idRADAR has some comments about Target’s offer of an ID theft product. I found it interesting to read because I wouldn’t have realized that what Target negotiated was not the usual kind of product that checks all three major credit reporting databases – Experian, Equifax, and Transunion. The plan Target arranged with Experian only checks…
What Happens in the Hospital Doesn’t Stay in the Hospital
Melissa Jayne Kinsey compiles some cases where medical personnel breached patient privacy by their use of social media – sometimes intentionally. Read her article on Slate.
Ruling delayed in FTC v. Wyndham (updated)
Over on phiprivacy.net, I had noted that Commissioner Julie Brill had recused herself from the LabMD case after they moved to disqualify her over public statements she made. Somehow I missed a development in the Wyndam case, even though Law360 had first reported it on January 2. Now Stacey Brandenburg of Zwillgen reports that Judge Salas agreed to…
Microsoft No idea What to Do after breached by Syrian Electronic Army
Yesterday the @Official_SEA16 announced a breach on Xboxs twitter account and shortly after started posting from that account. Not to long after they have continued on the breach spree with an attack on the Microsoft official blogs website and twitter accounts. It also appears that now they have also got access to some of the email…
Australian police investigating teen who found database flaw
Jeremy Kirk reports: An Australian teenager who notified a public transport agency of a serious database flaw is under police investigation. Joshua Rogers, 16, of Melbourne, found a SQL injection flaw in a database owned by Public Transport Victoria (PTV), which runs the state’s transport system. The flaw allowed access to a database containing 600,000…
Reuters sources: Other US retailers victims of cyberattacks
Jim Finkle and Mark Hosenball of Reuters report: Target Corp and Neiman Marcus are not the only U.S. retailers whose networks were breached over the holiday shopping season late last year, according to sources familiar with attacks on other merchants that have yet to be publicly disclosed. Smaller breaches on at least three other well-known…