Comments Off on Facebook Passwords Protected In California And Illinois0LikeLike 1,281
Last March one of the hottest issues involving privacy and security online was in regard to employers. One of the biggest stories was about a correctional officer in Maryland named Robert Collins who had been laid off from his job in 2010. Unlike many lay-offs Collins was actually asked to come back into work, however before he could do that there was one stipulation. Collins needed to give up, not just his Facebook user id, but his password as well.
Collins had been out of work for a while and needed the money so he had no choice but to give up his Facebook login credentials.He said that the employer wanted to make sure he wasn’t into any “gang activity” (because gangs are planning their activities on Facebook and all).
The American Civil Liberties Union (ACLU) quickly got involved in Collins case and many others that were popping up across the country. Some employers were making Facebook and other social media credentials a stipulation of employment and others were making it a stipulation of continued employment.
Maryland lawmakers quickly rushed a piece of legislation that outlaws employers from seeking employee or prospective employee’s login credentials for any personal service.
Now California and Illinois have both jumped on the login protection bandwagon, and rightfully so. New laws in both states, that went into effect January 1st 2013, makes it illegal for employers to demand access to their workers protected Facebook accounts. The laws passed in both states protect employees privacy and passwords for many different social networks and not just Facebook.
Comments Off on Hackers Get 181,000 Medicaid Records And 25,000 SSNs From Utah Department Of Health.0LikeLike 1,222
On March 30th hackers believed to have been from Eastern Europe, hacked into a vulnerable server within Utah’s Department Of Health. UDOH has said that records were moved to a new server that had a configuration problem which allowed hackers to circumvent the department’s security protocols.
Although the breach occurred on March 30th UDOH waited until last Wednesday to publicly announce that the breach occurred. On Friday they revealed the damage. Hackers made off with 24,000 files. Each file can contain information on hundreds of Medicaid patients. UDOH tallied up all the damage and said that 181,000 patients have had information compromised.
The information that was taken includes patient names, birth dates, addresses, provider information, procedure codes answer social security numbers. The patients affected ranged from children kn Utah’s CHIP program to senior citizens.
At the government technology show, formerly called FOSE, in Washington DC we got a chance to talk with Biometrics Associates. This company has developed some very cool encrypted Bluetooth technologies that are implemented in military and government uses.
Their first product is a card reader that, when attached to a smartphone, allows apps that use Biometrics Associates SDK to be unlocked. The only way to unlock these apps is with the right key card and the right credentials on the keycard. Biometrics Associates offers an SDK where developers can build any kind of protected app.
App uses already in use or in development include email protection apps, phone unlocking apps, tactical planning apps and even apps that are used to protect plans for military equipment. Their technology is approved by the United States Department of Defense and NSA to ensure that it meets the top-secret clearance needed at such a high level.
The other technology they offer is a secure BlueTooth headset. As you’ll learn in the video the secured Bluetooth headset uses its own pairing mechanism so that the default 0000 and 1234 codes don’t work to pair the phone with the headset. In addition once locked to the phone it creates a shield that won’t allow any kind of Bluetooth interruption, penetration or eaves dropping.
The headsets were built to NSA specification so that even the highest level agent in any branch of government can talk securely via Bluetooth headset to another party.
“Today’s CAC user needs secure access to mobile applications”, noted Scott Johnson, BAL Executive Vice President and COO, “but sensitive information – both data and voice – must be protected from multiple points of attack. Imagine a doctor in a DoD hospital making his or her rounds with an Android tablet. This doctor needs CAC authenticated access to the hospital medical records database but also needs to be able to dictate notes into the patient’s record over an encrypted Bluetooth link. We are proud to provide products to make this a reality.”
Comments Off on Washington Gets In On The Facebook Password Debate0LikeLike 1,063
Last week a huge privacy issue came out involving Facebook and the protection of user accounts. According to reports from a man in Baltimore Maryland and another from New York, employers are requesting Facebook login credentials from employees and prospective employees.
The American Civil Liberties Union (ACLU) has gotten involved defending the rights of people against employers asking for private information. The ACLU likened the practice of asking employees and prospective employees for their Facebook credentials to asking to open their private U.S. mail.
The ACLU also pointed out that the practice by employers was a violation of Facebook’s terms of service. Facebook concurred and posted a lengthy statement to their official blog page denouncing the practice and reminding users to keep their login credentials protected.
Comments Off on Apple Rejecting Apps That Ask For UDIDs0LikeLike 1,060
Privacy and Apps has become a huge concern for both Android and iOS lately. Ever since Path made worldwide news when they uploaded user address books in their entirety to their private servers, users and even congress has been screaming foul play. Privacy pundits everywhere are demanding a crack down on what phones can tell an app about the user and their device.
Apple and Google are under the scrutiny of Congress to crackdown on privacy especially on mobile devices.
About six months ago, around the time a Wall Street Journal study revealed that several apps on both platforms were taking more data off phones than they really needed, Apple let developers know they were going to start rejecting apps that called for the devices UDID. It looks like Apple is going to ramp that up starting now.