Rutgers grad student's desperate plea for return of data on stolen laptop going viral

A Rutgers University graduate student is having a terrible week, and now the whole world seems to know about it. When the student’s laptop was stolen on campus last Friday, he filed a police report and apparently printed leaflets begging for help, even offering the thief up to $1,000 for the safe return of the five years’ worth of data stored on the device he needs to defend his graduate thesis. 

VA Lawsuit Leads Breach Roundup

The lawsuit, which seeks unspecified damages, alleges "willful and intentional actions and reckless disregard" for the affected patients' privacy, according to a release from the Mike Kelly Law Group and Columbia attorney Doug Rosinski, who represent the plaintiffs. "Because the information was not encrypted or otherwise secured, the threat of identity theft, destruction of credit and health insurance fraud is high," the release states.

College Breach Leads Roundup

In this week's breach roundup, hackers unlawfully accessed archived information about applicants at an Iowa college. Also, a Department of Veterans Affairs medical center is notifying more than 7,400 patients of a breach stemming from a missing laptop.

Monthly Security Tips Newsletter: September, Using Encryption to Protect Data

According to the Privacy Rights Clearinghouse, more than 19 million records have been involved in a data breach so far this year.  Protection of data requires multiple layers of defense, and the use of encryption to secure sensitive data is a critical tool in this multi-layered approach. Encryption scrambles a message or file so only the sender and the authorized individual with the decryption key can decode it. Encryption solutions generally encompass two types: hardware and software.  Examples of hardware encryption include a pre-encrypted USB device or hard drive; software encryption consists of a program installed on a machine that encrypts some or all of the data on the system.

Laptop Breach: A Security Reminder

Indiana University School of Medicine is reminding faculty, staff and residents about the importance of encryption and other information security steps after the theft of an unencrypted laptop. The laptop containing information on about 3,200 patients was stolen Aug. 16 from the locked car of a physician who works at the school's department of surgery. The information, which the physician was using to conduct research, included patient names, ages, sex, diagnoses, medical record numbers and, in 178 cases, Social Security numbers.

Hacker can shut down Apple MacBook battery

How would a person blow up a laptop without even coming near it? By tampering with the software that runs its battery, said Miller, who demonstrated a way to hack into an Apple laptop battery and shut it down, but fell short of actually making it explode.

BP employee loses laptop containing data on 13,000 oil spill claimants

The personal information of 13,000 individuals who had filed compensation claims with BP after last year's Gulf of Mexico oil spill may have been compromised after a laptop containing the data was lost by a BP employee. The information, which had been stored in an unencrypted fashion on the missing computer, included the names, Social Security numbers, addresses, phone numbers, and dates of birth of people who filed claims related to the Deepwater Horizon accident.

Second Student Sues School District Over Webcam Spying

A webcam scandal at a suburban Philadelphia school district expanded Tuesday to include a second student alleging his school-issued laptop secretly snapped images of him.

Appeals court absolves firm that exposed man's SSN

A man whose social security number and other personal data were exposed by a company that processed his job application has no legal claims because no actual damage resulted from the privacy breach, a federal appeals court has ruled.

Using Windows for a Day Cost Mac User $100,000

David Green normally only accessed his company's online bank account from his trusty Maclaptop. Then one day this April while he was home sick, Green found himself needing to authorize a transfer of money out of his firm’s account. Trouble was, he’d left his Mac at work. So he decided to log in to the company’s bank account using his wife's Windows PC. Unfortunately for Green, that PC was the same computer his kids used to browse the Web, chat, and play games online. It was also the same computer that organized thieves had already compromised with a password-stealing Trojan horse program.

Syndicate content