Author Archives: Steven O'Neill

More Saving, More Doing, More Hacking

Brian Krebs (https://krebsonsecurity.com) reported on September 2, 2014 that Home Depot, Inc. (HD.N) appears to have been the target of a massive debit and credit card breach involving nearly all of its U.S. stores. In this case as in the … Continue reading

Posted in Uncategorized | Comments Off

Chromebook – Sandbox or Litterbox in the Cloud

Google just announced (2011) a new computer/OS combination called the Chromebook.  Essentially it is a netbook computer running Google’s Chrome operating system.  The Chrome OS touts greater computer security resulting from its implementation of a “sandbox” which is designed to … Continue reading

Posted in Cloud Computing, Information Security, Information Technology | Tagged , | Comments Off

LastPass Says Hackers May Have Stolen Password Data

According to Businessweek, “LastPass, a company that offers to safeguard and simplify managing subscribers’ online passwords, said hackers may have broken into its database and stolen information on as many as 1.25 million accounts.”  LastPass is the tradename of a … Continue reading

Posted in Information Security | Tagged , | Comments Off

NSA Information Security Recommendations

The NSA has published a useful data sheet covering ways to keep home and small business networks secure.

Posted in Information Security | Tagged , | Comments Off

LocationGate – Where in the World Was Waldo?

Just look at his iPhone data Apparently I am not the only person troubled by the recent revelation that Google and Apple collect location data from smart phones.  Mike Elgan wrote a thoughtful piece for Computerworld. Who owns your location? … Continue reading

Posted in Electronic Discovery, Information Security, Information Technology, Privacy | Tagged , , | Comments Off

An Open Letter to Massachusetts Attorney General, Martha Coakley

Recommendation for Enforcement of 201 CMR 17.00 Attorney General Martha Coakley One Ashburton Place Boston, MA  02108 RE:     NEW YORK YANKEES POTENTIAL VIOLATIONS OF c. 93H; 201 CMR 17.00 Dear Attorney General Coakley: Recently your office announced its first successful … Continue reading

Posted in Information Security | Tagged , | Comments Off

Sony Playing with PI (Personal Information)

In yet another stunning data security breach, Sony announced that 77 Million customer records had been hacked on its Playstation network and Qriocity.  The information accessed by hackers reportedly includes names, addresses, email addresses, birthdates, PlayStation Network/Qriocity passwords and logins, … Continue reading

Posted in Information Security | Tagged , , | Comments Off

$110,000 Fine – MA AG Enforces Information Security Law

A Law with Teeth Approximately one year after the new Massachusetts Information Security Law (201 CMR 17.00) took effect, the Massachusetts Attorney General simultaneously announced the filing and settlement of a Superior Court lawsuit.  AG Coakley announced the settlement and … Continue reading

Posted in Information Security | Tagged , | Comments Off

BP’s Gulf Data Spill

BP loses laptop containing Personal Information of 13,000 Oil Spill Claimants On March 1, 2011, BP lost a laptop computer containing Personal Information (PI) on 13,000 people who made claims against BP following the Deepwater Horizon oil spill in 2010.  … Continue reading

Posted in Information Security | Tagged , | Comments Off