BreachExchange mailing list archives

Identity Theft Concerns Follow Security Breach


From: Jake Kouns <jkouns () opensecurityfoundation org>
Date: Sat, 12 May 2012 23:52:19 -0400

http://www.foxcharlotte.com/news/local/Identity-Theft-Concerns-Follow-Security-Breach-151217185.html

YORK, S.C.--York County says there could be nearly 17,000 potential
victims after a security breach.

The County Manager says a backup web server was breached last August.

The problem was tracked to a suspected hacker overseas.

York County says South Carolina and a private hosting program is now
monitoring their servers.

Experts say the security breach comes as the number of hackers around
the world has increased.

Completing a nine month investigation into an internet security breach
in York County wasn't easy for County Manager Jim Baker. "It's
embarassing...it's frustrating," Baker said.

Baker was one of the potential victims after a hacker overseas could
have accessed names and social security numbers for the county's
current and former job applicants.

"We feel more comfortable that we are providing that security," Baker said.

I.T. experts say government web sites are safe and secure. Those
experts also say thieves can find back doors into those systems
because of human error.

Internet Security Expert Max Wallace said, "There are people trying
every minute of every day of the year to get into your computer."

Wallace said everyone from computer programmers to credit card
companies  are developing better systems to catch fraud.

York County says they have not yet found any problems.

Mecklenburg County didn't return our calls for comment about their
procedures for protecting your identity.
_______________________________________________
Dataloss Mailing List (dataloss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://datalossdb.org/mailing_list

Supporters:

Risk Based Security (http://www.riskbasedsecurity.com/)
Risk Based Security equips organizations with security intelligence, risk
management services and on-demand security solutions to establish
customized risk-based programs to address information security and
compliance challenges. 

Tenable Network Security (http://www.tenable.com/)
Tenable Network Security provides a suite of solutions which unify real-time
vulnerability, event and compliance monitoring into a single, role-based, interface
for administrators, auditors and risk managers to evaluate, communicate and
report needed information for effective decision making and systems management.


Current thread: