Items Tagged with "Legal"


Fc152e73692bc3c934d248f639d9e963

PCI: An Open Letter To Acquiring Banks

August 26, 2010 Added by:PCI Guru

Get with the program people! The PCI program flounders in part because one of the key constituents is not on board. It is time for the PCI SSC and the card brands to educate the acquiring banks and get them engaged...

Comments  (2)

A7290c5bd7bc2aaa7ea2b6c957ef639b

E-Discovery: Other Shoe Drops in Adams v. Dell

August 25, 2010 Added by:David Navetta

In one of the most watched and controversial electronic discovery cases from 2009, the federal court in Utah held that the defendant Asus Computer International had violated their duty to keep certain electronic and paper documents relevant to a federal action for alleged patent infringement...

Comments  (0)

4e714dc795dc50b932e2a837e3efc472

Security Patents Invite Hacker Exploitations

August 24, 2010 Added by:Joe Morrissey

If you had devised a new, novel, non-obvious lock for protecting your house – would you give thieves a drawing of the lock so they could fabricate a key? No, bloody right you wouldn’t – nor would I. But in filing a patent, that is exactly what we would be required to do...

Comments  (17)

6d117b57d55f63febe392e40a478011f

No Internet Kill Switch is No Guarantee

June 13, 2010 Added by:Anthony M. Freed

In continued efforts to centralize the cybersecurity authority within the White House, more than 40 bills have been introduced that will dramatically alter the balance of power between the government and the private sector. Protecting Cyberspace as a National Asset Act of 2010 will shift the responsibility of federal agency cybersecurity from the Office of Management and Budget (OMB) to DHS by cre...

Comments  (3)

37d5f81e2277051bc17116221040d51c

Parents Navigating the Social Media Mess

April 14, 2010 Added by:Robert Siciliano

Children say and do things that make them vulnerable to dangers in the outside world. A parent can parent all day long and do everything possible to protect their kids from themselves, but a child’s persistence to have their way can wear a parent down. It’s a constant fight that makes a parent adopt a philosophy where they “pick their battles.”

Comments  (0)

65be44ae7088566069cc3bef454174a7

How to Protect Your Privacy After You Die

April 06, 2010 Added by:Rebecca Herold

Some time ago, I read a news report about a family who wanted to obtain the email messages of their son who had been killed in Iraq. Wow.  I hadn’t thought about all my electronic virtual possessions, such as emails and files.

Comments  (2)

37d5f81e2277051bc17116221040d51c

Be careful Your PC Isn’t Held for Ransom

April 06, 2010 Added by:Robert Siciliano

Computerworld reported that a hacker threatened to expose health data and demanded $10 million from a government agency. The alleged ransom note posted on the Virginia DHP Prescription Monitoring Program site claimed that the hacker had backed up and encrypted more than 8 million patient records and 35 million prescriptions and then deleted the original data. “Unfortunately for Virginia, the...

Comments  (0)


From the Web

Durex condom orders exposed on the Internet

March 22, 2010 from: Office of Inadequate Security

Remember the Astroglide breach, when customers who ordered samples of the lubricant had their personal details exposed online? Now there are allegations that Durex condom orders were leaking on the web.

Comments  (0)


From the Web

Relationships with Foreign Business Partners

March 15, 2010 from: Greg George

As business leaders continue to reach out and embrace global opportunities, the ability to recognize and mitigate operational threats is paramount....a recent memorandum discusses 28 countries having serious deficiencies in their strategies for countering money laundering and financial terrorist activities

Comments  (0)


From the Web

19 more financial sector breaches from 2009

February 27, 2010 from: Office of Inadequate Security

Maryland has updated its web site to provide breach notifications that it has received since its last update.  The newly posted notifications are for the period ending December 31, 2009, so there will likely be more to come for 2010

Comments  (0)


From the Web

21 more business sector breaches from 2009

February 27, 2010 from: Office of Inadequate Security

Maryland has updated its web site to provide breach notifications that it has received since its last update.  The newly posted notifications are for the period ending December 31, 2009, so there will likely be more to come for 2010

Comments  (0)


From the Web

Banks, Businesses, Viruses and the UCC

February 24, 2010 from: Rsnake's blog at ha.ckers.org

There’s an interesting post over at Krebs On Security talking about some poor company that is going bankrupt because TD Bank allegedly will not give them their money back after it was stolen out of their account.

Comments  (1)


From the Web

Nevermind, I Was Wrong, Google Is Evil

February 15, 2010 from: Rsnake's blog at ha.ckers.org

I [,RSnake have] been waiting a while to do this post - several weeks actually since my original post. In that post, I applauded Google’s apparent interest in reigning censorship as “the first really truly non-evil thing I have seen Google do in years”. Since then, I thought it appropriate to give them some time to sift through the nuances of their blog post - you know, to give t...

Comments  (11)


From the Web

China Shut Down Biggest Hacker Training Site

February 09, 2010 from: Saumil's Infosec Blog

What is believed to be the country's biggest hacker training site has been shut down by police in Central China's Hubei province. Three people were also arrested, local media reported yesterday. The three, who ran Black Hawk Safety Net, are suspected of offering others online attacking programs and software, a crime recently added to the Criminal Law. A total of 1.7 million yuan ($249,000) in asse...

Comments  (2)


From the Web

Heartland Payment Systems and Visa Inc. Announce Acceptance Rate of Over 97 Percent for Data Security Breach Settlement Agreement

February 05, 2010 from: Office of Inadequate Security

Financial institutions representing more than 97 percent of eligible Visa-branded credit and debit cards have accepted the Alternative Recovery Offers they received pursuant to the settlement entered into by Visa Inc. (NYSE:V), Heartland Payment Systems® (NYSE: HPY) and Heartland’s sponsoring acquirers last month. This level of acceptance fulfills the 80 percent opt-in condition that was...

Comments  (0)

34200746591339726df9791b17bc885c

In Rebuke of China

February 02, 2010 Added by:Tom Schram

In the current issue of Foreign Affairs, former NATO Commander General Wesley K. Clark and current Department of Veteran Affairs CTO Peter Levin write:  “There is no form of military combat more irregular than an electronic attack: It is extremely cheap, is very fast, can be carrier out anonymously, and can disrupt or deny critical servi...

Comments  (3)

Page « < 19 - 20 - 21 - 22 - 23 > »