Free Republic 4th Quarter Fundraising Target: $88,000 Receipts & Pledges to-date: $19,204
Woo hoo!! And the first 21% is in!! Thank you all very much!! God bless.

Keyword: datasecurity

Brevity: Headers | « Text »
  • OneLogin hacker swiped AWS keys, can decrypt stolen data

    06/05/2017 7:29:09 PM PDT · by piytar · 20 replies
    The Cybersecurity Source ^ | June 2, 2017 | Doug Olenick
    OneLogin is reporting its recent data breach was made possible when a hacker obtained access to a set of Amazon Web Service keys through a third-party vendor. With this, the hacker was enabled entry into its U.S. data center compromising all its records.
  • Whose Data Is It Anyway?

    05/04/2017 5:35:35 AM PDT · by Kaslin · 2 replies ^ | May 4, 2017 | Derek Hunter
    The days of hand written letters and notes is over, it’s all digital now. As such, we find ourselves in a weird position where our private thoughts aren’t sealed in an envelope, but basically handled in an accurate version of “telephone” by third party companies on the honor system that they won’t reveal them. The problem isn’t companies accessing what we voluntarily give them, it’s the sense of entitlement to that information the government has.The Internet is the greatest advancement in communication in human history; it’s also a potential invasion of privacy that would make George Orwell declare it implausible....
  • Precision Medicine Initiative and Data Security | (05/25/2016 White house decree)

    05/27/2016 11:59:49 AM PDT · by MarchonDC09122009 · 26 replies ^ | 05/25/2016 | Obama, HHS Secretary Sylvia Mathews Burwell
    Precision Medicine Initiative and Data Security | (05/25/2016 White house decree) Precision Medicine Initiative and Data Security May 25, 2016 at 3:00 PM ET by Secretary Sylvia Mathews Burwell, Lisa O. Monaco Twitter Facebook Email Summary: Today, we are pleased to release the final Data Security Policy Principles and Framework (Security Framework) for President Obama’s Precision Medicine Initiative (PMI).     “We’re going to make sure that protecting patient privacy is built into our efforts from day one.”     - President Barack Obama, January 30th 2015 The health care system of the future is taking shape right now, and...
  • Feds push forward with controversial health rule

    10/07/2015 8:42:28 PM PDT · by Tolerance Sucks Rocks · 26 replies
    The Hill ^ | October 6, 2015 | Sarah Ferris
    The Obama administration is moving ahead with controversial new rules that require doctors to switch to electronic health records or face fees, resisting calls from both parties to delay implementation. Federal health officials said the final rules released Tuesday will make “significant changes" in the "meaningful use" electronic health records program, such as lowering the number of standards each provider must meet and allowing providers to apply for hardship exemptions. But the administration will not delay what it calls "Stage 3" of the records program, a move that is already angering vocal Republicans like Sen. Lamar Alexander (R-Tenn.), who have...
  • Look Who's Data Mining Your Toddlers

    10/10/2014 4:16:48 AM PDT · by Kaslin · 12 replies ^ | October 10, 2014 | Michelle Malkin
    Attention, parents: Have your little ones been subjected to "TS Gold" in school yet? If you care about student privacy, data mining and classroom intrusions, you might want to start asking questions and protecting your children now before it's too late. What's happening here in Colorado with this onerous testing regime is happening everywhere. Informed families and teachers from all parts of the political spectrum agree: It's a Big Government/Big Business "gold" rush you don't want to join. "TS Gold" stands for Teaching Strategies Gold. This "school readiness assessment system" was mandated in our state several years ago. It has...
  • Daunting Mathematical Puzzle Solved, Enables Unlimited Analysis of Encrypted Data

    12/28/2013 10:40:30 AM PST · by null and void · 40 replies
    Scientific Computing ^ | Tue, 12/24/2013 - 10:20am | IBM
    ARMONK, NY — IBM inventors have received a patent for a breakthrough data encryption technique that is expected to further data privacy and strengthen cloud computing security. The patented breakthrough, called "fully homomorphic encryption," could enable deep and unrestricted analysis of encrypted information — intentionally scrambled data — without surrendering confidentiality. IBM's solution has the potential to advance cloud computing privacy and security by enabling vendors to perform computations on client data, such as analyzing sales patterns, without exposing or revealing the original data. IBM's homomorphic encryption technique solves a daunting mathematical puzzle that confounded scientists since the invention of...
  • Thanks Obamacare: You’re at Risk of Having Your ID Stolen and Your Bank Account Emptied

    12/04/2013 9:53:23 AM PST · by Kaslin · 11 replies ^ | December 4, 2013 | Daniel J. Mitchell
    There are many reason I don’t like Obamacare, including its punitive impact on taxpayers and the way it takes our healthcare system even further from a market-based approach. But now I’m increasingly worried Obamacare also is creating a playground for hackers and identity thieves – and the rest of us will be the victims. Simply stated, the results probably won’t be very pretty when you mix together these two items. 1) Typical government incompetence. 2) Massive data collection by government. I pontificate on these issues in an interview with Neil Cavuto. Dan Mitchell Discussing How the IRS and Obamacare May...
  • Hide files within files for better data security (within executables)

