Dr. InfoSec™

Seeking to diagnose and treat everyday information security problems

Laptop stolen from office containing finger prints, names, Social Security numbers, addresses, dates of birth and other information

Could it get any worse than realizing that a stolen laptop happened to contain not only social security numbers but also fingerprint images in addition to names, addresses, etc?

Src: Laptop stolen from office containing finger prints, names, Social Security numbers, addresses, dates of birth and other information | OSF Data Loss Database
Posted by DrInfoSec on 1/14/2009

No comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

Important Links

  • SMB Resources

Dr.InfoSec

Dr.InfoSec

Connect with me

  • LinkedIn
  • Twitter

About Me

The Dr. InfoSec™ Blog is curated by Christophe Veltsos, PhD, CISSP, CISA, CIPP.
Chris, aka Dr.InfoSec, is passionate about helping organizations take stock of their cyber risks and manage those risks across the intricate landscape of technology, business, and people.
Whether performing information security risk assessments, working alongside CIOs & CISOs to set and communicate strategic security priorities, or advising board members on effective governance of cyber risks, Chris enjoys working with business leaders to improve their organization's cyber risk posture.

Blog Archive

  • ►  2020 (1)
    • ►  February (1)
  • ►  2017 (21)
    • ►  November (1)
    • ►  September (8)
    • ►  August (2)
    • ►  July (6)
    • ►  May (1)
    • ►  March (1)
    • ►  January (2)
  • ►  2016 (1)
    • ►  May (1)
  • ►  2015 (2)
    • ►  October (1)
    • ►  March (1)
  • ►  2014 (20)
    • ►  November (5)
    • ►  October (2)
    • ►  August (4)
    • ►  June (1)
    • ►  May (2)
    • ►  April (3)
    • ►  March (1)
    • ►  February (1)
    • ►  January (1)
  • ►  2013 (30)
    • ►  October (2)
    • ►  September (7)
    • ►  July (2)
    • ►  June (3)
    • ►  May (2)
    • ►  April (2)
    • ►  March (5)
    • ►  February (6)
    • ►  January (1)
  • ►  2012 (36)
    • ►  December (1)
    • ►  October (5)
    • ►  September (1)
    • ►  August (3)
    • ►  June (2)
    • ►  May (2)
    • ►  April (7)
    • ►  March (8)
    • ►  February (4)
    • ►  January (3)
  • ►  2011 (86)
    • ►  December (4)
    • ►  November (9)
    • ►  October (10)
    • ►  September (5)
    • ►  August (6)
    • ►  July (1)
    • ►  June (6)
    • ►  May (11)
    • ►  April (10)
    • ►  March (11)
    • ►  February (9)
    • ►  January (4)
  • ►  2010 (226)
    • ►  December (2)
    • ►  November (5)
    • ►  October (8)
    • ►  September (15)
    • ►  August (23)
    • ►  July (14)
    • ►  June (33)
    • ►  May (11)
    • ►  April (26)
    • ►  March (30)
    • ►  February (26)
    • ►  January (33)
  • ▼  2009 (341)
    • ►  December (17)
    • ►  November (25)
    • ►  October (20)
    • ►  September (15)
    • ►  August (28)
    • ►  July (33)
    • ►  June (11)
    • ►  May (7)
    • ►  April (33)
    • ►  March (61)
    • ►  February (35)
    • ▼  January (56)
      • Quote on securing the Internet
      • Quote on business culture
      • Quote on business survival
      • Data breach victims may not get directly notified
      • UK's Personal Information Promise
      • SSN-based UserID and Password
      • Bot software peers at victims' screens
      • Test your defenses against malicious USB flash drives
      • Quote on two-factor authentication
      • An Inquiry into the Nature and Cause of the Wealth...
      • McAfee Report - Businesses risk losing over $1 tri...
      • The 7 dirty secrets of the security industry
      • What the Web knows about you
      • New Fake Antivirus - "Total Defender"
      • Innovation in firewalls? You bet!
      • How to Use Twitter for Informatin Mining
      • Websense report - State of Internet Security Q3-Q4...
      • In the long run, the cops (feds) always win
      • Personal Privacy And Frequent Flyer Elite Status
      • The AutoRun that won't get disabled
      • Risk Measure and Risk Metric
      • McAfee 2009 Threat Predictions
      • Heartland Payment Systems Breached
      • Why Technology Won't Prevent Identity Theft
      • Choosing a good chart
      • Time to Take the Theoretical Seriously
      • Malware - catch and do not release
      • Social Media Defined
      • The Social Engineering Pyramid
      • Windows7 UAC & desktop dimming
      • Mind your hashes
      • Builders, Breakers, and Malicious Hackers
      • It's time to start issuing PC licenses
      • Storm Botnet Makes A Comeback
      • Watch a movie of Malware in action
      • IT security standards planetarium
      • The Bumper List of Windows 7 Secrets
      • Laptop stolen from office containing finger prints...
      • USB Encryption Fail
      • Police hacking laws moving from Germany to the res...
      • Woman beats immigration biometric system with stic...
      • What is an “effective” Control?
      • New phishing ploy exploits secure sessions to hija...
      • How to beat Downadup at its own game
      • EFF Surveillance Self-Defense Project
      • Creating a Mac-on-Stick using Mini vMac
      • (Under)mining Privacy in Social Networks
      • Contents of Your Transportation Pass Revealed
      • 2008 - The year of malware
      • County Posts Social Security Numbers Online
      • First documented case of Spear Phishing for 2009
      • Fake CNN malware attack spins Gaza angle
      • Looking at the Crackpal.com Phishing-For-Hire Scheme
      • No Patch for Human Stupidity
      • One Hacker's Audacious Plan to Rule the Black Mark...
      • Alex Hutton on Risk Management
  • ►  2008 (102)
    • ►  December (45)
    • ►  November (42)
    • ►  October (9)
    • ►  September (4)
    • ►  February (2)

Labels

  • academia
  • breaches
  • certifications
  • CIO
  • CISO
  • cloud
  • complexity
  • conferences
  • cybercrime
  • cyberrisks
  • cyberwar
  • CyberWeek
  • directors
  • drinfosec
  • e-spy
  • education/training/awareness
  • email
  • executives/boards
  • financial_data
  • forensics
  • future
  • governance
  • government
  • health
  • humor
  • IBM
  • instruction
  • irp/drp/bcp
  • Israel
  • keynotes
  • legal
  • malware/exploits/vulns
  • management
  • medical
  • metrics_and_risk
  • misc
  • mobile
  • newsmedia
  • organizations
  • patches
  • people
  • podcast
  • presentation
  • press
  • privacy
  • process
  • professional_development
  • qotd
  • report
  • research
  • reviews
  • RSA
  • security_fail
  • security_hype
  • security_solutions
  • SecurityIntelligence
  • smarg_grid
  • social_engineering
  • social_networking
  • sponsored
  • standards/policies
  • terrorism
  • web2.0
  • wireless

Disclaimer

The views and opinions expressed here are those of Dr. Veltsos only and in no way represent the views, positions, or opinions of any previous, current, or future employers, clients, or associates.

All content on this blog is provided as general information and is for educational purposes only. It should not be construed as professional advice or guidance. All trademarks and copyrights on this blog belong to their respective owners.
Powered by Blogger.