One-third of used computers still contain sensitive information

by Karen Kavanaugh BLOGIVERSITY.ORG Retrieved 14 May 09 Go to Original Article One-third of used computers still contain government, military, banking, medical, business information ID theft All about how it happens and how you can keep it from happening to you. One-third of used computers still contain government, military, banking, medical, business information One of […]

One-third of used computers still contain sensitive information Read More »

Former child support worker nabbed for selling stolen personal info

The CityPaper Retrieved 16 Apr 09 Go to Original Article A former child support worker was arrested after attempting to sell the personal information — including names, Social Security numbers and bank account numbers — of 1,600 people. Steven K. Gilmore of Nashville, 27, was arrested late Wednesday and made his first appearance in federal

Former child support worker nabbed for selling stolen personal info Read More »

Stolen-data trove offers look inside a botnet

By Jordan Robertson, Associated Press USA Today Retrieved March 16, 2009 Go to Original Article SAN FRANCISCO — Getting hacked is like having your computer turn traitor on you, spying on everything you do and shipping your secrets to identity thieves. Victims don’t see where their stolen data end up. But sometimes security researchers do,

Stolen-data trove offers look inside a botnet Read More »

FAA suffers massive data breach; more than 45,000 affected

By Mary Mosquera Federal Computer Week Retrieved February 12, 2009 Go to Original Article The Federal Aviation Administration has notified employees that one of its computers was hacked, and the personally identifiable information of more than 45,000 employees and retirees was stolen electronically. All affected employees will receive individual letters to notify them about the

FAA suffers massive data breach; more than 45,000 affected Read More »

Florida Senate Passes Data Destruction Bill

February10, 2009 The Florida Senate passed Bill S1366 that directs the use of the National Institute of Standards and Technology’s guidelines concerning media sanitization on end-of-life electronic data.    These guidelines require “purge” level or higher data destruction and are addressed in NIST SP 800-88.  The bill, in part, reads: “An act relating to data

Florida Senate Passes Data Destruction Bill Read More »

Watch out! Privacy litigation damages becoming more viable

By Mark Foley, Digital Lex: WTN NewsRetrieved February 3, 2009Read Original Article   Watch out! Privacy litigation damages becoming more viable A recurring problem in modern litigation is the inadvertent disclosure of materials subject to the attorney-client privilege or the attorney work product protection. New Federal Rule of Evidence 502 changes the rules concerning waiver

Watch out! Privacy litigation damages becoming more viable Read More »

Major Data Breaches Predicted as Firms Cut IT Spending

by John KennedyRetrieved from www.siliconrepublic.com 12/1/08 | 1:57PM CST go to original article at SiliconRepublic Major data breaches predicted as firms cut IT spending As the recession continues to bite and firms look at ways of cutting corners on spending, it is vital companies don’t scrimp on protecting their data assets. While weakening economic conditions

Major Data Breaches Predicted as Firms Cut IT Spending Read More »

Shopping Cart
Scroll to Top