Could
be all 80 million. Probably less.
Anthem
Hacked in ‘Sophisticated’ Attack on Customer Data
Anthem
Inc., the second biggest U.S. health insurer by market value, said
hackers obtained data on tens of millions of current and former
customers and employees in a sophisticated attack that has led to a
Federal Bureau of Investigation probe.
…
“As soon as we learned about the attack, we immediately made every
effort to close the security vulnerability, contacted the FBI and
began fully cooperating with their investigation,” Anthem said.
The Indianapolis-based company, formerly known as WellPoint, didn’t
provide information on how the breach occurred or when it was
discovered. [I
think this is a mistake Bob]
…
What is known is that the malicious software used to infiltrate the
network and steal data was customized, which can be a sign of an
advanced attacker, and is a variant of a known family of hacking
tools, De Souza said. What’s
rare in this case is that Anthem discovered the breach itself,
instead of being alerted to it by a third party such as a bank or a
credit-card company, De Souza said.
“We
found DNA at the scene and this guy's got DNA so he's guilty!”
Denver
police DNA mistake frees man after two months in jail on sex-assault
charge
… According to a statement released by Denver police, the initial
investigation indicated that Hale's DNA matched DNA directly related
to the assault.
… Hale's DNA was found at the scene, police said, but the DNA
evidence did not implicate him in the sexual assault.
Ha!
I knew lawyers were anti-social! But seriously, if you want to be
secure/private, you have to control access. If you can gain access
to my private data without my knowledge and consent, it was never
private in the first place!
Jason
C. Gavejian writes:
As we previously
reported, sending a ”friend” request to access information on
an individual’s Facebook page that is not publicly available may
have serious ethical implications. Specifically, the New
Jersey Office of Attorney Ethics (OAE) alleges John Robertelli
and Gabriel Adamo violated
the Rules of Professional Conduct, including those governing
communications with represented parties, when they caused a paralegal
to “friend” the plaintiff in a personal injury case so they could
access information on the plaintiff’s Facebook page.
Read
more on Jackson Lewis Workplace
Privacy Data Management & Security Report.
(Related)
As long as we're talking about Privacy... (Maybe Facebook users
aren't intellectuals?)
Neil
Schoenherr writes:
In our increasingly digital world, the balance between privacy and
free speech is tenuous, at best.
But we often overlook the important ways in which privacy is
necessary to protect our cherished civil liberties of freedom of
speech, thought and belief, says Neil M. Richards, JD, a privacy law
expert at Washington University in St. Louis and author of the new
book, “Intellectual
Privacy: Rethinking Civil Liberties in the Digital Age,”
published Feb. 2 by Oxford University Press.
Read
more on Washington
University in St. Louis Newsroom.
(Related)
Facebook no longer has privacy.
Social
Network Privacy Social Networking facebook in re Facebook
EPIC
– With New Policy Changes, Facebook Tracks Users Across the Web:
“Over the objections of consumer privacy organizations, Facebook
has implemented policy
changes that allow the company to track users across the web
without consent. The Dutch
data protection commissioner launched an investigation after the
original announcement. This week the a
German privacy agency announced a similar investigation. Last
year, EPIC and a coalition of consumer privacy groups urged
the FTC to halt Facebook’s
plan to collect web-browsing information from its users.
Facebook is already under a 20
year consent decree for changing users’ privacy settings. The
consent decree resulted from complaints brought by EPIC and others in
2009
and 2010.”
I
would have thought this was obvious. You know what you want, here it
is piled up with no effort required on your part and no hint that you
were in your target's system (because you were not!)
Glenn
Greenwald reports:
The U.S., U.K. and Canadian governments characterize hackers as a
criminal menace, warn of the threats
they allegedly pose to critical infrastructure, and aggressively
prosecute them, but they are also secretly exploiting their
information and expertise, according to top secret documents.
In some cases, the surveillance agencies are obtaining the content of
emails by monitoring hackers as they breach email accounts, often
without notifying the hacking victims of these breaches. “Hackers
are stealing the emails of some of our targets… by collecting the
hackers’ ‘take,’ we . . . get access to the emails
themselves,” reads one top secret 2010 National Security Agency
document.
