Articles Tagged with "Legal"

From the Web
Durex condom orders exposed on the Internet
March 22, 2010 from: Office of Inadequate Security
Remember the Astroglide breach, when customers who ordered samples of the lubricant had their personal details exposed online? Now there are allegations that Durex condom orders were leaking on the web.
Comments (0)

From the Web
Relationships with Foreign Business Partners
March 15, 2010 from: Greg George
As business leaders continue to reach out and embrace global opportunities, the ability to recognize and mitigate operational threats is paramount....a recent memorandum discusses 28 countries having serious deficiencies in their strategies for countering money laundering and financial terrorist activities
Comments (0)

From the Web
19 more financial sector breaches from 2009
February 27, 2010 from: Office of Inadequate Security
Maryland has updated its web site to provide breach notifications that it has received since its last update. The newly posted notifications are for the period ending December 31, 2009, so there will likely be more to come for 2010
Comments (0)

From the Web
21 more business sector breaches from 2009
February 27, 2010 from: Office of Inadequate Security
Maryland has updated its web site to provide breach notifications that it has received since its last update. The newly posted notifications are for the period ending December 31, 2009, so there will likely be more to come for 2010
Comments (0)

From the Web
Banks, Businesses, Viruses and the UCC
February 24, 2010 from: Rsnake's blog at ha.ckers.org
There’s an interesting post over at Krebs On Security talking about some poor company that is going bankrupt because TD Bank allegedly will not give them their money back after it was stolen out of their account.
Comments (1)

From the Web
Nevermind, I Was Wrong, Google Is Evil
February 15, 2010 from: Rsnake's blog at ha.ckers.org
I [,RSnake have] been waiting a while to do this post - several weeks actually since my original post. In that post, I applauded Google’s apparent interest in reigning censorship as “the first really truly non-evil thing I have seen Google do in years”. Since then, I thought it appropriate to give them some time to sift through the nuances of their blog post - you know, to give t...
Comments (11)

From the Web
China Shut Down Biggest Hacker Training Site
February 09, 2010 from: Saumil's Infosec Blog
What is believed to be the country's biggest hacker training site has been shut down by police in Central China's Hubei province. Three people were also arrested, local media reported yesterday. The three, who ran Black Hawk Safety Net, are suspected of offering others online attacking programs and software, a crime recently added to the Criminal Law. A total of 1.7 million yuan ($249,000) in asse...
Comments (2)

From the Web
Heartland Payment Systems and Visa Inc. Announce Acceptance Rate of Over 97 Percent for Data Security Breach Settlement Agreement
February 05, 2010 from: Office of Inadequate Security
Financial institutions representing more than 97 percent of eligible Visa-branded credit and debit cards have accepted the Alternative Recovery Offers they received pursuant to the settlement entered into by Visa Inc. (NYSE:V), Heartland Payment Systems® (NYSE: HPY) and Heartland’s sponsoring acquirers last month. This level of acceptance fulfills the 80 percent opt-in condition that was...
Comments (0)

From the Web
Heartland lawsuit plaintiffs go after acquiring banks’ deep pockets
January 21, 2010 from: Office of Inadequate Security
The $60 million settlement offer announced by Visa and Heartland Payment Systems seems in jeopardy of falling apart as lawyers for some of the banks file a new lawsuit against Heartland’s acquiring banks and urge rejection of the settlement offer.
Comments (1)

From the Web
Proposed VISA/Heartland Data Breach Settlement May Pay Banks and Credit Unions Pennies on the Dollar – plaintiffs
January 20, 2010 from: Office of Inadequate Security
Banks and credit unions that issued VISA payment cards compromised by the Heartland Payment Systems data breach, the largest data breach in history, should carefully review the proposed settlement between Heartland and VISA.
Comments (0)

From the Web
Heartland in $60 mln settlement agreement with Visa
January 08, 2010 from: Office of Inadequate Security
Heartland Payment Systems Inc (HPY.N) said it reached a $60 million settlement agreement with Visa Inc (V.N), under which it will pay issuers of Visa-branded credit and debit cards for data security breach claims.
Comments (0)

From the Web
Looking back on 2009
January 03, 2010 from: Office of Inadequate Security
The breach of Heartland Payment Systems grabbed the headlines for much of the year and the entire population of Belize had their birth details stolen when a government employee left a laptop in a car, but what else went on?
Comments (0)

From the Web
Heartland to pay up to $2.4 million to settle cardholder class action suit
December 21, 2009 from: Office of Inadequate Security
Under the terms of the settlement, Heartland says it will pay a minimum of $1 million and up to a maximum of $2.4 million to class members who submit valid claims for losses as a result of the intrusion.
Comments (0)

From the Web
Heartland pays Amex $3.6M over 2008 data breach
December 17, 2009 from: Office of Inadequate Security
Heartland Payment Systems will pay American Express $3.6 million to settle charges relating to the 2008 hacking of its payment system network.
Comments (0)

From the Web
BJ’s, Bank Not Liable for Credit Card Fraud
December 15, 2009 from: Office of Inadequate Security
Cumis Insurance Society and the credit unions it insures have failed in their lawsuit against BJ’s Wholesale Club and Fifth Third Bank over a 2004 breach that affected 9.2 million cardholders.
Comments (0)

From the Web
P2P fraudsters snare DoD employees and FL business; two indicted
December 11, 2009 from: Office of Inadequate Security
Jeffrey Steven Girandola and Kajohn Phommavong have been charged in a previously sealed 16-count indictment with Conspiracy, Computer Fraud, Access Device Fraud and Aggravated Identity Theft. According to the indictment, which was handed up by a federal grand jury in San Diego, the defendants installed peer-to-peer file sharing software on computers under their control and searched the a...
Comments (0)
- SecurityWeek Names Ryan Naraine as Editor-at-Large
- Why Cyber Security Should Be at the Top of Your Christmas List
- United States Federal Government’s Shift to Identity-Centric Security
- How Extreme Weather Will Create Chaos on Infrastructure
- BSIMM11 Observes the Cutting Edge of Software Security Initiatives
- Sustaining Video Collaboration Through End-to-End Encryption
- Will Robo-Helpers Help Themselves to Your Data?
- Securing the Hybrid Workforce Begins with Three Crucial Steps
- A New Strategy for DDoS Protection: Log Analysis on Steroids
- COVID-19 Aside, Data Protection Regulations March Ahead: What To Consider