Data security breaches

  • June 09, 2006 09 Jun'06

    Security Blog Log: Confessions of a spam gangsta

    Ryan Pitylak explains why he went from sending spam to fighting it. Meanwhile, bloggers react to news that active duty personnel were also affected by the VA data theft.

  • June 08, 2006 08 Jun'06

    Security Bytes: CPAs facing data fraud risk

    Meanwhile, blackmailing malware storms Russia; two adware firms merge; and HP addresses a Sendmail flaw in HP Tru64 UNIX and HP Internet Express.

  • June 07, 2006 07 Jun'06

    Active-duty soldiers' data also stolen in Veterans Affairs theft

    The U.S. Department of Veterans Affairs has revealed that data belonging to as many as 2.2 million active-duty troops was stolen along with information involving 26.5 million veterans.

  • June 06, 2006 06 Jun'06

    Easy hacks still tripping up corporate victims

    Analysts at this year's Gartner IT Security Summit explain how thieves are becoming data theft mavens by using freely available tools to hijack sensitive data from stolen PC.

  • June 02, 2006 02 Jun'06

    Security Blog Log: The bright side of the VA data theft

    Is there a silver lining in the cloud that hangs over millions of veterans whose data was recently compromised? Some security bloggers think so.

  • June 01, 2006 01 Jun'06

    Congress considers several data protection bills

    Legislators are considering several bills that would tighten data security laws. The leading bill would give more authority to the FBI and Secret Service without subverting state laws.

  • May 26, 2006 26 May'06

    Security Blog Log: Uncle Sam slammed over data theft

    This week, infosec pros said the feds aren't doing enough after the Veterans Affairs data breach that left 26.5 million veterans exposed to identity fraud.

  • May 25, 2006 25 May'06

    Security Bytes: Dirty cyber deeds in Tinseltown?

    The Motion Picture Association of America is accused of hiring a black-hat hacker. Meanwhile: Cisco and HP fix flaws and blood donors' information is compromised.

  • May 22, 2006 22 May'06

    Security Bytes: Skype dodges attackers

    Meanwhile: A worm hijacks IE and spreads via Yahoo IM, Ohio University reorganizes IT department after data theft; and Symantec accuses Microsoft of misusing technology.

  • April 20, 2006 20 Apr'06

    Congress seeks to alter legal landscape for data breaches

    An intense interest from legislators and little corporate opposition suggest that Congress will pass a data breach bill this year that may supersede more than 20 state laws.

  • April 14, 2006 14 Apr'06

    Security Blog Log: Man of God, man of ID theft

    This week in the blogosphere: new government data on the scope of ID theft and the tale of how a pastor and his wife were charged with the crime.

  • March 16, 2006 16 Mar'06

    Opinion: Ignoring data breaches means ignoring risk management

    Corporate data breaches, leaks and losses have become commonplace, despite the recent onslaught of privacy compliance mandates and disclosure laws. While the consequences may not seem severe, corporations are not only losing tens of millions of ...

  • January 26, 2006 26 Jan'06

    ChoicePoint settles FTC charges, pays $15 million

    The personal records firm will pay $10 million in civil penalties and $5 million for consumer redress to settle charges after a widely publicized incident last year when thieves stole records of more than 163,000 people.

  • January 12, 2006 12 Jan'06

    Dirty documents cause messy security situations

    What use are firewalls and intrusion prevention systems if insecure digital documents reveal all of an enterprise's best-kept secrets? That's the question many security experts are asking in the wake of several high-profile incidents in which ...

  • December 26, 2005 26 Dec'05

    CSOs seek regulatory sanity in 2006

    IT security officers long for a common system to comply with laws that are similar, but often have conflicting demands. Some say a single set of federal guidelines could help, but others fear the implications.