Sami Paracha of Taylor Wessing has an article on cyber-extortion and ransom demands from a UK perspective. It makes for interesting reading. The article begins: Cyber Security is an omnipresent risk for most businesses. And it is a growing risk given the more frequent and serious cyber attacks, higher costs for proactively managing these risks […]
Source: databreaches

Betsy Hammond reports: Two separate audits found the Oregon Department of Education didn’t do enough to ensure that its huge cache of data on more than 600,000 students remains private. Hundreds of people in school districts and in state government have access to some or all of that data. That means keeping it safe is […]
Source: databreaches

From Recorded Future: Key Takeaways Adobe Flash Player provided six of the top 10 vulnerabilities used by exploit kits in 2016. Since our 2015 ranking, Flash Player’s popularity with cyber criminals remains after increased Adobe security issue mitigation efforts. Vulnerabilities in Microsoft’s Internet Explorer, Windows, and Silverlight rounded out the top 10 vulnerabilities used by […]
Source: databreaches

Ian Smith reports: A recent report from the Treasury Inspector General for Tax Administration (TIGTA) found that IRS employees sent unencrypted emails which contained 8,031 different taxpayers’ personally identifiable information. According to the report, TIGTA found 326 unencrypted emails containing taxpayer data. 275 of the emails were sent internally within IRS, while 51 emails were […]
Source: databreaches

Here’s your must-read today on LabMD’s challenge to the FTC  by Gus Hurwitz, who, like this blogger, has been criticizing the FTC’s over-zealous enforcement for the past three years. Unlike this blogger, however, Gus is actually a lawyer. 🙂 When LabMD prevails in the Eleventh Circuit, as I am hopeful they will, I will talk to Gus […]
Source: databreaches