Endpoint Protector Appliance: Stop data theft on Windows and Mac

Misplaced portable drive with 280,000 medical records

October 29th, 2010 by Agent Smith (0) Data Theft & Loss

280,000 people have reason to worry about their health information, as a portable computer drive containing this data has been lost. Keystone Mercy Health Plan and AmeriHealth Mercy Health Plan made an announcement regarding this matter on Tuesday.

The drive is apparently lost within the companies’ corporate offices. It has to actually be determined in which branch as Keystone’s headquarters is in Southwest Philadelphia and AmeriHealth Mercy’s is in Harrisburg. Read more

Is there such a thing as decent thieves?

October 25th, 2010 by Agent Smith (0) Data Theft & Loss,In The Spotlight

A professor at the Umeå University in northern Sweden has received the entire contents of his stolen laptop on a USB stick. As this data was the result of 10 years of work, one can imagine this gentleman’s relief.

In a statement addressed to the local Västerbottens-Kuriren newspaper he says that he is unhappy with the incident but the return of the data makes him “hope for humanity”. Read more

Accomack county laptop stolen on employee’s trip to Vegas

October 15th, 2010 by Agent Smith (1) Data Theft & Loss,endpoint security

What’s stolen in Vegas stays in Vegas?

35,000 county residents found out that their private information might be in jeopardy as an Accomack County Virginia employee had a county-owned laptop stolen while being on holiday in Las Vegas. Besides personal information such as names and social security numbers, the files on the stolen computer might contain tax payer information and actual addresses.

The incident took place on October 7 and was reported to the media after seven days. The warning came with apologies as the laptop in question was apparently taken without permission by the employee.  A closed meeting held by the Board of Supervisors regarding this issue was held on Wednesday. Read more

Endpoint Protector 2009 for Mac Introduces File Tracing for Portable Devices

October 13th, 2010 by Agent Smith (0) Data Theft & Loss,DLP,endpoint security,In The Spotlight

If you’re a Mac fan and also into device control, endpoint security or data loss prevention, you know there aren’t many solutions covering this specific area for Mac / Apple operating systems. One of the only solutions with a client dedicated to Mac is Endpoint Protector 2009, developed by CoSoSys. The Endpoint Protector 2009 Mac device control application has just been released in a new version, now including File Tracing for portable devices and offline temporary passwords.

The newly introduced features are designed to increase protection for business confidential data and to offer road warriors a way to stay active and productive when a permanent Internet connection is unavailable. Moreover, the carried data is kept safe from the common threats posted by improper usage of portable storage devices that often leads to severe security breaches. When enabled, the File Tracing feature logs all data and file related activity and stores it for later auditing. Each time an employee edits, deletes or renames a certain file originating from or subsequently copied to a portable device, his actions are recorded, along with his user credentials and the device specifications. Read more

Former employee hacks computer system to steal company data

October 11th, 2010 by Agent Smith (2) Data Theft & Loss

After discovering  leads, customer names and other documents have been lifted form a local home loan company in the Lee County, the local sheriff’s detectives are investigating a man, former employee of the company in question, claimed to have been responsible for this crime.

Bryan Howel, owner of Homelynx Home Loans says: “I’m tired of people stealing, lying cheating in the mortgage industry and I’m one that’s going to stand up and do something about it…”
And he actually did something about it, he charged a former employee. Read more

Data Breach affecting ALDI stores’ payment terminals

October 8th, 2010 by Agent Smith (1) Data Theft & Loss,Identity Theft,security breach
Between June 1 and August 31 2010 illegal payment card terminals have apparently been placed in several ALDI stores by unauthorised individuals in order to obtain secured information. With the help of these terminals, private information such as name, card account and PIN number have been acquired.

According to ALDI sources, terminals in the following areas have been affected: Read more

Cyber gangs are taking over – street gangs will become obsolete

October 7th, 2010 by Agent Smith (0) endpoint security,Identity Theft,security breach

Cyber gangs appear to be one step ahead of e-crime experts.

UK Metropolitan police commissioner Sir Paul Stephenson, has stated that he believes police officers trained to fight against the growing number of cyber criminals are as vital as uniformed officers in the streets. In a letter to “The Sunday Telegraph” he outlines his beliefs that cutting back -office staff in favor of more street officers is wrong.

“Online fraud generated £52bn worldwide in 2007 – a staggering sum. There is a significant fight back by the financial institutions, working with police. In the Met, we play our part in a ‘Virtual Task Force’,” he said. Read more

Cyber criminals change targets – small fish are easier to catch?

October 6th, 2010 by Agent Smith (0) In the News,Research and Studies

Security experts have their eyes turned on Europe as the number of cyber crime operations emanating from here is growing. In the first half of 2010 Europe has surpassed Asia and the Americas in producing web-based threats.

Endpoint Security and Device Control Solutions with low TCO and great ROI.

One reason for the rise of European based threats might partly be due to the fact that the Chinese Government has forced it’s local ISP’s to curve illegal activities there. This politics are apparently one of the reasons for the migration of cyber criminals to Eastern Europe. Read more

Stuxnet and cyber warfare – the future is now

October 1st, 2010 by Agent Smith (0) In The Spotlight,Malware Infections

Back in 2008, assuming that the human factor would eventually fail at some point and people would make the mistake of plugging an unsecured memory stick into a military laptop, several memory sticks were scattered in a US military base in the Middle East that was providing support for the Iraq war. All these memory sticks were deliberately infected with a computer worm.

It resulted in the self-propagation of a computer worm into the computer system of Centcom – the central command of the US military. The eradication process took 14 months. Apparently this attack, acknowledged by the Pentagon only in august 2010, was very similar to a Stuxnet worm attack which was used in attempts against Iraq’s nuclear facilities and Iran’s nuclear programme. Read more