California


California Attorney General Fighting for Mobile Privacy Rights

UPDATE – In an attempt to reign in the tendency of indifference toward consumer privacy among mobile application developers, California Attorney General Kamala D. Harris today made public a list of guidelines regulating the ways in which mobile application developers and technology companies handle user data and educate users about what they intend on doing with that data.

Disaster Recovery Disaster: Drill Gone Wrong Leads To Loss Of Data On 800K

Call it a disaster recovery drill disaster. The loss of four magnetic tape cartridges containing data on 800,000 California residents was the unfortunate result of an IBM-managed disaster recovery exercise gone wrong, said Christine Lally, Assistant Secretary, Legislation & Communications for the California Technology Agency. 


Officials from the Department of Health and Human Services’ Office for Civil Rights have revised their list of healthcare information breaches over the past month to include 16 additional incidents, according to a GovInfoSecurity.com report.

Terry Coffey of Anchorage, Alaska, said that he first became aware of a problem with his iTunes account when he received a receipt for a $50 iTunes gift card purchase. Coffey, who says he’s careful with his money, was immediately suspicious and investigated the charge, but couldn’t find any record of it on any of his credit card statements. A closer look at his iTunes account revealed why: unknown assailants had seized control of his account and modified the credit card information associated with it. A different credit card number had been used, listing and Coffey’s address had been changed from Anchorage to a city in Tennessee. The fraudulent credit card account was used to purchase the gift card as well as a single iTunes song, Coffey said.

SAN FRANCISCO– The news keeps getting worse for security firm HBGary Federal. Members of the online mischief-making group Anonymous posted another cache of 20,000 company e-mails Sunday, following a similar disclosure last week. But the real damage from the leak may be yet to come, as sophisticated attackers mine the email trove for information on the company’s business contacts, including U.S. military, intelligence and law enforcement organizations, that could be used later in targeted attacks.

Subscribe to our newsletter, Threatpost Today!

Get the latest breaking news delivered daily to your inbox.