Health insurer loses 1m customers' health records

madmag

Despite the fact that it "takes the privacy and security of our members' information seriously," the health insurance company Centene can't find six unencrypted hard drives with 950,000 customers' private health data, addresses, dates of birth and social security data. Read the rest

TSA threatens to stop accepting driver's licenses from nine states as of Jan 10

Screen_Shot_2014-11-12_at_4.50.14_PM_t700

When Congress passed the 2005 Real ID act -- mandating easy sharing (and intrinsic insecurity) -- of driver's license data, they insisted compliance by states with the rules would be voluntary. Read the rest

3.3 million Hello Kitty website accounts leaked

056c026d-1c66-4d42-9fae-a8e96df290c5-1020x906

Last week, security researcher Chris Vickery discovered a database containing 3.3 million accounts from Sanriotown, a commercial Hello Kitty fansite operated by Sanrio, Hello Kitty's corporate owners. Read the rest

Leaked Salvation Army memo details internal homophobia and discrimination

ml885

The Salvation Army has struggled to distance itself from its reputation for homophobia, but a 2014 memo on "LGBT issues" by midwest Commissioner Paul Seiler spells out a number of ways in which the organization discriminates against LGBT employees. Read the rest

Juniper Networks backdoor confirmed, password revealed, NSA suspected

056c026d-1c66-4d42-9fae-a8e96df290c5-1020x906

Juniper Networks makes a popular line of enterprise firewalls whose operating system is called Screen OS. The company raised alarm bells with a late-day-on-a-Friday advisory announcing that they'd discovered "unauthorized code" in some versions of Screen OS, a strange occurrence that hinted at a security agency or criminal enterprise had managed to tamper with the product before it shipped. Read the rest

LEAKED: The secret catalog American law enforcement orders cellphone-spying gear from

056c026d-1c66-4d42-9fae-a8e96df290c5-1020x915

The Intercept has obtained a secret government catalog that law enforcement agencies use to source even-more-secret cellular spying devices, mostly variants on the Read the rest

Army says Petraeus shouldn't be punished under military law for leaking top-secret materials

Former General David Petraeus with lover-hagiographer Paula Broadwell

The Washington Post reports that the U.S. Army is recommending retired general David H. Petraeus not face further punishment for screwing his biographer and leaking top-secret materials to her.

Read the rest

Hacker dumps United Arab Emirates Invest Bank's customer data

0e4f05d24f33736d61f1062202a19377

A hacker broke into the United Arab Emirates's Invest Bank., stole its customer data and started dribbling it out over Twitter, one account at a time, demanding $3 million to stop. The bank didn't pay for it, so the hacker dumped the bank's financial databases. Read the rest

What does the prisoner phone-recording leak mean for prisoners and their families?

frequencies-oscilloscope_NEW_1439-440x440

Lisa Rein writes, "On November 12th, The Intercept published a story about one of its SecureDrop uploads: 70 million records of prisoner phone data. The hack exposed that at least 14,000 phone calls between prisoners and their attorneys had been improperly recorded, and neither the calls themselves or the millions of metadata records about the calls were being stored securely." Read the rest

Wikileaks hosting files from CIA director John Brennan's AOL account

48176184.cached

Wikileaks has posted a collection of documents ganked from CIA director John Brennan's email account, which was reportedly hacked by a "teen stoner" earlier this week. Read the rest

23andme & Ancestry.com aggregated the world's DNA; the police obliged them by asking for it

KRZYWE

When 23andme and Ancestry.com began their projects of collecting and retaining the world's DNA, many commentators warned that this would be an irresistible target for authoritarians and criminals, and that it was only a matter of time until cops started showing up at their doors, asking for their customers' most compromising data. Read the rest

Snowden for drones: The Intercept's expose on US drone attacks, revealed by a new leaker

birds-anim-720
The Drone Papers is The Intercept's collection of eight blockbuster articles analyzing a leaked 2013 Pentagon study that evaluated the US drone assassination campaigns in Yemen and Somalia. The documents come from a US intelligence source who said, "This outrageous explosion of watchlisting — of monitoring people and racking and stacking them on lists, assigning them numbers, assigning them ‘baseball cards,’ assigning them death sentences without notice, on a worldwide battlefield — it was, from the very first instance, wrong."

Smurfs vs phones: GCHQ's smartphone malware can take pics, listen in even when phone is off

smurfs-wallpaper-the-smurfs-251131_1024_768

In a new episode of the BBC's Panorama, Edward Snowden describes the secret mobile phone malware developed by GCHQ and the NSA, which has the power to listen in through your phone's mic and follow you around, even when your phone is switched off. Read the rest

KARMA POLICE: GCHQ's plan to track every Web user in the world

Sources

The KARMA POLICE program is detailed in newly released Snowden docs published on The Intercept; it began as a project to identify every listener to every Internet radio station (to find people listening to jihadi radio) and grew into an ambitious plan to identify every Web user and catalog their activities from porn habits to Skype contacts. Read the rest

Ashley Madison users chose passwords like "whyareyoudoingthis"

Now that 11.7 million Ashley Madison users' passwords been shown to be crackable, we're learning that password security has not improved since the last giant dump of user passwords. Read the rest

My Stolen Life

My handbag was stolen two months ago. It happened in seconds in a mall in Turin, Italy. I never saw the thief, and neither did my husband, sitting two meters from the scene of the crime a fast food Japanese restaurant.

How is such criminal skill even possible? There was almost nobody around. Now, after two months, I do vaguely remember though a nice young woman, sitting with a child, next to my table. Was it she who grabbed my bag off the back of a chair and escaped with it?

A week later, I read that a gang of four women, convicted of serial handbag thefts in Italy, was finally put behind the bars. Even though found guilty several times, they were always released from custody because they had either small children or were pregnant. So maybe they relied on the handbags of other women to feed their numerous children?!

But that would be a topic for a novel, and not what I want to write about. I will focus on this accident from a different angle. Because it can only be compared to an accident, a personal disaster, as if a truck ran over me. No use asking, was it my fault? Should I blame myself for leaving my chair to order a second beer to go with my sushi? And why on earth did I center my earthly life inside one rather small handbag? Why did I visit a shopping mall taking with me all of my traveling documents, credit cards, checkbook, USB backup, health insurance card, Iphone, address book, prescriptions, etc. Read the rest

Ashley Madison leak 2.0: new dump is twice as large, and includes CEO's emails

Self-proclaimed Ashley Madison hackers the Impact Team today released what looks like another 20 gigabytes of ill-gotten data. The just-dropped “other shoe” includes emails from the cheater-dating website's CEO.

Read the rest

More posts