As retail IT execs start to experiment with—and actually deploy—mobile-commerce applications more, the realization that they have to rely on their new telecom partners to safeguard their experimental data is proving to be unnerving. Recent incidents involving T-Mobile—where the carrier was forced to confirm some claims of a supposed cyberthief who said that he had hacked in and stolen databases, documents and scripts—don’t help
Originally posted here:
T-Mobile Data Breach Raises Retail M-Commerce Concerns
T-Mobile has now confirmed that a hacker, known as “Pwnmobile,” did, indeed, gain unauthorized access to its records and that the stolen data Pwnmobile posted here is authentic. The wireless giant isn’t disclosing anything else beyond that.
Go here to read the rest:
T-Mobile confirms company records taken
Unlike the Nevada law (see Part 1), which is relatively brief and narrowly focused on the encryption of electronically transmitted data, Massachusetts’ new data security regulation, 201 CMR §17.00(pdf), is extremely sweeping and eliminates much private discretion in the realm of information security by imposing comprehensive, detailed operational requirements for business activities that touch personal information.
More than 6,000 people have pre-applied online for the Disaster Food Stamp program for this hurricane season, a program launched in June. Toney Steele filled out his application last Friday. But Steele learned Tuesday his disaster food stamp application on the Department of Social Services website was shared online for others to see.
Read the original here:
Food stamp recipients angry after private info leaked
A free online event on June 16, SC Magazine’s eConference: Mobile Security, offers advice on dealing with the rising tide of mobile threats.
See the original post here:
Safeguarding your mobile networks