The Examiner reported about 4 health care data breaches on the 20th. See if you can find a common element. Information on 21,000 California Blue Shield customers, including health care info, was compromised when a vendor call center employee was socially engineered, their login information compromised and their customer data stolen. Last week Montana’s New […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As the folk music group Peter, Paul and Mary wrote in 1962 – about a completely different subject – When Will They Ever Learn? It appears that, for software companies, the answer is a big question mark. First Juniper got caught with a hard coded back door of unknown origins in their routers and firewalls. Then Cisco […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
There is an article in Cyber Security Docket talking about the SEC’s new strategy of issuing subpoenas for electronic storage devices or ESDs. Rather than asking for documents, they are asking for devices. Without getting into a legal argument about whether the Securities Exchange Act of 1934 (almost a century old) contemplated thumb drives or […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
The National Highway Traffic Safety Administration (NHTSA) put on a forum yesterday to discuss cyber security and cars. The conclusion of the author of the article on the subject is that cars will never be secure. I don’t know if I am THAT pessimistic, but it is certainly a difficult problem because of conflicting requirements […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
If you have followed me for any time, you know that I often say that you can pick security or convenience, but not both. Here is another example of that. WiFi Protected Setup was a mechanism created by the manufacturers because users were having too much trouble setting up WiFi connections, which reduces sales. In […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
As I predicted (which did not require a large amount of clairvoyance) after the Cottage Health fiasco, insurance companies prefer to deposit premium checks and have begun to fight cyber insurance claims. Since most people don’t read their insurance policies and even fewer make sure that they are in compliance with the terms of the […]
Continue reading →
[DISPLAY_ACURAX_ICONS]