BreachExchange mailing list archives

Re: [Dataloss] follow-up: RockYou to pay FTC $250K after breach of 32Mpasswords


From: "Al" <macwheel99 () wowway com>
Date: Fri, 30 Mar 2012 14:31:53 -0500

If you have never been breached, you probably don't want to pay.

That's why I said infrastructure funding . increase cost for everyone
microscopically, where we connect to the Internet.

 

We can have vastly better insurance against disaster, at economy of scale
pricing, or we can all continue playing Russian Roulette with our privacy,
and Identity Thievery.

 

-

Al Mac

.

  _____  

From: JL Walls [mailto:jwallsatt () gmail com] 
Sent: Friday, March 30, 2012 9:38 AM
To: Al
Subject: Re: [Dataloss-discuss] [Dataloss] follow-up: RockYou to pay FTC
$250K after breach of 32Mpasswords

 

Who is going to pay for that?!?

On Wed, Mar 28, 2012 at 10:41 AM, Al <macwheel99 () wowway com> wrote:

They make games which are played on social media, they made all kinds of
pledges of privacy to gullible parents, they got hacked, and it was
discovered their pledges were lies, so big FTC fine for violating privacy of
children under age 13, among other things. We have heard variations on this
story before.

 

Why do we have to wait for a breach to find out some outfit is a pack of
liars? 

Why can't Infrastructure funding pay for privacy security audits of
start-ups, to find which are not a pack of liars?

Then FTC, or other outfit, have web index identifying which outfits have
passed inspections how recently, and which have not.

 

-

Al Macintyre


_______________________________________________
Dataloss-discuss Mailing List (dataloss-discuss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://datalossdb.org/mailing_list

Supporters:

Risk Based Security (http://www.riskbasedsecurity.com/)
Risk Based Security equips organizations with security intelligence, risk
management services and on-demand security solutions to establish
customized risk-based programs to address information security and
compliance challenges.

Tenable Network Security (http://www.tenable.com/)
Tenable Network Security provides a suite of solutions which unify real-time
vulnerability, event and compliance monitoring into a single, role-based,
interface
for administrators, auditors and risk managers to evaluate, communicate and
report needed information for effective decision making and systems
management.





 

-- 

Jacob Walls

 

_______________________________________________
Dataloss-discuss Mailing List (dataloss-discuss () datalossdb org)
Archived at http://seclists.org/dataloss/
Unsubscribe at http://datalossdb.org/mailing_list

Supporters:

Risk Based Security (http://www.riskbasedsecurity.com/)
Risk Based Security equips organizations with security intelligence, risk
management services and on-demand security solutions to establish
customized risk-based programs to address information security and
compliance challenges. 

Tenable Network Security (http://www.tenable.com/)
Tenable Network Security provides a suite of solutions which unify real-time
vulnerability, event and compliance monitoring into a single, role-based, interface
for administrators, auditors and risk managers to evaluate, communicate and
report needed information for effective decision making and systems management.

Current thread: