Language Selection

English French German Italian Portuguese Spanish

Stolen laptop exposes data of 100,000

Filed under
Security

A thief recently walked into a University of California, Berkeley office and swiped a computer laptop containing personal information about nearly 100,000 alumni, graduate students and past applicants, highlighting a continued lack of security that has increased society's vulnerability to identity theft.

University officials waited until Monday to announce the March 11 crime, hoping that police would be able to catch the thief and reclaim the computer. When that didn't happen, the school publicized the theft to comply with a state law requiring consumers be notified whenever their Social Security numbers or other sensitive information have been breached.

UC Berkeley plans to advise the 98,369 people affected by the laptop theft to check their credit reports, although there has been no indication any of he personal information has been used illegally, university spokeswoman Maria Felde said.

This is the second time in six months that UC Berkeley has been involved in a theft of personal information. Last September, a computer hacker gained access to UC Berkeley research being done for the state Department of Social Services. The files contained personal information of about 600,000 people. That security breach hasn't been linked to any cases of identity theft, Felde said.

Recent breaches have occurred at: ChoicePoint Inc., a consumer data firm duped into distributing personal information about 145,000 people; Lexis-Nexis, a data storehouse where computer hackers obtained access to the personal information of 32,000 people; and Chico State University, where a computer hacking job exposed 59,000 people to potential identity theft.

Full Story.

More in Tux Machines

Red Hat's Survey in India

From Raspberry Pi to Supercomputers to the Cloud: The Linux Operating System

Linux is widely used in corporations now as the basis for everything from file servers to web servers to network security servers. The no-cost as well as commercial availability of distributions makes it an obvious choice in many scenarios. Distributions of Linux now power machines as small as the tiny Raspberry Pi to the largest supercomputers in the world. There is a wide variety of minimal and security hardened distributions, some of them designed for GPU workloads. Read more

IBM’s Systems With GNU/Linux

  • IBM Gives Power Systems Rebates For Linux Workloads
    Big Blue has made no secret whatsoever that it wants to ride the Linux wave up with the Power Systems platform, and its marketeers are doing what they can to sweeten the hardware deals as best they can without adversely affecting the top and bottom line at IBM in general and the Power Systems division in particular to help that Linux cause along.
  • Drilling Down Into IBM’s System Group
    The most obvious thing is that IBM’s revenues and profits continue to shrink, but the downside is getting smaller and smaller, and we think that IBM’s core systems business will start to level out this year and maybe even grow by the third or fourth quarter, depending on when Power9-based Power Systems and z14-based System z mainframes hit the market. In the final period of 2016, IBM’s overall revenues were $21.77 billion, down 1.1 percent from a year ago, and net income rose by nearly a point to $4.5 billion. This is sure a lot better than a year ago, when IBM’s revenues fell by 8.4 percent to $22 billion and its net income fell by 18.6 percent to $4.46 billion. For the full 2016 year, IBM’s revenues were off 2.1 percent to $79.85 billion, but its “real” systems business, which includes servers, storage, switching, systems software, databases, transaction monitors, and tech support and financing for its own iron, fell by 8.3 percent to $26.1 billion. (That’s our estimate; IBM does not break out sales this way, but we have some pretty good guesses on how it all breaks down.)

Security News

  • DB Ransom Attacks Spread to CouchDB and Hadoop [Ed: Get sysadmins who know what they are doing, as misconfigurations are expensive]
  • Security advisories for Monday
  • Return on Risk Investment
  • Widely used WebEx plugin for Chrome will execute attack code—patch now!
    The Chrome browser extension for Cisco Systems WebEx communications and collaboration service was just updated to fix a vulnerability that leaves all 20 million users susceptible to drive-by attacks that can be carried out by just about any website they visit.
  • DDoS attacks larger, more frequent and complex says Arbor
    Distributed denial-of-service (DDoS) attacks are becoming more frequent and complex, forcing businesses to deploy purpose-built DDoS protection solutions, according to a new infrastructure security report which warns that the threat landscape has been transformed by the emergence of Internet of Things (IoT) botnets. The annual worldwide infrastructure security report from Arbor Networks - the security division of NETSCOUT - reveals that the largest distributed denial-of-service (DDoS) attack reported in 2016 was 800 Gbps, a 60% increase over 2015’s largest attack of 500 Gbps.