background preloader

Stories

Facebook Twitter

Court approves first-of-its-kind data breach settlement. News March 17, 2014 03:58 PM ET Computerworld - Courts have generally tended to dismiss consumer class-action lawsuits filed against companies that suffer data breaches if victims can't show that the the breach directly caused a financial hit. A federal court in Florida broke the mold by approving a $3 million settlement for victims of a data breach in which personal health information was exposed when multiple laptops containing the unencrypted data were stolen.

The Dec. 2009 theft of laptops belonging to AvMed, a Florida-based health insurer, exposed the patient records of tens of thousands of its customers. The plaintiffs suffered no direct losses or identity theft from the breach but nevertheless accused AvMed of negligence, breach of contract, breach of fiduciary duty and unjust enrichment The U.S. However, upon appeal by the plaintiffs, the U.S. Under the agreement, each breach victim will receive up to $10 for each year they paid AvMed an insurance payment, up to a maximum of $30. . Cryptolocker scambles US law firm's entire cache of legal files.

Presentations/social-engineering-attacks.pdf. When doing the right thing isn't enough. A few weeks ago, a good friend of mine fell victim to the CryptoLocker exploit. Or more specifically, one of his employees caused his business to fall victim to CryptoLocker. Cryptolocker is nasty, and if you haven’t heard about this type of ransomware, it is worth taking a look. If you’re still with me, I’ll tell you a bit more about this scenario and how this company - that thought they were doing everything right - still fell victim through a simple web exploit. The very good news is that this company performs daily backups. They were able to complete a full restore with zero customer data lost and no payout to the hackers.

An elegant solution for a complex environment This company is a professional services firm that has both internal and work-from-home employees. In order to manage the compute environment for local and work from home employees, they’ve retained an outsourcer to deploy virtual desktops for each user. The challenge of supporting web apps This stuff is hard. 12 famous passwords used through the ages. Krebs on Security.