Credit and debit card information belonging to customers who did business at 51 UPS Store Inc. locations in 24 states this year may have been compromised as the result of an intrusion into the company's networks.
In a statement Wednesday, UPS said it was recently notified by law enforcement officials about a "broad-based malware intrusion" of its systems.
Activists just got another reason to worry about what spooks might be able to learn about them, with boffins demonstrating that a decent traffic fingerprint can tell an attacker what's going on, even if an app is defended by encryption.
The researchers from the Universities of Padua and Rome have found that for activities like posting messages on a friend's Facebook wall, browsing a profile on a social network, or sending an e-mail, there's no need to decrypt an encrypted data flow.
Britain's Government Communications Headquarters (GCHQ) has been scanning every public-facing server in 27 countries for several years to find any weak systems in waht some have described as a 'gargantuan scale' hack.
The agency's so-called 'Hacienda' program, revealed by German publication Heise, started in 2009 when GCHQ decided to apply the standard tool of port scanning against entire nations.
Much of what passes for privacy concern strikes me as overwrought reaction to minor problems, and completely dismissive of the other side of the story. There's no better example than public security cameras and police-officer body-mounted cameras.
The theft of personal data on 4.5 million patients of Community Health Systems by hackers in China highlights the increasing degree to which hospitals are becoming lucrative targets for information theft.
Already this year, around 150 incidents of lost or stolen personal data -- either due to hacking or ineptitude -- have been reported by medical establishments to the U.S. Department of Health and Human Services.