280,000 people have reason to worry about their health information, as a portable computer drive containing this data has been lost. Keystone Mercy Health Plan and AmeriHealth Mercy Health Plan made an announcement regarding this matter on Tuesday.
The drive is apparently lost within the companies’ corporate offices. It has to actually be determined in which branch as Keystone’s headquarters is in Southwest Philadelphia and AmeriHealth Mercy’s is in Harrisburg. Read more
A professor at the Umeå University in northern Sweden has received the entire contents of his stolen laptop on a USB stick. As this data was the result of 10 years of work, one can imagine this gentleman’s relief.
In a statement addressed to the local Västerbottens-Kuriren newspaper he says that he is unhappy with the incident but the return of the data makes him “hope for humanity”. Read more
What’s stolen in Vegas stays in Vegas?
35,000 county residents found out that their private information might be in jeopardy as an Accomack County Virginia employee had a county-owned laptop stolen while being on holiday in Las Vegas. Besides personal information such as names and social security numbers, the files on the stolen computer might contain tax payer information and actual addresses.
The incident took place on October 7 and was reported to the media after seven days. The warning came with apologies as the laptop in question was apparently taken without permission by the employee. A closed meeting held by the Board of Supervisors regarding this issue was held on Wednesday. Read more
If you’re a Mac fan and also into device control, endpoint security or data loss prevention, you know there aren’t many solutions covering this specific area for Mac / Apple operating systems. One of the only solutions with a client dedicated to Mac is Endpoint Protector 2009, developed by CoSoSys. The Endpoint Protector 2009 Mac device control application has just been released in a new version, now including File Tracing for portable devices and offline temporary passwords.
The newly introduced features are designed to increase protection for business confidential data and to offer road warriors a way to stay active and productive when a permanent Internet connection is unavailable. Moreover, the carried data is kept safe from the common threats posted by improper usage of portable storage devices that often leads to severe security breaches. When enabled, the File Tracing feature logs all data and file related activity and stores it for later auditing. Each time an employee edits, deletes or renames a certain file originating from or subsequently copied to a portable device, his actions are recorded, along with his user credentials and the device specifications. Read more
After discovering leads, customer names and other documents have been lifted form a local home loan company in the Lee County, the local sheriff’s detectives are investigating a man, former employee of the company in question, claimed to have been responsible for this crime.
According to ALDI sources, terminals in the following areas have been affected: Read more
UK Metropolitan police commissioner Sir Paul Stephenson, has stated that he believes police officers trained to fight against the growing number of cyber criminals are as vital as uniformed officers in the streets. In a letter to “The Sunday Telegraph” he outlines his beliefs that cutting back -office staff in favor of more street officers is wrong.
“Online fraud generated £52bn worldwide in 2007 – a staggering sum. There is a significant fight back by the financial institutions, working with police. In the Met, we play our part in a ‘Virtual Task Force’,” he said. Read more
Security experts have their eyes turned on Europe as the number of cyber crime operations emanating from here is growing. In the first half of 2010 Europe has surpassed Asia and the Americas in producing web-based threats.
One reason for the rise of European based threats might partly be due to the fact that the Chinese Government has forced it’s local ISP’s to curve illegal activities there. This politics are apparently one of the reasons for the migration of cyber criminals to Eastern Europe. Read more
Back in 2008, assuming that the human factor would eventually fail at some point and people would make the mistake of plugging an unsecured memory stick into a military laptop, several memory sticks were scattered in a US military base in the Middle East that was providing support for the Iraq war. All these memory sticks were deliberately infected with a computer worm.
It resulted in the self-propagation of a computer worm into the computer system of Centcom – the central command of the US military. The eradication process took 14 months. Apparently this attack, acknowledged by the Pentagon only in august 2010, was very similar to a Stuxnet worm attack which was used in attempts against Iraq’s nuclear facilities and Iran’s nuclear programme. Read more