    05/09/2011 12:16:03 PM PDT · by decimon · 5 replies
    Inderscience Publishers ^ | May 9, 2011 | Unknown
    Using executable program files to hide data with steganographySteganography is a form of security through obscurity in which information is hidden within an unusual medium. An artist might paint a coded message into a portrait, for instance, or an author embed words in the text. A traditional paper watermark is a well-known example of steganography in action. At first glance, there would appear to be nothing unusual about the work, but a recipient aware of the presence of the hidden message would be able to extract it easily. In the computer age, steganography has become more of a science than...
  • A Review of the 2008 HIMSS Analytics Report: Security of Patient Data

    04/09/2008 10:58:15 AM PDT · by APRPEH · 3 replies · 92+ views
    APRPEH ^ | 3 Nissan 5768/8 April 2008 | APRPEH
    HIMSS Analytics (short for Healthcare Information and Management Systems Society); a “think-tank” for the healthcare management world has just released the 2008 HIMSS Analytics Report: Security of Patient Data. release info. This report examines the security of patient personal identifying information (PII) and protected health information (PHI). In the current data breach crazy world, this is a timely report which tries to get beneath the surface of the needs of health professionals to balance quick access to secure patient health records and the need to protect not only patient privacy but prevent access to information which could lead to identity...
  • Deloitte loses McAfee employee data [auditor loses unencrypted CD with data on 9,000 employees]

    02/27/2006 7:59:07 AM PST · by bwteim · 14 replies · 454+ views
    Computer Weekly ( ^ | February 27, 2006 | Antony Savvas
    Deloitte loses McAfee employee data by Antony Savvas Monday 27 February 2006 McAfee's auditor Deloitte & Touche USA LLP has lost an unencrypted CD containing the personal details of more than 9,000 of its employees. The auditor lost the CD when one of its employees left the disc in the back of an airline seat. Security software company McAfee was informed of the incident by Deloitte on 11 January, almost a month after the disc was lost. The disc was lost last December and McAfee has just finished sending out warning letters to the employees and former employees affected. The...
  • Blueprint for more-secure servers released ~~

    07/23/2005 9:59:56 AM PDT · by Ernest_at_the_Beach · 3 replies · 103+ views
    CNET ^ | uly 22, 2005, 6:18 PM PDT | Joris Evers Staff Writer, CNET
    The Trusted Computing Group has released a specification for servers with a special security chip, which the industry group says will better protect data and transactions. At the heart of the blueprint for "trusted servers" is the Trusted Platform Module, a chip that stores digital keys, certificates and passwords. The TPM is already used in PCs. More than 15 million "trusted clients" have been shipped by PC makers such as Hewlett-Packard and Dell, according to the TCG. Computers with the security chip can wall off data, secure communications and identify systems belonging to the company or to business partners. Servers...
  • Citibank admits: We've lost the backup tape

    06/08/2005 2:22:59 PM PDT · by softengine · 59 replies · 1,710+ views
    The Register ^ | Tuesday 7th June 2005 | Andrew Orlowski
    The retail finance division of Citigroup has admitted that a backup tape containing personal information on almost 4 million customers has gone missing. The United Parcel Service lost the tape on May 2nd, and it hasn't been seen since. CitiFinancial only noticed the tape was missing on May 20. The tape contains Social Security numbers and transaction histories on both open and closed accounts at the bank’s lending branches. Citigroup says it has no reason to believe the tape has been stolen, but alarmingly, the tape hasn't shown up at any UPS depot despite six weeks of searching. The company...
  • Your financial secrets are headed overseas

    01/31/2005 3:15:35 PM PST · by Willie Green · 10 replies · 414+ views
    MSN Money ^ | 1/31/2005 | Liz Pulliam Weston
    More credit, mortgage and tax files are being handled abroad. Nothing suggests your data are more vulnerable -- but an identity thief 10,000 miles away is virtually untouchable. Your best friend may not know how much you made last year or whether you've been late with a credit-card payment -- but an office worker in India might. Tax returns, mortgage applications, even credit-bureau files are among the sensitive financial data that cost-conscious American firms are quietly shipping overseas. Consider: As many as 500,000 U.S. tax returns could be prepared in India next year, says tax outsourcing expert Gary Boomer of...
  • Hacker Breaches T-Mobile Systems, Reads US Secret Service Email

    01/13/2005 11:16:20 AM PST · by Yonkers Finest · 28 replies · 1,957+ views
    The Register ^ | January 12, 2005 | By Kevin Poulsen
    Hacker Breaches T-Mobile Systems, Reads US Secret Service Email By Kevin Poulsen, SecurityFocus Published Wednesday 12th January 2005 09:47 GMT A sophisticated computer hacker had access to servers at wireless giant T-Mobile for at least a year, which he used to monitor US Secret Service email, obtain customers' passwords and Social Security numbers, and download candid photos taken by Sidekick users, including Hollywood celebrities, SecurityFocus has learned. Twenty-one year-old Nicolas Jacobsen was quietly charged with the intrusions last October, after a Secret Service informant helped investigators link him to sensitive agency documents that were circulating in underground IRC chat rooms....
  • I've Just Been Port Probed! (HELP!)

    01/29/2003 9:40:51 PM PST · by 50sDad · 34 replies · 287+ views
    SElf | 50sDad
    My nifty new MacAfee firewall says I was just "port probed" and traces it back to IP address at, with Kai Schlichting 342 E. Jericho Tpke. 187, Mineola NY 11501, I have reported it to, but that seems to be the company that did the probe. Is there any government (gak) agency I can report the attempted break in to?