-
T-Mobile Data Breach Raises Retail M-Commerce Concerns
Posted on June 10th, 2009 No commentsAs retail IT execs start to experiment with—and actually deploy—mobile-commerce applications more, the realization that they have to rely on their new telecom partners to safeguard their experimental data is proving to be unnerving. Recent incidents involving T-Mobile—where the carrier was forced to confirm some claims of a supposed cyberthief who said that he had hacked in and stolen databases, documents and scripts—don’t help
Originally posted here:
T-Mobile Data Breach Raises Retail M-Commerce Concerns -
T-Mobile confirms company records taken
Posted on June 10th, 2009 No commentsT-Mobile has now confirmed that a hacker, known as “Pwnmobile,” did, indeed, gain unauthorized access to its records and that the stolen data Pwnmobile posted here is authentic. The wireless giant isn’t disclosing anything else beyond that.
Go here to read the rest:
T-Mobile confirms company records taken -
Data Security Regulation 2.0, Part 2: Massachusetts Has Written Your Information Security Program
Posted on June 10th, 2009 No commentsUnlike the Nevada law (see Part 1), which is relatively brief and narrowly focused on the encryption of electronically transmitted data, Massachusetts’ new data security regulation, 201 CMR §17.00(pdf), is extremely sweeping and eliminates much private discretion in the realm of information security by imposing comprehensive, detailed operational requirements for business activities that touch personal information.
View post:
Data Security Regulation 2.0, Part 2: Massachusetts Has Written Your Information Security Program -
Safeguarding your mobile networks
Posted on June 10th, 2009 No commentsA free online event on June 16, SC Magazine’s eConference: Mobile Security, offers advice on dealing with the rising tide of mobile threats.
See the original post here:
Safeguarding your mobile networks -
Data Security Regulation 2.0, Part 1: In Nevada Transmission Requires Encryption
Posted on June 9th, 2009 No commentsNevada and Massachusetts are pushing forward with a new, more assertive type of data security regulation that has huge implications for businesses operating
The rest is here:
Data Security Regulation 2.0, Part 1: In Nevada Transmission Requires Encryption
Recent Comments