Thursday, September 24, 2009

Definitely something to watch. If I read this correctly, I can annotate your website. Will you like what I say? Can you do anything about it?

http://www.google.com/sidewiki/intl/en/learnmore.html

Google Sidewiki

Google Sidewiki is a browser sidebar that lets you contribute and read information alongside any web page.



Perhaps not the best strategy.

http://www.pogowasright.org/?p=4108

Acorn sues filmmakers, cites privacy law

September 24, 2009 by Dissent Filed under Breaches, Court

Ben Nuckols of Associated Press reports:

Acorn and two former employees of its Baltimore office filed a multimillion-dollar lawsuit Wednesday against the makers of a hidden-camera video that showed the employees giving tax advice to a man posing as a pimp and a woman posing as a prostitute.

[...]

The lawsuit names James O’Keefe III and Hannah Giles, who played the pimp and prostitute in the video, as defendants. It also names conservative columnist and blogger Andrew Breitbart of Los Angeles, who posted it on his Web site, biggovernment.com.

Read the full story on Delaware Online. The lawsuit alleges that the defendants violated Maryland Wiretap Law.

Related: Complaint (pdf)



Factual but ultimately futile? “We're your bank, our money is safe with us!”

http://www.databreaches.net/?p=7505

Construction firm sues after $588,000 online theft

September 24, 2009 by admin Filed under Breach Incidents, Business Sector

Jeremy Kirk reports:

A construction company in Maine is suing its bank after about $588,000 disappeared from its accounts, alleging the bank failed to spot suspicious account activity before it was too late.

Over a week-long period in May, fraudsters made six transfers from the online bank accounts of Patco Construction Company, a family-owned developer in Sanford, Maine, according a copy of the lawsuit on the Washington Post’s Web site.

[...]

Patco argues that Ocean Bank did not offer two-factor authentication, which often involves the use of a token that displays a one-time password or a verification telephone call.

Patco also said the transfers were initiated from IP (Internet Protocol) addresses that had never been used by Patco, the transfers far exceeded what the company normally performed and were on days other than Friday, when the company paid its employees by direct deposit.

None of these transactions triggered any suspicious activity alerts on the part of Ocean Bank,” the lawsuit alleges.

Read more in The Standard.



Can politicians be that ignorant? How does this protect anything?

http://www.databreaches.net/?p=7489

Ohio Officials, Insurers Look to Protect Policyholder Data

September 23, 2009 by admin Filed under Legislation, State/Local

Starting Nov. 2, 2009, Ohio regulators and all insurance companies that do business in the state will begin new procedures designed to protect policyholders’ personal information.

Insurance companies will be required to report any loss of policyholder information within their possession to the Department of Insurance within 15 days of the discovery that the information has been lost or stolen, according to Insurance Director Mary Jo Hudson.

Read more on Insurance Journal.

[Here is the actual “Bulletin”:

http://www.insurance.ohio.gov/Legal/Bulletins/Documents/2009-12.pdf



Well, here's a shocker.

http://www.pogowasright.org/?p=4088

Sneak-and-peek’ searches being used for regular crimes

September 23, 2009 by Dissent Filed under Featured Headlines, Govt, Surveillance, U.S.

Raw Story reports:

The Justice Department made 763 requests for “sneak-and-peek” warrants in 2008, but only three of those had to with terrorism investigations, Sen. Russ Feingold told a Senate Judiciary Committee hearing on Wednesday.

“Sneak-and-peek” warrants allow law enforcement officials to break into homes and businesses and search the premises without the investigated party knowing. The authority for them was passed as part of the USA Patriot Act in late 2001, ostensibly as a counter-terrorism measure.

Read the full article on Raw Story.

Video of some of Assistant Attorney General Dave Kris’s testimony and interaction with Senator Feingold:

http://www.youtube.com/watch?v=r0E9iX2ivd0&feature=player_embedded#t=55



...and we thought texting while driving was dangerous!

http://news.cnet.com/8301-13515_3-10359425-26.html

12mail: Short video messaging arrives on iPhone

by Harrison Hoffman September 23, 2009 7:28 AM PDT

12seconds.tv, a micro video messaging service dubbed by some as "Twitter for video," is bringing the same short format to private video messaging in its second iPhone app, 12mail.

The basic gist of the app, released this week, is that you can record a video, up to 12 seconds, and send it off to one of your friends. Your friend then gets a push notification and can watch it.



For my Business Continuity students. Can you say “Clogged filters?”

http://tech.slashdot.org/story/09/09/23/222208/Aussie-Data-Centres-Brace-For-Dust-Storm-Barrage?from=rss

Aussie Data Centres Brace For Dust Storm Barrage

Posted by samzenpus on Thursday September 24, @12:48AM from the sand-gets-in-your-tubes dept.

An anonymous reader writes

"Data centers and telcos in the Australian cities of Sydney and Brisbane have shut off external ventilation systems, restricted loading dock access and attended false alarms after a major dust storm choked the cities today. The storm is said to be the worst of its type ever recorded in Australia. Macquarie Telecom disengaged automatic deployment of fire-prevention gas from the fire alarm to prevent gas being released on a false alarm. Other major data center operators reported clogged air filters and heat exchangers and said they would be performing cleaning and maintenance operations this week."



Seven e-book sites.

http://news.cnet.com/8301-17939_109-10358046-2.html?part=rss&subj=news&tag=2547-1_3-0-20

Find a great e-book to read online with these sites

by Don Reisinger September 23, 2009 1:24 PM PDT



Tools & Techniques: Forensics

http://www.makeuseof.com/tag/how-to-recover-data-from-a-corrupt-memory-card-or-usb-drive/

How to Recover Data From a Corrupt Memory Card or USB Drive

Sep. 24th, 2009 By Karl L. Gechlik

No comments: