Data Breaches news & analysis | SC Media

Data Breach

Tesla suing self-driving startup Zoox and former employees for data theft

By

Tesla is accusing self-driving car startup Zoox and former employees of stealing trade secrets. The automaker is suing the start-up and the bunch claiming the employees gave Zoox Tesla’s logistics info to Zoox, while another gave Tesla’s autopilot code to Xiaopeng Motors. Two lawsuits were filed this week with one claiming employees stole “proprietary information…

Rutland Regional Medical Center, Zoll reveal data breaches

By

Two healthcare organizations suffered data breaches due to their email service resulting in more than 72,000 records being exposed. Rutland Regional Medical Center in Vermont reported several employee email accounts have been compromised, while the medical products firm Zoll had data possibly exposed when an email server migration went awry. In both cases the patient…

FDA presents guidelines for medical device security

Meditab affiliate exposes medical records, PII on unprotected server

By

Once again, information was left exposed on an unprotected server – this time by an affiliate of Meditab, a California maker of medical records software sold to doctors, pharmacies and hospitals. Researchers at SpiderSilk found that anyone could read in realtime unencrypted medical records, personal information, drug prescriptions, doctors’ notes and the like from faxes…

Report: Chinese e-retailer Gearbest leaves database exposed, endangering 1.5 million records

By

The parent company of Chinese e-retailing giant Gearbest has been operating a completely unsecured corporate database, leaving roughly 1.5 million customer records unencrypted and exposed to the public, a new report warns. Led by white-hat hacker Noam Rotem, researchers from VPNMentor revealed the security issue after discovering they were able to access Gearbest’s customer, order,…

Password-spraying attacks abuse IMAP to break into targets’ cloud accounts

By

Taking advantage of recent stolen credential dumps, attackers have been exploiting legacy protocols like IMAP to engage in high-volume password-spraying campaigns for the purpose of breaking into companies’ cloud accounts, researchers at Proofpoint are reporting. Used by email clients to retrieve messages from a server, IMAP (Internet Message Access Protocol) is an ideal protocol to…

GCA, Mastercard partner on free cybersecurity toolkit for small business (Video)

By

Small businesses, which make up 99 percent of businesses globally and, on average, 70 percent, grapple with some of the same major cybersecurity challenges as large enterprises, only without the same resources. The Global Cyber Alliance (GCA) and Mastercard have teamed on a free Cybersecurity Toolkit aimed at helping smaller and medium-sized businesses. GCA President…

Berners-Lee says WWW needs bolstering against malicious cyberattacks, dysfunction

By

At 30 years old, the World Wide Web needs a little work when it comes to cybersecurity and other issues, its creator Tim Berners-Lee said Monday. Three sources of dysfunction must be addressed, Berners-Lee wrote in an open letter: “deliberate, malicious intent, such as state-sponsored hacking and attacks, criminal behaviour, and online harassment; system design…

Next post in Data Breach