A month after losing his laptop to theft, London-based Dom Deltorto was surprised when the tracking software on his laptop tracked it in Tehran, Iran. And much to his surprise, the laptop even began sending back images of the family who it seems purchased his laptop and were now using it . tech2 reports that although…
Category: Breaches
SEC and CFTC Will Now Enforce Identify Theft ‘Red Flag’ Rules
Joe Mont reports: The Securities and Exchange Commission on Wednesday adopted rules requiring broker-dealers, mutual funds, investment advisers and other “financial institutions” and “creditors” to adopt programs for detecting and responding to cases of identity theft. The rules, adopted jointly with the Commodity Futures Trading Commission also apply to the futures commission merchants, retail foreign…
Ex-police union lawyer subject of biggest privacy breach in driver’s database scandal
Marino Eccher and Mary Divine report: Brooke Bass spent her legal career looking out for the best interests of police officers. They were looking out for her, too, her lawyer says — but in a different way. In the past eight years, more than 100 entities across Minnesota — nearly all of them law enforcement…
Warren Hospital can ask Internet service provider to identify hackers
Lillian Shupe reports: One or more people who allegedly hacked a hospital computer network may no longer hide their identities behind the anonymity of their computers, according to a ruling from The Appellate Division of the New Jersey State Superior Court. The court overturned a decision by the lower court to quash a subpoena issued…