Data Breach

1.4 million Illinois job seekers' personal information potentially compromised in major hack

The news comes days after Illinois Governor Bruce Rauner unveiled a $1bn state-wide cybersecurity plan.<p>The Illinois Department of Employment Security …

Security

Experts Doubt Hackers’ Claim Of Millions Of Breached Apple Credentials

Security experts say they are skeptical that a group of hackers called Turkish Crime Family actually possess a cache of hundreds of millions of Apple …

Security

Alaska's big telecoms say they won't sell consumer data after Senate internet privacy vote

Consumer privacy advocates are concerned after the U.S. Senate on Thursday passed a resolution that will roll back privacy rules the Federal …

Net Neutrality

Android Forums hack prompts password resets after users' email addresses and passwords stolen

Android Forums has reportedly confirmed that hackers compromised its servers, leading to a data breach. The forum, which is a highly popular platform …

Security

Psychology Of Passwords – Does Your Personality Make You More Likely To Get Hacked?

Does Your Personality Make You More Likely To Get Hacked? LastPass Survey Explores The Psychology Of Passwords<p>FAIRFAX, Va., Sept. 28, 2016 (GLOBE …

Psychology

How to protect your iCloud account, as some hacked credentials confirmed valid

While the available evidence suggests that hackers have not gained <i>direct</i> access to more than 600 million iCloud accounts, some of the sample login credentials supplied by the group have been found to be valid. <i>ZDNet</i>, for example, used Apple’s password reset function to test 54 logins supplied by the …

Security

Alleged hackers raise their Apple ransom to $700,000

The so-called “Turkish Crime Family” hackers who claim they’ve got access to hundreds of millions of Apple customer accounts have raised their ransom demand from $75,000 to a whopping $700,000.<p>The group, which is apparently based in the U.K., has threatened to remotely wipe users’ devices, or reset …

Security

When Fingerprints Are as Easy to Steal as Passwords

As hackers learn to imitate the body's unique features, scientists might turn to brainwaves and genomics to verify people's identities.<p>How do you prove who you are to a computer?<p>You could just use a password, a shared secret between you and the machine. But passwords are easily compromised—through …

Dystopia

Job Link victims gain counsel

A law firm noted for its advocacy on behalf of data breach victims announced it is investigating the breach of America's Job Link Alliance (“AJLA” or …

Security

Despite Apple denial, hackers prove stolen iCloud data is real

Apple confirmed on Thursday that its servers were not hacked, after reports earlier this week claimed that hackers are holding hundreds of millions …

Security

Hello Aadhaar, Goodbye Privacy

By on 24/03/2017 •<p>Far from ensuring that your identity information is secure, the government is selling it (or is, at least, authorised to sell it) …

Security

U.S. Senate votes to strip away Americans' online privacy

The resolution would also prevent the FCC from enacting similar consumer protections in the future.<p>Your service provider needs permission to sell …

Net Neutrality

Israel enacts landmark data security, notification regulations

Culminating more than six years of back and forth negotiations, the Israeli Parliament approved extensive, far-reaching data security regulations …

Security

Breach Involving Encrypted Devices Raises Questions

Med Health Center in Kentucky Reports Insider Incident Marianne Kolbasuk McGee (HealthInfoSec) • March 23, 2017<p>Under the HIPAA Breach Notification …

Security

Why you need cyber security checks during a merger or acquisition

2016 was a record setting year for data breaches and hacks. In the last few months of the year Yahoo began making headline news for all the wrong …

Cybersecurity

Coachella offers free identity protection services to users after hacking

In the beginning of March, Goldenvoice confirmed that Coachella’s website was hacked and user information like usernames, first and last names, …

Security

A simple Google search delivers databases with Aadhaar numbers, but Aadhaar is not compromised

A <i>Medium</i> post by the user St_Hill <b>points out four issues with Aadhaar</b>. Aadhaar cards are used by organisations and institutions as a proof of address, …

Security

Coachella Producer Offering Free Identity Theft Protection Services to Hacked Website Users

Recently, Coachella Valley Music and Arts Festival announced that information about users registered on its website (a process required to purchase tickets for the festival) had been compromised. Festival producer Goldenvoice has now addressed the hack, writing, “the intruder may have accessed” …

Identity Theft

Data breach disclosure 101: How to succeed after you've failed

Organisations don't plan to fail. Probably the closest we get to that in the security space is password hashing, which for all intents and purposes …

Security

LIBE Committee declares Privacy Shield 'inadequate' by narrow margin

Members of the European Parliament’s civil liberties, justice and home affairs committee (LIBE) narrowly voted Thursday to support a resolution …

Sovereignty

Organisations struggle to figure out which data breaches to confess to

According to Telstra's Chief Privacy Officer Jason Holandsjo, the Australian Information Commissioner Timothy Pilgrim isn't a reasonable person.<p>But …

Security

SSL sues Orbital ATK over confidential data breach

WASHINGTON — Space Systems Loral (SSL) has filed a lawsuit against Orbital ATK after an employee of that company accessed sensitive information in a …

Security

Why is Apple afraid of forcing users to reset their passwords?

How much is your data worth to Apple? That’s the question hacking collective Turkish Crime Family seems to be asking by blackmailing Apple to pay thousands of dollars or have millions of iCloud accounts wiped remotely.<p>The story started a few days ago, when Motherboard reporter Joseph Cox wrote …

Security

How companies should plan for, and respond to, security breaches

Troy Hunt, proprietor of the essential Have I Been Pwned (previously) sets out the hard lessons learned through years of cataloging the human costs …

Security

Privacy Law Course at Workplace

Did you know these facts about privacy in the workplace?<p>Breaches of the Privacy Act can cost up to $1.7m.<br>• The internet and social media mean workplace …

Security

Data Brokering: Another Landmine Lurking Around In Digital Space?

With the government's push towards a Digital India, the data privacy regime in the country or rather the lack of it has come under immense scrutiny. …

Security

Employment In The US: Hacks On Job-Assisting Company Puts Nearly 5 Million Americans At Risk Of Identity Theft

A series of hacks targeting America’s Job Link Alliance, a Kansas-based company that operates job search engines across several states connecting …

Identity Theft

Is The Aadhar Grounded In Adequate Law And Regulations?

Aadhar enrollment goes on. Aadhar being made compulsory for various public services. All of this, in a legal vacuum.

Regulation

Is encryption one of the required HIPAA implementation specifications?

No one who has ever had to deal with HIPAA compliance has come away with a direct, measurable understanding of...<p>what the regulation actually …

SEO

Hacker pranksters hijack Twitter accounts of ABC News and Good Morning America

The media accounts were updated with a number of pro-Trump messages.<p>The official Twitter accounts of mainstream US news outlet ABC News and its daily …

Cybersecurity