[…]
GCHQ created a program called LOVELY HORSE to monitor and index
public discussion by hackers on Twitter and other social media.
Read
more on The
Intercept.
Interesting.
Let's give special attention to anyone using an App like this.
Clearly they have something to hide! My Ethical Hackers know how to
fake “touch detected” coordinates.
This
App Actually Lets You Send Screenshot-Proof Messages And Photos
…
Confide,
an app that launched in January 2014 as a way to send confidential
texts, just added the ability to send documents and photos.
Here’s
how Confide protects your messages from being saved via screenshot:
You can only view tiny pieces of the words, photo or document that
you receive. In order to see a message sent to you, you have to push
down on your screen with your finger. Only the portion under your
finger is visible. Once you’ve read the message, it disappears
completely.
…
Confide, which is free on
Android and iOS devices, was able to completely disable
in-app screenshots for Android users.
Imagine
all the fans who could not get tickets to the next World Cup sending
their drones instead. Clouds of hundreds of drones swarming to the
ball.
Patt
Morrison reports:
Hard cases, said a long-ago Supreme Court justice, make bad law. The
startling outliers shouldn’t be the yardstick for crafting routine
criminal law. When a tipsy off-duty employee of the National
Geospatial-Intelligence Agency lost control of his friend’s drone
last month and smashed it onto the White House lawn, the cry went up
for more drone regulation. But the incident was an oddity; the
real legal questions about drone regulation have to do with
privacy, policing, commerce and other uses. Ryan Calo, a law
professor at the University of Washington, specializes in robotics.
The White House drone flew right onto his radar.
Read
more on Los
Angeles Times.
Five
simple rules.
CDT
Letter on Body Cameras to the Task Force on 21st Century Policing
“The
Center for Democracy & Technology (CDT) provided
recommendations related to body-worn cameras in response to the Task
Force on 21st Century Policing consideration of the issue and
request for public comment. With use of body cameras rapidly
expanding across the country2 and federal legislation being offered
for nationwide use, CDT is pleased to see the Task Force addressing
this important new technology, and its impact on privacy and civil
liberties.”
Even
though oil prices have jumped, analysts say they will go lower.
http://www.cnbc.com/id/102399810?__source=google|editorspicks|&par=google&google_editors_picks=true
Oil
heading for $30, currency war coming: Analysts
…
"I still believe we're going to go to that $30 to $33 area,
which is the low point from the financial crisis in 2008, 2009. What
you saw over the past several days was technical in nature, a short
squeeze. This volatility is a little crazy and I think that $30
target is a downside target is for technicians that are in this
market," the founding partner of Again Capital said in a "Squawk
Box" interview.
Perspective.
There is a reason why they call it Big Data. Can no one do Math (or
proof read)?
77
Open Source Storage Applications
As the volume of digital data continues to grow, storage becomes a
bigger and bigger problem for both home users and organizations.
According to the latest Digital
Universe study by IDC, 4.4 zettabytes (4.4 billion terrabytes) of
digital information existed in 2013, and the amount of data is
doubling every two years. That means by the end of 2015, there will
be 8.8 zettabytes in our world, and by 2010, there will be 44
zettabytes, enough to fill a stack of tablets stretching to the moon
and back six times.
Tools
for social media managers?
5
Social Media Tools That Will Make You Look like the Boss
…
keeping on top of all the ever-expanding social
media tools can be a full-time job in itself. How do you know if
your posts are being seen by the right people? How do you know if
you are hanging out with the right people? Here are 5 social media
tools that will make you look like the Boss.
Another
discussion starter for my Data Management class?
Your
Data Should Be Faster, Not Just Bigger
It’s
universally acknowledged that Big Data is now a fact of life, but
while large enterprises have spent heavily on managing large volumes
and disparate varieties of data for analytical purposes,
they have devoted far less to managing high velocity data.
That’s a problem, because high velocity data provides the basis for
real-time interaction and often serves as an early-warning system for
potential problems and systemic malfunctions.
No comments:
Post a Comment