article thumbnail

Confessions of an ID Theft Kingpin, Part I

Krebs on Security

Now, after more than seven years in prison Hieupc is back in his home country and hoping to convince other would-be cybercrooks to use their computer skills for good. Ten years ago, then 19-year-old hacker Ngo was a regular on the Vietnamese-language computer hacking forums. Secret Service. Hieu Minh Ngo, in his teens. BEGINNINGS.

article thumbnail

COVID-19 Vaccination Management Problems Have Created a Privacy Nightmare For Americans – Even Without Vaccine Passports

Joseph Steinberg

It is also not uncommon for firms in the healthcare vertical to symbiotically share various types of information with one another; private healthcare-related data is also almost always shared during the M&A process – even before deals have closed. I have personally witnessed several such problems.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Meet Bluetana, the Scourge of Pump Skimmers

Krebs on Security

Data collected in the course of the investigation also reveals some fascinating details that may help explain why these pump skimmers are so lucrative and ubiquitous. They are usually unattended, and in too many cases a handful of master keys will open a great many pumps at a variety of filling stations.

Banking 233
article thumbnail

2024 Cybersecurity Laws & Regulations

eSecurity Planet

Health Insurance Portability & Accountability Act (HIPAA) The Health Insurance Portability and Accountability Act (HIPAA) sets standards for protecting sensitive health information, particularly electronic health records (EHRs). This includes administrative, physical, and technical safeguards like encryption and access controls.

article thumbnail

Top VAPT Testing Companies

Security Boulevard

Introduction By reducing information risks and vulnerabilities, a process called information security, also referred to as infosec, protects electronic data. Data collection, organization, processing, and deletion are all included in the definition of data management. InfoSec […].

article thumbnail

Supply Chain Security 101: An Expert’s View

Krebs on Security

BK: But certainly there are some areas of computer hardware and network design where you absolutely must have far greater integrity assurance? Of course, some nations have more capability than others to sift through huge amounts of data they’re collecting. TS: Like a lot of things in security, the economics always win.

article thumbnail

Happy 13th Birthday, KrebsOnSecurity!

Krebs on Security

You just knew 2022 was going to be The Year of Crypto Grift when two of the world’s most popular antivirus makers — Norton and Avira — kicked things off by installing cryptocurrency mining programs on customer computers. ” The employees who kept things running for RSOCKS, circa 2016.