Yet another breach of sensitive, unencrypted data is making news in the United Kingdom. This time the breach puts Royal Air Force staff at serious risk of being targeted for blackmail by foreign intelligence services or others.
The breach involves audio recordings with high ranking officers who were being interviewed in-depth for a security clearance. In the interviews, the officers disclosed information about extra-marital affairs, drug abuse, visits to prostitutes, medical conditions, criminal convictions and debt histories — information the military needed to determine their security risk. (link)
- Home
- Blog
- Intro to Hard Drives
- Data Recovery Articles
- Data Recovery Australia
- Data Recovery Barbados
- Data Recovery Blog Feed
- Data Recovery France
- Data Recovery Germany
- Data Recovery Services
- Data Recovery Singapore
- Data Recovery Software
- Data Recovery RAID
- Data Recovery UK
- Link Partners
- Link Resources
- Privacy
- BAD Reciprocal Partners
0 Comments
When IEEE 1667 is in place, the risks associated with this vulnerability decrease substantially because only authenticated devices will be accepted. I can provide my employees with specific types of IEEE 1667-compliant devices that can be authenticated and used. All others, including that device you bought at Fry's Electronics, won't work. Assuming that you can audit the use of these devices, this provides security without compromising usability--a win-win in the security management world. (link) Opposition to a new security database is gaining momentum in France as people return to work after a summer break during which the government authorized the state to store personal information on people as young as 13. The decree creating the "Edvige" electronic database appeared in the official gazette on July 1, when the country was winding down for the summer, but news of its content has been gradually filtering out and is now stirring fierce criticism. (link) Spam (and the malware it contains) may be a tremendous concern to most IT companies, but information from a new Trend Micro survey suggests that it has become more of a managed concern, and is being superseded as a top priority threat by another issue: data leaks. While they may or may not be intentional, data leaks have the potential to expose thousands or even millions of records to theft. Now more than ever, it's important that Windows users ensure their machines are safe from hackers. A dangerous new strain of malicious software that holds the victim's computers files for ransom has been unleashed, and Kaspersky Lab is warning that security researchers have yet to crack the encryption key. |
AboutData recovery perspectives from an IT specialist, who's seen it all. Archives
May 2009
Categories
All
|