Friday, February 27, 2009

At some point, organizations will realize that “good enough,” even “generally accepted,” may not be sufficient to allow survival. At what point will the potential losses (or even the costs of successfully defending against the suits) cause the auditors to question their ability to remain a “going concern?”

http://www.databreaches.net/?p=1862

And the Heartland lawsuits pile on and up

February 26, 2009 by admin

On Tuesday morning, Heartland Payment Systems President and CFO, Bob Baldwin, stated during a conference call:

Today, we have had several lawsuits filed against us and we expect that additional lawsuits will be filed. We are also the subject to several governmental investigations and enquiry , including an informal enquiry by the SEC and a related investigation by the Department of Justice, an inquiry by the OCC, and an inquiry by the FTC, and we may, in the future, be subject to other governmental enquiries and investigation.

As of this afternoon, I see 16 lawsuits for individual or class action as well as the following lawsuits by banks and credit unions in various federal district courts:

More will almost undoubtedly follow.



Interesting. Colorado is Number One in Fraud, but Number 10 in Identity Theft. When we get to the Metropolitan area breakout, it looks like Greeley (Swift meat and illegal immigrant tax returns?) is responsible. NOTE: 65% of these were never reported to the police!

http://www.pogowasright.org/article.php?story=20090226133007757

FTC Releases List of Top Consumer Complaints in 2008

Thursday, February 26 2009 @ 01:30 PM EST Contributed by: PrivacyNews

The Federal Trade Commission today released the list of top consumer complaints received by the agency in 2008. The list, contained in the publication “Consumer Sentinel Network Data Book for January-December 2008,” showed that for the ninth year in a row, identity theft was the number one consumer complaint category. Of 1,223,370 complaints received in 2008, 313,982 – or 26 percent – were related to identity theft.

The report breaks out complaint data on a state-by-state basis and also contains data about the 50 metropolitan areas reporting the highest per capita incidence of fraud and other complaints. In addition, the report sets forth the 50 metropolitan areas reporting the highest incidence of identity theft.

The report states that credit card fraud was the most common form of reported identity theft at 20 percent, followed by government documents/benefits fraud at 15 percent, employment fraud at 15 percent, phone or utilities fraud at 13 percent, bank fraud at 11 percent and loan fraud at four percent.

Source - FTC

Related - Consumer Sentinel Network report (pdf)



Is the Fifth at risk? Perhaps this the equivalent of closing the drapes after the cops watch you water your marijuana plants? However, could there be even more serious crimes revealed by decrypting the drive?

http://yro.slashdot.org/article.pl?sid=09/02/26/2157256&from=rss

US District Ct. Says Defendant Must Provide Decrypted Data

Posted by timothy on Thursday February 26, @05:31PM from the narrow-ruling dept. Privacy Data Storage Encryption The Courts

An anonymous reader writes

"If you're planning on traveling internationally with a laptop, consider the following: District Court Overturns Magistrate Judge in Fifth Amendment Encryption Case. Laptop searches at the border have been discussed many times previously. This is the case where a man entered the country allegedly carrying pornographic material in an encrypted file on his laptop. He initially cooperated with border agents during the search of the laptop [Apparently this was his downfall. Bob] then later decided not to cooperate citing the Fifth Amendment. Last year a magistrate judge ruled that compelling the man to enter his password would violate his Fifth Amendment right against self-incrimination. Now in a narrow ruling, US District Judge William K. Sessions III said the man had waived his right against self-incrimination when he initially cooperated with border agents."

sohp notes that "the order is not that he produce the key — just that he provide an unencrypted copy."



It will be interesting to see if this is the solution the Rocky Mountain News should have tried. My guess is no.

http://news.cnet.com/8301-1023_3-10173378-93.html?part=rss&subj=news&tag=2547-1_3-0-5

Newsday to begin charging for online news

by Steven Musil February 26, 2009 6:25 PM PST

New York newspaper Newsday plans to begin charging online readers for access to its content, rejecting a trend toward free online newspaper content.

… "Our goal was, and is, to use our electronic network assets and subscriber relationships to transform the way news is distributed," said Tom Rutledge, Cablevision's chief operating officer, according to a Reuters report on the call. "We plan to end distribution of free Web content and to make our news gathering capabilities service our customers."

Rutledge did not elaborate on the company's online subscription plans, but Newsday publisher Timothy Knight hinted that the move could be used in a bundling arrangement to cross-promote content on the newspaper site and in Cablevision's television programming. [So someone on the TV news says, “If you want to know more about this story, go online and pay for it?” Bob]



Another new business model? Not what the commenters think.

http://hardware.slashdot.org/article.pl?sid=09/02/27/049245&from=rss

Bunnie Huang on China's "Shanzai" Mash-Up Design Shops

Posted by timothy on Friday February 27, @01:53AM from the gibsonstephensonesque dept. Hardware Hacking Technology

saccade.com writes

"Bunnie (of XBox hacking and Chumby fame) has written an insightful post about how a new phenomena emerging out of China called 'Shanzai' has impacted the electronics business there. A new class of innovators, they're going beyond merely copying western designs to producing electronic "mash-ups" to create new products. [Reminds me of Panasonic, who mashed a clock with a radio and “invented” the clock-radio. Bob] Bootstrapped on small amounts of capital, they range from shops of just a few people to a few hundred. They rapidly create new products, and use an "open source" style design community where design ideas and component lists are shared."


Related? Unintended consequences.

http://www.wired.com/gadgets/wireless/magazine/17-03/mf_netbooks?currentPage=2

The Netbook Effect: How Cheap Little Laptops Hit the Big Time

By Clive Thompson

… By the end of 2008, Asustek had sold 5 million netbooks, and other brands together had sold 10 million. (Europe in particular has gone mad for netbooks; sales there are eight times higher than in the US.) In a single year, netbooks had become 7 percent of the world's entire laptop market. Next year it will be 12 percent.



Worth looking at. Perhaps my White Hat Hackers would find this one useful?

http://www.killerstartups.com/Web-App-Tools/hyperwebenable-com-services-for-a-connected-world

HyperWebEnable.com - Services For A Connected World

http://www.hyperwebenable.com/

Do you want to have your own website for free? Do you want that website to have only your name without any other extension attached to it?

Well, in that case you should take a look at this website. This online resource gives you the unique opportunity to be easily recognized through your website’s name and much more than that.

There are many services that offer you to have a website with your name, but with the scratchy detail that your name will be followed by their company’s name.

… This might be a very good way to monetize your website, getting an unlimited bandwidth along with other services offered by the company.

If you are looking for this kind of services, opening this portal could show you the way to get the website you have always wanted.



Could be handy while traveling. I'll probably add this to my Swiss Army Folder...

http://www.killerstartups.com/Web-App-Tools/icloud-com-getting-in-the-cloud

iCloud.com - Getting In The Cloud

http://www.icloud.com/

iCloud is a solution which serves a specific function: letting you access your desktop from anywhere a web-enabled computer is available. All settings are preserved, while documents and icons are accessed using this tool as if you were sitting in front of your desktop at home.

Moreover, iCloud can be employed both via web browsers and mobile devices. That is a crucial aspect when it comes to applications such as this one, as the contemporary constrains and train of life call for solutions that leave no facet uncovered. It was only natural that a functionality like that would be accounted for.

For its part, social network capabilities are already built it into iCloud, and tools for online collaboration are equally accounted for. This adds more icing to the cake, and it is an aspect that I think should be prioritized.

No comments: