHS’s public breach tool, it was reported as affecting 810 patients. The American Family Care breach was also added to HHA’s public breach tool this week. The entry shows the laptop…
ME: Island Nursing Home successfully sued by former employee
It’s not often we see an employee lawsuit against an employer over lousy data protection, and when we do, it’s more likely to be potential class-action lawsuits by employees following a hack or other data breach. In this case, an individual employee sued her former employer for not adequately storing and protecting her information. Faith DeAmbrose…
Shadowcrew Vendor Aleksi Kolarov Sentenced To 30 Months In Prison For Role In Largest Identity Theft Ring Of Its Time
A Bulgarian national was sentenced today to 30 months in prison for his participation in the Shadowcrew forum, an online marketplace for hacking and identity theft that was the largest of its kind when dismantled by the Department of Justice and the U.S. Secret Service in 2004, U.S. Attorney Paul J. Fishman announced. Aleksi Kolarov,…
The OIG revealed that the FDA’s computer network is vulnerable to a potential data breach
Elizabeth Snell reports: A recent audit by the Office of the Inspector General (OIG) revealed that the Food and Drug Administration’s (FD) computer network is vulnerable to a potential data breach. The news is especially critical as almost exactly one year ago it was discovered that the FDA’s online submission system was breached by an…
Those complicit in medical ID theft often escape legal consequences. Why?
I’ve previously noted that I’m a bit stumped as to what we do in cases where people knowingly allow others to use their information to obtain medical services. The Ponemon studies view them as medical ID theft victims, and they certainly might suffer down the road if their own medical records are corrupted by misinformation,…